WorldWideScience

Sample records for school attacks leaking

  1. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  2. Prevention of homicidal violence in schools in Germany: the Berlin Leaking Project and the Networks Against School Shootings Project (NETWASS).

    Science.gov (United States)

    Leuschner, Vincenz; Bondü, Rebecca; Schroer-Hippel, Miriam; Panno, Jennifer; Neumetzler, Katharina; Fisch, Sarah; Scholl, Johanna; Scheithauer, Herbert

    2011-01-01

    Since 1999, Germany has experienced at least twelve serious cases of targeted school violence. This article describes two projects designed to fill the gap between universal prevention and emergency response in preventing severe forms of school violence in Germany. The Berlin Leaking Project examined the viability of preventive efforts based on early identification of leaking behavior that often precedes targeted school attacks. Leaking refers to any behavior or communication that indicates a student is preparing to carry out a violent attack. This would include explicit or implied threats of violence, apparent fascination with prior acts of violence such as Columbine, and any evidence of planning or preparation to carry out an attack. The NETWASS project will test a training program and intervention strategy based on those findings, examining the usefulness of a threat assessment approach to prevent violence by training teachers to recognize leaking behavior by students. This approach is extended by training teachers on a larger scale to identify leaking and then having a school-based team evaluate the student and initiate appropriate interventions, such as mental health services, and in some cases, law enforcement action. Copyright © 2011 Wiley Periodicals, Inc., A Wiley Company.

  3. Leaking and Death-Threats by Students: A Study in German Schools

    Science.gov (United States)

    Bondü, Rebecca; Scheithauer, Herbert

    2014-01-01

    Leaking comprises observable behavior or statements that signal intentions of committing a violent offense and is considered an important warning sign for school shootings. School staff who are confronted with leaking have to assess its seriousness and react appropriately--a difficult task, because knowledge about leaking is sparse. The present…

  4. Attacks by “Anonymous‿ WikiLeaks Proponents not Anonymous

    NARCIS (Netherlands)

    Pras, Aiko; Sperotto, Anna; Moreira Moura, Giovane; Drago, Idilio; Barbosa, R.R.R.; Sadre, R.; de Oliveira Schmidt, R.; Hofstede, R.J.; Hofstede, Rick

    2010-01-01

    On November 28, 2010, the world started watching the whistle blower website WikiLeaks to begin publishing part of the 250,000 US Embassy Diplomatic cables. These confidential cables provide an insight on U.S. international affairs from 274 different embassies, covering topics such as analysis of

  5. Design of containment system of nuclear fuel attacked by corrosion with leaking fission products

    International Nuclear Information System (INIS)

    Poblete Maturana, Tomas

    2015-01-01

    The following report presents the design of an innovative confinement system for the nuclear fuel attacked by corrosion, with leakage of fission products to be used in the RECH-1 nuclear experimental reactor of the Chilean Nuclear Energy Commission, is currently within the framework of the international nuclear waste management program developed by the member countries of the IAEA, including Chile. The main objective of this project is the development of a system that is capable of containing, in the smallest possible volume, the fission products that are released to the reactor coolant medium from the nuclear fuel that are attacked by corrosion. Among the tasks carried out for the development of the project are: the compilation of the necessary bibliography for the selection of the most suitable technology for the retention of the fission products, the calculation of the most important parameters to ensure that the system will operate within ranges that do not compromise the radiological safety, and the design of the hydraulic circuit of the system. The results obtained from the calculations showed that the fuel element confinement system is stable from a thermal point of view since the refrigerant does not under any circumstances reach the saturation temperature and, in addition, from a hydraulic point of view, since the rate at which the refrigerant flows through the hydraulic circuit is low enough so that the deformation of the fuel plates forming the nuclear fuel does not occur. The most appropriate technology for the extraction of fission products according to the literature consulted is by ion exchange. The calculations developed showed that with a very small volume of resins, it is possible to capture all of the non-volatile fission products of a nuclear fuel

  6. The Swedish School Attack in Trollhättan.

    Science.gov (United States)

    Erlandsson, Åsa; Reid Meloy, J

    2018-04-23

    This is a case report of the offender and offense characteristics of a targeted attack on a Swedish school using a sword, with a particular focus upon the offender's history, the relationship between mental disorder and ideology, and whether or not it was an act of terrorism. Findings indicate that the offender had no drug or psychiatric treatment history, but postoffense analysis suggests autism spectrum disorder, depression, and both suicidal ideation and intent. The offender planned and prepared for his attack, and the triggering event appeared to be the loss of a temporary job. He expressed chronic anger concerning immigrants to Sweden and blamed them for his failures. Comparison of the fact pattern to other cases of lone actor terrorism with the Terrorist Radicalization Assessment Protocol (TRAP-18) empirically demonstrates excellent criterion validity with other lone actor terrorists in Europe and North America-including right wing extremists-and contributes to further understanding of ideologically motivated mass murder. © 2018 American Academy of Forensic Sciences.

  7. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    Science.gov (United States)

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  8. The Privacy Problem: Although School Librarians Seldom Discuss It, Students' Privacy Rights Are under Attack

    Science.gov (United States)

    Adams, Helen R.

    2011-01-01

    Every day in school libraries nationwide, students' privacy rights are under attack, but many principals, teachers, parents, and community members do not know much about these rights. Even though school librarians are among the strongest proponents of privacy, the subject is rarely discussed, probably because state and federal laws can be…

  9. [Leaking: Frequency and correlates of announcements and threats of homicidal violence reported by Berlin schools between 1996 and 2007].

    Science.gov (United States)

    Leuschner, Vincenz; Bondü, Rebecca; Allroggen, Marc; Scheithauer, Herbert

    2016-01-01

    Threats and announcements of homicidal violence at schools may have massive consequences like evacuations, police searches, criminal investigations, or loss of the sense of security by students, teachers, and parents. However, there is a lack of systematic studies about that phenomenon. The present article would like to contribute to closing the research gap. It presents results about the frequency and structure of threats and announcements of homicidal violence in schools in Berlin. The study is based on an official dataset from school administration reports of violent acts in Berlin schools which has been studied within the Berlin Leaking-Projekt. The sample consists of 427 threats and announcements of homicidal violence between 1996 and 2007. The study is an exceptional analysis of the phenomenon: it presents crosscutting results about frequency and characteristics of threats and the threatening students as well as results of a longitudinal analysis about the development of threats and announcements. Results show a rate of 0,3 threats and announcements per 1 000 student and year. During the observation time span a steady increase of threats and announcements – year by year, influenced by imitation effects after school shootings – has been observed.

  10. An Analysis of Media’s Role: Case Study of Army Public School (APS Peshawar Attack

    Directory of Open Access Journals (Sweden)

    Qureshi Rameesha

    2016-12-01

    Full Text Available The study aimed at analyzing the role of media during and after terrorist attacks by examining the media handling of APS Peshawar attack. The sample consisted of males and females selected on convenience basis from universities of Rawalpindi and Islamabad. It was hypothesized that (1 Extensive media coverage of terrorist attacks leads to greater publicity/recognition of terrorist groups (2 Media coverage of APS Peshawar attack increased fear and anxiety in public (3 Positive media handling/coverage of APS Peshawar attack led to public solidarity and peace. The results indicate that i Media coverage of terrorist attacks does help terrorist groups to gain publicity and recognition amongst public ii Media coverage of Aps Peshawar attack did not increase fear/anxiety in fact it directed the Pakistani nation towards public solidarity and peace.

  11. Small sodium-to-gas leak behavior in relation to LMFBR leak detection system design

    International Nuclear Information System (INIS)

    Hopenfeld, J.; Taylor, G.R.; James, L.A.

    1976-01-01

    Various aspects of sodium-to-gas leaks which must be considered in the design of leak detection systems for LMFBR's are discussed. Attention is focused primarily on small, weeping type leaks. Corrosion rates of steels in fused sodium hydroxide and corrosion damage observed at the site of small leaks lead to the conclusion that the sodium-gas reaction products could attack the primary hot leg piping at rates up to 0.08 mils per hour. Based on theoretical considerations of the corrosion mechanism and on visual observations of pipe topography following small sodium leak tests, it is concluded that pipe damage will be manifested by the formation of small detectable leaks prior to the appearance of larger leaks. The case for uniform pipe corrosion along the pipe circumference or along a vertical section of the pipe is also examined. Using a theoretical model for the gravity flow of sodium and reaction products along the pipe surface and a mass transport controlled corrosion process, it is shown that below sodium leak rates of about 30 g/hr for the primary piping corrosion damage will not extend beyond one radius distance from the leak site. A method of estimating the time delay between the initiation of such leaks and the development of a larger leak due to increased pipe stresses resulting from corrosion is presented

  12. Leak Proof

    Science.gov (United States)

    Steve, James

    2005-01-01

    Many school administrators protect their investments in new roofing systems by paying extra for an extended roof warranty. These warranties can be a valuable asset because they usually provide more coverage and reduce the school administrator's risk of having to pay for extensive roof repairs or replacements. Unfortunately, once an extended…

  13. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  14. The School District's Liability in Cases of Violent Attacks on Students and Employees.

    Science.gov (United States)

    Maze, Jerry G.

    The school's responsibility to provide a safe learning environment for students is examined in this paper. Failure to take preventative measures may result in loss of government tort immunity and charges of negligence liability. A review of case law indicates a trend toward successful litigation by plaintiffs against school districts--a decline in…

  15. Prior Knowledge of Potential School-Based Violence: Information Students Learn May Prevent a Targeted Attack

    Science.gov (United States)

    Pollack, William S.; Modzeleski, William; Rooney, Georgeann

    2008-01-01

    In the wake of several high-profile shootings at schools in the United States, most notably the shootings that occurred at Columbine High School on April 20, 1999, the United States Secret Service (Secret Service) and the United States Department of Education (ED) embarked on a collaborative endeavor to study incidents of planned (or…

  16. Leak rate models and leak detection

    International Nuclear Information System (INIS)

    1992-01-01

    Leak detection may be carried out by a number of detection systems, but selection of the systems must be carefully adapted to the fluid state and the location of the leak in the reactor coolant system. Computer programs for the calculation of leak rates contain different models to take into account the fluid state before its entrance into the crack, and they have to be verified by experiments; agreement between experiments and calculations is generally not satisfactory for very small leak rates resulting from narrow cracks or from a closing bending moment

  17. CPR in the Schools: Training Students to Save Heart Attack Victims.

    Science.gov (United States)

    Britton, Royce J.

    1978-01-01

    A community cardiac emergency medical plan should include training of family and co-workers of high risk patients, including teenage students. The American Heart Association lists ways to introduce cardiopulmonary resuscitation (CPR) into school curricula and describes the plan implemented in Pennsylvania. (MF)

  18. The Leaking Pipeline

    DEFF Research Database (Denmark)

    Henningsen, Inge; Højgaard, Lis

    2002-01-01

    negotiations of cultural prescriptions of gendered subjectivity and identities, organizational understandings and procedures embedded in specific university cultures, traditional of different science disciplines, and the systemic logic and political rationale of the education and research system....... these positions, and one that maintains that a closer look at the statistics does not support this optimism because women’s percentage in recruitment positions is not increasing as the pool of potential female researchers increases, or to put it metaphorically, “the pipeline is leaking women all along” (Alper...... it identifies and describes a Danish verion of ‘the leaky pipeline’ from analyses of the ratios of women in science from high school through tenured positions. Finally it illustrates the cultural mechanisms at play in this process, based on the results of three studies. The first two analyze the educational...

  19. Leak detection : Principles and practice

    International Nuclear Information System (INIS)

    Rama Rao, V.V.K.

    1981-01-01

    Principles of leak detection are explained and various aspects of leak detection techniques and leak detectors are reviewed. The review covers: units for leaks and leak tightness, classification of leaks, timing of leak testing, designing for ease of leak testing of any job, methods of leak detection, their ranges of application and limitations, leak detectors, response time of leak test, minimum detectable concentration of search gas during leak tests, and validity of leak tests. Helium mass spectrometer type leak detector and technique are described in detail. Recent improvements in leak detectors and techniques, particularly mass spectrometer leak detectors using gases other than helium (e.g. hydrogen, argon) are also covered in the review. (M.G.B.)

  20. Leak detection/verification

    Energy Technology Data Exchange (ETDEWEB)

    Krhounek, V.; Zdarek, J.; Pecinka, L. [Nuclear Research Institute, Rez (Czech Republic)

    1997-04-01

    Loss of coolant accident (LOCA) experiments performed as part of a Leak Before Break (LBB) analysis are very briefly summarized. The aim of these experiments was to postulate the leak rates of the coolant. Through-wall cracks were introduced into pipes by fatigue cycling and hydraulically loaded in a test device. Measurements included coolant pressure and temperature, quantity of leaked coolant, displacement of a specimen, and acoustic emission. Small cracks were plugged with particles in the coolant during testing. It is believed that plugging will have no effect in cracks with leak rates above 35 liters per minute. The leak rate safety margin of 10 is sufficient for cracks in which the leak rate is more than 5 liters per minute.

  1. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  2. Permanent underwater leak detector

    International Nuclear Information System (INIS)

    Costello, L; McStay, D; Moodie, D; Kane, D

    2009-01-01

    A new optoelectronic sensor for the real time monitoring of key components such as valves and connectors within the subsea production equipment for leaks of hydraulic fluid is reported. The sensor is capable of detecting low concentrations of such fluids, allowing the early detection of small leaks, and the ability to monitor the evolution of the leak-rate with time, hence providing an important new tool in complying with environmental requirements, enabling early intervention and optimising subsea production

  3. Ultrasensitive leak detection

    International Nuclear Information System (INIS)

    Winkelman, C.R.; Davidson, H.G.

    1978-01-01

    The objective of this investigation was to develop a method of detecting leaks to a sensitivity of 1.0 x 10 -13 std/cm 3 /s in vacuum devices and to develop a qualifiable standard leak to provide system calibration at this leak rate. The development work demonstrated that minimum detectable leak rates of 6.5 x 10 -14 std/cm 3 /s and 5.5 x 10 -15 std/cm 3 /s are possible for respective analog and digital measurement modes

  4. Leak detection method

    International Nuclear Information System (INIS)

    1978-01-01

    This invention provides a method for removing nuclear fuel elements from a fabrication building while at the same time testing the fuel elements for leaks without releasing contaminants from the fabrication building or from the fuel elements. The vacuum source used, leak detecting mechanism and fuel element fabrication building are specified to withstand environmental hazards. (UK)

  5. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  6. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  7. Analysis of small leaks

    International Nuclear Information System (INIS)

    Frisch, W.; Hofmann, K.

    1979-01-01

    Problems associated with 'small leaks' are described and requirements are derived for experimental facilities and computer codes. Based on these requirements, a valuation of the existing experimental facilities and codes is presented. Facilities for integral tests in relatively large scale (ex. LOFT) are suitable for small leak test in principle, however minor changes (instrumentation, secondary side) are necessary for the evaluation of certain phenomena. The 'advanced blowdown codes' are capable of describing most of the phenomena occurring during small leak events, however a substantial amount of code development and verification is still needed. In addition, the use of transient codes in small leak analysis is demonstrated. There are some areas (neutronics feedback, influence of control system) in which the use of transient codes is possible and advantageous. (orig.) 891 HP/orig. 892 BRE [de

  8. Traumatic orbital CSF leak

    Science.gov (United States)

    Borumandi, Farzad

    2013-01-01

    Compared to the cerebrospinalfluid (CSF) leak through the nose and ear, the orbital CSF leak is a rare and underreported condition following head trauma. We present the case of a 49-year-old woman with oedematous eyelid swelling and ecchymosis after a seemingly trivial fall onto the right orbit. Apart from the above, she was clinically unremarkable. The CT scan revealed a minimally displaced fracture of the orbital roof with no emphysema or intracranial bleeding. The fractured orbital roof in combination with the oedematous eyelid swelling raised the suspicion for orbital CSF leak. The MRI of the neurocranium demonstrated a small-sized CSF fistula extending from the anterior cranial fossa to the right orbit. The patient was treated conservatively and the lid swelling resolved completely after 5 days. Although rare, orbital CSF leak needs to be included in the differential diagnosis of periorbital swelling following orbital trauma. PMID:24323381

  9. WRSS jumper leak assessment

    International Nuclear Information System (INIS)

    BAILEY, J.W.

    1999-01-01

    The purpose of this assessment is: (1) to assemble and document the facts associated with three recently installed jumpers which have leaked either during actual process operation or during post installation testing; (2) to describe the corrective actions taken and to identify any process improvements which need to be implemented in the Hanford jumper design and installation activities; and (3) to document WRSS jumper leak lessons learned for use by future projects and other jumper design, fabrication, and installation activities

  10. Small liquid sodium leaks

    International Nuclear Information System (INIS)

    Dufresne, J.; Rochedereux, Y.; Antonakas, D.; Casselman, C.; Malet, J.C.

    1986-05-01

    Usually, pessimistic considerations inassessing the safety of secondary sodium loops in LMFBR reactor lead to assume guillotine rupture releasing a large amount of sodium estimate the consequences of large sodium fires. In order to reduce these consequences, one has to detect the smallest leak as soon as possible and to evaluate the future of an initial small leak. Analysis of the relationship between crack size and sodium outflow rate; Analysis of a sodium pipe with a small open crack

  11. Pipeline Leak Detection Techniques

    OpenAIRE

    Chis, Timur

    2009-01-01

    Leak detection systems range from simple, visual line walking and checking ones to complex arrangements of hard-ware and software. No one method is universally applicable and operating requirements dictate which method is the most cost effective. The aim of the paper is to review the basic techniques of leak detection that are currently in use. The advantages and disadvantages of each method are discussed and some indications of applicability are outlined.

  12. Pipeline Leak Detection Techniques

    Directory of Open Access Journals (Sweden)

    Timur Chis, Ph.D., Dipl.Eng.

    2007-01-01

    Full Text Available Leak detection systems range from simple, visual line walking and checking ones to complex arrangements of hard-ware and software. No one method is universally applicable and operating requirements dictate which method is the most cost effective. The aim of the paper is to review the basic techniques of leak detection that are currently in use. The advantages and disadvantages of each method are discussed and some indications of applicability are outlined.

  13. Low Level Leaks

    Science.gov (United States)

    1998-01-01

    NASA has transferred the improved portable leak detector technology to UE Systems, Inc.. This instrument was developed to detect leaks in fluid systems of critical launch and ground support equipment. This system incorporates innovative electronic circuitry, improved transducers, collecting horns, and contact sensors that provide a much higher degree of reliability, sensitivity and versatility over previously used systems. Potential commercial uses are pipelines, underground utilities, air-conditioning systems, petrochemical systems, aerospace, power transmission lines and medical devices.

  14. COPPER PITTING CORROSION AND PINHOLE LEAKS: A CASE STUDY

    Science.gov (United States)

    Localized corrosion, or "pitting", of copper drinking water pipe continues is a problem for many water utilities and their customers. Extreme attack leads to pinhole leaks that can potentially lead to water damage, mold growth, and costly repairs for the homeowners, as well as th...

  15. Ammonia Leak Locator Study

    Science.gov (United States)

    Dodge, Franklin T.; Wuest, Martin P.; Deffenbaugh, Danny M.

    1995-01-01

    The thermal control system of International Space Station Alpha will use liquid ammonia as the heat exchange fluid. It is expected that small leaks (of the order perhaps of one pound of ammonia per day) may develop in the lines transporting the ammonia to the various facilities as well as in the heat exchange equipment. Such leaks must be detected and located before the supply of ammonia becomes critically low. For that reason, NASA-JSC has a program underway to evaluate instruments that can detect and locate ultra-small concentrations of ammonia in a high vacuum environment. To be useful, the instrument must be portable and small enough that an astronaut can easily handle it during extravehicular activity. An additional complication in the design of the instrument is that the environment immediately surrounding ISSA will contain small concentrations of many other gases from venting of onboard experiments as well as from other kinds of leaks. These other vapors include water, cabin air, CO2, CO, argon, N2, and ethylene glycol. Altogether, this local environment might have a pressure of the order of 10(exp -7) to 10(exp -6) torr. Southwest Research Institute (SwRI) was contracted by NASA-JSC to provide support to NASA-JSC and its prime contractors in evaluating ammonia-location instruments and to make a preliminary trade study of the advantages and limitations of potential instruments. The present effort builds upon an earlier SwRI study to evaluate ammonia leak detection instruments [Jolly and Deffenbaugh]. The objectives of the present effort include: (1) Estimate the characteristics of representative ammonia leaks; (2) Evaluate the baseline instrument in the light of the estimated ammonia leak characteristics; (3) Propose alternative instrument concepts; and (4) Conduct a trade study of the proposed alternative concepts and recommend promising instruments. The baseline leak-location instrument selected by NASA-JSC was an ion gauge.

  16. Leak testing using helium leak detector

    International Nuclear Information System (INIS)

    Aparicio, G.; Mathot, S.; Munoz, C.; Orlando, O.

    1997-01-01

    Most of the equipment used in the industry and particularly in the nuclear activity need to be, vacuum or pressure tight, for operative and safety requirements. These devices have to satisfy particular regulations in order to be qualified by means of operating licences. One of the most efficient system to ensure leaktightnes is using a helium leak detector with a mass spectrometer. In this paper we show the equipment and the devices employed in fuel rods fabrication for CAREM project, and some typical material defects. Operating system and the sensitivity of this method is also described. (author) [es

  17. SEALING SIMULATED LEAKS

    Energy Technology Data Exchange (ETDEWEB)

    Michael A. Romano

    2004-09-01

    This report details the testing equipment, procedures and results performed under Task 7.2 Sealing Simulated Leaks. In terms of our ability to seal leaks identified in the technical topical report, Analysis of Current Field Data, we were 100% successful. In regards to maintaining seal integrity after pigging operations we achieved varying degrees of success. Internal Corrosion defects proved to be the most resistant to the effects of pigging while External Corrosion proved to be the least resistant. Overall, with limitations, pressure activated sealant technology would be a viable option under the right circumstances.

  18. Fuel rod leak detector

    International Nuclear Information System (INIS)

    Womack, R.E.

    1978-01-01

    A typical embodiment of the invention detects leaking fuel rods by means of a radiation detector that measures the concentration of xenon-133 ( 133 Xe) within each individual rod. A collimated detector that provides signals related to the energy of incident radiation is aligned with one of the ends of a fuel rod. A statistically significant sample of the gamma radiation (γ-rays) that characterize 133 Xe is accumulated through the detector. The data so accumulated indicates the presence of a concentration of 133 Xe appropriate to a sound fuel rod, or a significantly different concentration that reflects a leaking fuel rod

  19. PFR evaporator leak

    International Nuclear Information System (INIS)

    Smedley, J.A.

    1975-01-01

    PFR has three heat removal circuits each one having an evaporator, superheater, reheater; all separate units. The status of the system was that circuit No 3 was steaming with 10 MW thermal nuclear power; No 1 circuit was filled with sodium but with the evaporator awaiting modification to cure gas entrainment problems already reported. The leak was in No 2 circuit and was located in the evaporator unit. The evaporator is rated at 120 M thermal at full power and as such is a large unit. The circuit was filled with both sodium and water for the first time three weeks before the conference so it was recent history being reported and therefore any figures quoted should be taken as indicative only. The history of the steam generator was that it was built at works to a very high standard and underwent all the usual tests of strength, inspection of welds and helium leak testing. The steam generator is of U tube design with a tube plate to which the boiler tubes are welded, with all the welds in one of two gas spaces. The inlet and outlet sides are separated by a baffle and the salient features are illustrated in the attached figure. The unit achieved a leak tightness better than the detection limit in the helium leak test at works. This limit was assessed as being less than an equivalent leak of 10 -6 g/s water under steam generator service conditions. However even though all the steam generator units passed this test at works a further test was carried out when the circuits had been completed. The test was carried out during commissioning after sodium filling and with the units hot. The method was to introduce a mixture of helium/ argon at 500 pounds/square inch into the water side of the steam generators and measure the helium concentration in the sodium side gas spaces of the circuit. The test lasted many days and under these conditions the sensitivity is such that a leak equivalent to somewhere between 10 -7 to 10 -6 g/s equivalent water leak could be detected, i

  20. PFR evaporator leak

    Energy Technology Data Exchange (ETDEWEB)

    Smedley, J A

    1975-07-01

    PFR has three heat removal circuits each one having an evaporator, superheater, reheater; all separate units. The status of the system was that circuit No 3 was steaming with 10 MW thermal nuclear power; No 1 circuit was filled with sodium but with the evaporator awaiting modification to cure gas entrainment problems already reported. The leak was in No 2 circuit and was located in the evaporator unit. The evaporator is rated at 120 M thermal at full power and as such is a large unit. The circuit was filled with both sodium and water for the first time three weeks before the conference so it was recent history being reported and therefore any figures quoted should be taken as indicative only. The history of the steam generator was that it was built at works to a very high standard and underwent all the usual tests of strength, inspection of welds and helium leak testing. The steam generator is of U tube design with a tube plate to which the boiler tubes are welded, with all the welds in one of two gas spaces. The inlet and outlet sides are separated by a baffle and the salient features are illustrated in the attached figure. The unit achieved a leak tightness better than the detection limit in the helium leak test at works. This limit was assessed as being less than an equivalent leak of 10{sup -6} g/s water under steam generator service conditions. However even though all the steam generator units passed this test at works a further test was carried out when the circuits had been completed. The test was carried out during commissioning after sodium filling and with the units hot. The method was to introduce a mixture of helium/ argon at 500 pounds/square inch into the water side of the steam generators and measure the helium concentration in the sodium side gas spaces of the circuit. The test lasted many days and under these conditions the sensitivity is such that a leak equivalent to somewhere between 10{sup -7} to 10{sup -6} g/s equivalent water leak could be

  1. Ultrasonic leak detection

    International Nuclear Information System (INIS)

    Murphy, R.V.

    1977-01-01

    A scanning ultrasonic microphone was used to detect the presence and locate the sources of hydraulic noises in piping systems in a reactor environment. The intensity changes of the noises correspond to changes of flow conditions within the system caused by throttled valves, flow rate changes, and leaks. (author)

  2. Leaking Fuel Impacts and Practices

    International Nuclear Information System (INIS)

    Hozer, Zoltan; Szabo, Peter; Somfai, Barbara; Cherubini, Marco; Aldworth, Robin; Waeckel, Nicolas; Delorme, Tim; Dickson, Raymond; Fujii, Hajime; Rey Gayo, Jose Maria; Grant, Wade; Gorzel, Andreas; Hellwig, Christian; Kamimura, Katsuichiro; Sugiyama, Tomoyuki; Klouzal, Jan; Miklos, Marek; Nagase, Fumihisa; Nilsson, Marcus; Petit, Marc; Richards, Stuart; Lundqvist Saleh, Tobias; Stepniewski, Marek; Sim, Ki Seob; ); Rehacek, Radomir; Kissane, Martin; )

    2014-01-01

    The impact of leaking fuel rods on the operation of nuclear power plants and the practices of handling leaking fuel has been reviewed by the CSNI Working Group on Fuel Safety in order to promote a better understanding on the handling of leaking fuel in power reactors, as well as to discuss and review the current practices in member countries to help in decisions on the specification of reactor operation conditions with leaking fuel rods and on the handling of leaking fuel after removal from reactor. Experts from 15 countries provided data on the handling of leaking fuel in PWR, BWR, VVER and PHWR reactor types. The review covered the operation of NPP reactors with leaking fuel, wet and dry storage and transport of leaking assemblies. The methods and applied instruments to identify leaking fuel assemblies and the repair of them were addressed in the review. Special attention was paid to the activity release from leaking rods in the reactor and under storage conditions. The consideration of leaking fuel in safety analyses on core behaviour during postulated accidents was also discussed in the review. The main conclusions of the review pointed out that the activity release from leaking fuel rods in the reactor can be handled by technological systems, or in case of failure of too many rods the reactor can be shutdown to minimize activity release. Under accident conditions and operational transients the leaking rods may produce coolant activity concentration peaks. The storage of spent leaking fuel is normally characterised by moderate release of radionuclides from the fuel. The power plants apply limits for activity concentration to limit the amount of leaking rods in the core. In different countries, the accident analyses take into consideration the potential release from leaking fuel rods in design basis accidents in different ways. Some power plants apply special tools for handling and repair of leaking assemblies and rods. The leaking rods are stored together with

  3. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  4. Hazardous fluid leak detector

    Science.gov (United States)

    Gray, Harold E.; McLaurin, Felder M.; Ortiz, Monico; Huth, William A.

    1996-01-01

    A device or system for monitoring for the presence of leaks from a hazardous fluid is disclosed which uses two electrodes immersed in deionized water. A gas is passed through an enclosed space in which a hazardous fluid is contained. Any fumes, vapors, etc. escaping from the containment of the hazardous fluid in the enclosed space are entrained in the gas passing through the enclosed space and transported to a closed vessel containing deionized water and two electrodes partially immersed in the deionized water. The electrodes are connected in series with a power source and a signal, whereby when a sufficient number of ions enter the water from the gas being bubbled through it (indicative of a leak), the water will begin to conduct, thereby allowing current to flow through the water from one electrode to the other electrode to complete the circuit and activate the signal.

  5. Natural gas leak mapper

    Science.gov (United States)

    Reichardt, Thomas A [Livermore, CA; Luong, Amy Khai [Dublin, CA; Kulp, Thomas J [Livermore, CA; Devdas, Sanjay [Albany, CA

    2008-05-20

    A system is described that is suitable for use in determining the location of leaks of gases having a background concentration. The system is a point-wise backscatter absorption gas measurement system that measures absorption and distance to each point of an image. The absorption measurement provides an indication of the total amount of a gas of interest, and the distance provides an estimate of the background concentration of gas. The distance is measured from the time-of-flight of laser pulse that is generated along with the absorption measurement light. The measurements are formated into an image of the presence of gas in excess of the background. Alternatively, an image of the scene is superimosed on the image of the gas to aid in locating leaks. By further modeling excess gas as a plume having a known concentration profile, the present system provides an estimate of the maximum concentration of the gas of interest.

  6. Does a dyon leak

    International Nuclear Information System (INIS)

    Grossman, B.

    1983-01-01

    In the presence of a CP-nonconservation measured by an angle theta, the ground state of a point magnetic monopole is shown to have an electric charge of value -etheta/2π which changes discontinuously to zero for massless fermions. A new version of Levinson's theorem is also given. The latter effect as well as the S-wave helicity flip of a dyon can be interpreted as a leak at the origin

  7. Aspects of leak detection

    International Nuclear Information System (INIS)

    Chivers, T.C.

    1997-01-01

    A requirement of a Leak before Break safety case is that the leakage from the through wall crack be detected prior to any growth leading to unacceptable failure. This paper sets out to review some recent developments in this field. It does not set out to be a comprehensive guide to all of the methods available. The discussion concentrates on acoustic emission and how the techniques can be qualified and deployed on operational plant

  8. Aspects of leak detection

    Energy Technology Data Exchange (ETDEWEB)

    Chivers, T.C. [Berkeley Technology Centre, Glos (United Kingdom)

    1997-04-01

    A requirement of a Leak before Break safety case is that the leakage from the through wall crack be detected prior to any growth leading to unacceptable failure. This paper sets out to review some recent developments in this field. It does not set out to be a comprehensive guide to all of the methods available. The discussion concentrates on acoustic emission and how the techniques can be qualified and deployed on operational plant.

  9. Intelligence Leaks: What Is the Role of the Leak and the Leaker in U.S. Democracy?

    Science.gov (United States)

    2014-03-01

    WikiLeaks, the government did not fight a battle against the media due, in part, to the jurisprudence established by the Pentagon Papers . (The U.S...Accountability.” University of Georgia, School of Public and International Affairs, Occasional Paper . Johnson, Lyndon B. “Special Message to the Congress on...between the Pentagon Papers and WikiLeaks to Edward Snowden. 14. SUBJECT TERMS Bradley Manning, Daniel Ellsberg, executive

  10. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  11. Mobile leak testing system

    International Nuclear Information System (INIS)

    Ungr, F.

    The design and implementation are described of a mobile testing unit ULTRATEST M for helium leak tests. The equipment has been developed by Leybold-Heraeus GmbH in Cologne and is in-built in a Mercedes-Benz 208 van. The equipment is designed for the operative use in assembly and construction of nuclear power plants and its throughput is sufficient for checking the whole upper reactor block. It may also be used for removing defects of vacuum equipment requiring a high level of tightness or equally demanding equipment used in the chemical industry. Experience with the equipment is described. (B.S.)

  12. Deconstructing Gender Stereotypes in Leak

    Directory of Open Access Journals (Sweden)

    Nengah Bawa Atmadja

    2015-05-01

    Full Text Available The belief of Balinese people towards leak still survive. Leak is a magic based on durgaism that can transform a person from human to another form, such as apes, pigs, etc. People tend to regard leak as evil. In general, the evilness is constructed in gender stereotypes, so it is identified that leak are always women. This idea is a power game based on the ideology of patriarchy that provides legitimacy for men to dominate women with a plea for social harmony. As a result, women are marginalized in the Balinese society. Women should be aware of so it would provide encouragement for them to make emancipatory changes dialogically. Kepercayaan orang Bali terhadap leak tetap bertahan sampai saat ini. Leak adalah sihir yang berbasiskan durgaisme yang dapat mengakibatkan seseorang bisa merubah bentuk dari manusia ke wujud yang lain, misalnya kera, babi, dll. Leak termasuk magi hitam sehingga dinilai bersifat jelek. Pada umumnya perempuan diidentikkan dengan leak sehingga melahirkan asumsi yang bermuatan steriotip gender bahwa leak = perempuan. Gagasan ini merupakan permainan kekuasaan berbasis ideologi patriarkhi dan sekaligus memberikan legitimasi bagi laki-laki untuk menguasai perempuan dengan dalih demi keharmonisan sosial. Akibatnya, perempuan menjadi termarginalisasi pada masyarakat Bali.  Perempuan harus menyadarinya sehingga memberikan dorongan bagi mereka untuk melakukan perubahan secara dialogis emansipatoris.

  13. Radiation leaking protection device

    International Nuclear Information System (INIS)

    Sunami, Yoshio; Mitsumori, Kojiro

    1980-01-01

    Purpose: To prevent radioactivity from leaking outside of a reactor container by way of pipeways passing therethrough, by supplying pressurized fluid between each of a plurality of valves for separating the pipeways. Constitution: Pressurized fluid is supplied between each of a plurality of valves for separating pipeways. For instance, water in a purified water tank is pressurized by a pressure pump and the pressure of the pressurized water is controlled by a differential pressure detector, a pressure controller and a pressure control valve. In the case if a main steam pipe is ruptured outside of the reactor container or to be repaired, the separation valves are wholly closed and then the pressurizing device is actuated to supply pressurized water containing no radioactivity from the purified water tank to the position between the valves. The pressure in the pressurized water is controlled such that it is always higher by a predetermined level than the pressure in the reactor. This prevents the radioacitivity in the reactor core from leaking outside of the container passing through the valves, whereby radiation exposure in the working can be reduced and the circumferential contamination upon accident of pipeway rupture can be decreased. (Kawakami, Y.)

  14. 40 CFR 63.1005 - Leak repair.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false Leak repair. 63.1005 Section 63.1005... Standards for Equipment Leaks-Control Level 1 § 63.1005 Leak repair. (a) Leak repair schedule. The owner or operator shall repair each leak detected no later than 15 calendar days after it is detected, except as...

  15. 40 CFR 63.1024 - Leak repair.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false Leak repair. 63.1024 Section 63.1024... Standards for Equipment Leaks-Control Level 2 Standards § 63.1024 Leak repair. (a) Leak repair schedule. The owner or operator shall repair each leak detected as soon as practical, but not later than 15 calendar...

  16. 40 CFR 65.105 - Leak repair.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 15 2010-07-01 2010-07-01 false Leak repair. 65.105 Section 65.105... FEDERAL AIR RULE Equipment Leaks § 65.105 Leak repair. (a) Leak repair schedule. The owner or operator shall repair each leak detected as soon as practical but not later than 15 calendar days after it is...

  17. Chemochromic Hydrogen Leak Detectors

    Science.gov (United States)

    Roberson, Luke; Captain, Janine; Williams, Martha; Smith, Trent; Tate, LaNetra; Raissi, Ali; Mohajeri, Nahid; Muradov, Nazim; Bokerman, Gary

    2009-01-01

    At NASA, hydrogen safety is a key concern for space shuttle processing. Leaks of any level must be quickly recognized and addressed due to hydrogen s lower explosion limit. Chemo - chromic devices have been developed to detect hydrogen gas in several embodiments. Because hydrogen is odorless and colorless and poses an explosion hazard, there is an emerging need for sensors to quickly and accurately detect low levels of leaking hydrogen in fuel cells and other advanced energy- generating systems in which hydrogen is used as fuel. The device incorporates a chemo - chromic pigment into a base polymer. The article can reversibly or irreversibly change color upon exposure to hydrogen. The irreversible pigment changes color from a light beige to a dark gray. The sensitivity of the pigment can be tailored to its application by altering its exposure to gas through the incorporation of one or more additives or polymer matrix. Furthermore, through the incorporation of insulating additives, the chemochromic sensor can operate at cryogenic temperatures as low as 78 K. A chemochromic detector of this type can be manufactured into any feasible polymer part including injection molded plastic parts, fiber-spun textiles, or extruded tapes. The detectors are simple, inexpensive, portable, and do not require an external power source. The chemochromic detectors were installed and removed easily at the KSC launch pad without need for special expertise. These detectors may require an external monitor such as the human eye, camera, or electronic detector; however, they could be left in place, unmonitored, and examined later for color change to determine whether there had been exposure to hydrogen. In one type of envisioned application, chemochromic detectors would be fabricated as outer layers (e.g., casings or coatings) on high-pressure hydrogen storage tanks and other components of hydrogen-handling systems to provide visible indications of hydrogen leaks caused by fatigue failures or

  18. Reliably determining data leakage in the presence of strong attackers

    NARCIS (Netherlands)

    Bortolameotti, R.; Peter, A.; Everts, M.H.; Jonker, W.; Hartel, P.

    2016-01-01

    We address the problem of determining what data has been leaked from a system after its recovery from a successful attack. This is a forensic process which is relevant to give a better understanding of the impact of a data breach, but more importantly it is becoming mandatory according to the recent

  19. Device provides controlled gas leaks

    Science.gov (United States)

    Kami, S. K.; King, H. J.

    1968-01-01

    Modified palladium leak device provides a controlled release /leak/ of very small quantities of gas at low or medium pressures. It has no moving parts, requires less than 5 watts to operate, and is capable of releasing the gas either continuously or in pulses at adjustable flow rates.

  20. Tank car leaks gasoline

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    On January 27, 1994, a Canadian National (CN) tank car loaded with gasoline began to leak from a crack in the tank shell on the end of the car near the stub sill. The tank car had been damaged from impact switching. A part of the tank car was sent for laboratory analysis which concluded that: (1) the fracture originated in two locations in welds, (2) the cracks propagated in a symmetrical manner and progressed into the tank plate, (3) the fracture surface revealed inadequate weld fusion. A stress analysis of the tank car was conducted to determine the coupling force necessary to cause the crack. It was noted that over the last decade several problems have occurred pertaining to stub sill areas of tank cars that have resulted in hazardous material spills. An advisory was sent to Transport Canada outlining many examples where tank cars containing serious defects had passed CN inspections that were specifically designed to identify such defects. 4 figs

  1. Hermetic Seal Leak Detection Apparatus

    Science.gov (United States)

    Kelley, Anthony R. (Inventor)

    2013-01-01

    The present invention is a hermetic seal leak detection apparatus, which can be used to test for hermetic seal leaks in instruments and containers. A vacuum tight chamber is created around the unit being tested to minimize gas space outside of the hermetic seal. A vacuum inducing device is then used to increase the gas chamber volume inside the device, so that a slight vacuum is pulled on the unit being tested. The pressure in the unit being tested will stabilize. If the stabilized pressure reads close to a known good seal calibration, there is not a leak in the seal. If the stabilized pressure reads closer to a known bad seal calibration value, there is a leak in the seal. The speed of the plunger can be varied and by evaluating the resulting pressure change rates and final values, the leak rate/size can be accurately calculated.

  2. Experiments on leak-selfwastage and leak-propagation

    International Nuclear Information System (INIS)

    Voss, J.; Vagt, P.; Westenbrugge, J.K. van; Joziasse, J.

    1984-01-01

    During the last years a considerable number of selfwastage experiments with small leaks of different shape and size and for different ferritic materials (2 1/4% Cr - and 12% Cr-steel) were performed by TNO and by INTERATOM, using several sodium test facilities. Many fabrication-methods of artificial micro-leaks were applied and examined. Selfplugging-, selfwastage- and reopening-effects were observed and evaluated during different time periods and under various test conditions. The main results will be discussed. Concerning the leak propagation program of INTERATOM, the first series of experiments was carried out this year. A short status report and some first results will be given. (author)

  3. Aerospace Payloads Leak Test Methodology

    Science.gov (United States)

    Lvovsky, Oleg; Grayson, Cynthia M.

    2010-01-01

    Pressurized and sealed aerospace payloads can leak on orbit. When dealing with toxic or hazardous materials, requirements for fluid and gas leakage rates have to be properly established, and most importantly, reliably verified using the best Nondestructive Test (NDT) method available. Such verification can be implemented through application of various leak test methods that will be the subject of this paper, with a purpose to show what approach to payload leakage rate requirement verification is taken by the National Aeronautics and Space Administration (NASA). The scope of this paper will be mostly a detailed description of 14 leak test methods recommended.

  4. Tube leak detector

    International Nuclear Information System (INIS)

    Morita, Bunji; Takamura, Koichi; Matsuda, Shigehiro; Kiyosawa, Shun-ichi; Asami, Toru; Yamada, Hiroshi; Naruse, Shin-ichi.

    1995-01-01

    The device of the present invention detects occurrence of leakage in a steam generator, a steam heating tube, or a heat exchanger of a nuclear power plant. Namely, an vibration sensor is disposed at the rear end of a rod-like supersonic resonance member. A node portion for the vibrations of the resonance member is held by a holding member and attached to a wall surface of a can such as a boiler. With such a constitution, the resonance member is resonated by supersonic waves generated upon leakage of the tube. The vibrations are measured by the vibration sensor at the rear end. Presence of leakage is detected by utilizing one or more of resonance frequencies. Since the device adopts a resonance phenomenon, a conduction efficiency of the vibrations is high, thereby enabling to detect leakage at high sensitivity. In addition, the supersonic wave resonance member has its top end directly protruded into a pressure vessel such as a boiler by using a metal or a ceramic which is excellent in heat and pressure resistance. Accordingly, the sound of leak can be detected efficiently. (I.S.)

  5. Analysis of SX farm leak histories - Historical leak model (HLM)

    International Nuclear Information System (INIS)

    Fredenburg, E.A.

    1998-01-01

    This report uses readily available historical information to better define the volume, chemical composition, and Cs-137/Sr-90 amounts for leaks that have occurred in the past for tanks SX-108, SX-109, SX-111, and SX-112. In particular a Historical Leak Model (HLM) is developed that is a month by month reconciliation of tank levels, fill records, and calculated boil-off rates for these tanks. The HLM analysis is an independent leak estimate that reconstructs the tank thermal histories thereby deriving each tank's evaporative volume loss and by difference, its unaccounted losses as well. The HLM analysis was meant to demonstrate the viability of its approach, not necessarily to establish the HLM leak estimates as being definitive. Past leak estimates for these tanks have invariably resorted to soil wetting arguments but the extent of soil contaminated by each leak has always been highly uncertain. There is also a great deal of uncertainty with the HLM that was not quantified in this report, but will be addressed later. These four tanks (among others) were used from 1956 to 1975 for storage of high-level waste from the Redox process at Hanford. During their operation, tank waste temperatures were often as high as 150 C (300 F), but were more typically around 130 C. The primary tank cooling was by evaporation of tank waste and therefore periodic replacement of lost volume with water was necessary to maintain each tank's inventory. This active reflux of waste resulted in very substantial turnovers in tank inventory as well as significant structural degradation of these tanks. As a result of the loss of structural integrity, each of these tanks leaked during their active periods of operation. Unfortunately, the large turnover in tank volume associated with their reflux cooling has made a determination of leak volumes very difficult. During much of these tanks operational histories, inventory losses because of evaporative cooling could have effectively masked any volume

  6. Concentration device for leak liquids

    International Nuclear Information System (INIS)

    Matsumoto, Kaname; Matsuda, Ken; Takabori, Ken-ichi.

    1987-01-01

    Purpose: To improve radioactivity recovery and volume-reducing rates, as well as enable safety and easy handling for leak liquids resulted from reptures in coolant circuits. Constitution: The device of the invention comprises an evaporation vessel filled with leak fluids to a predetermined level, an airtight vessel disposed in the evaporation vessel containing hydrophilic porous material partially immersed in the leak fluids and means for heating the hydrophilic material. In this device, leak liquids are absorbed in the hydrophilic porous material, a great amount of water is evaporated from the outer surface of the hydrophilic porous material exposed above the liquid surface, and salts and radioactive material are remained on the inside and the outer surface of the porous material. The evaporated water content is condensated and recovered in a cooler and the remaining salts, etc. are discarded together with the porous material. The volume-reducing property can be improved by constituting the porous material with burnable material. (Takahashi, M.)

  7. Basis UST leak detection systems

    International Nuclear Information System (INIS)

    Silveria, V.

    1992-01-01

    This paper reports that gasoline and other petroleum products are leaking from underground storage tanks (USTs) at an alarming rate, seeping into soil and groundwater. Buried pipes are an even greater culprit, accounting for most suspected and detected leaks according to Environmental Protection Agency (EPA) estimates. In response to this problem, the EPA issued regulations setting standards for preventing, detecting, reporting, and cleaning up leaks, as well as fiscal responsibility. However, federal regulations are only a minimum; some states have cracked down even harder Plant managers and engineers have a big job ahead of them. The EPA estimates that there are more than 75,000 fuel USTs at US industrial facilities. When considering leak detection systems, the person responsible for making the decision has five primary choices: inventory reconciliation combined with regular precision tightness tests; automatic tank gauging; groundwater monitoring; interstitial monitoring of double containment systems; and vapor monitoring

  8. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  9. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  10. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  11. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  12. Mapping urban pipeline leaks: Methane leaks across Boston

    International Nuclear Information System (INIS)

    Phillips, Nathan G.; Ackley, Robert; Crosson, Eric R.; Down, Adrian; Hutyra, Lucy R.; Brondfield, Max; Karr, Jonathan D.; Zhao Kaiguang; Jackson, Robert B.

    2013-01-01

    Natural gas is the largest source of anthropogenic emissions of methane (CH 4 ) in the United States. To assess pipeline emissions across a major city, we mapped CH 4 leaks across all 785 road miles in the city of Boston using a cavity-ring-down mobile CH 4 analyzer. We identified 3356 CH 4 leaks with concentrations exceeding up to 15 times the global background level. Separately, we measured δ 13 CH 4 isotopic signatures from a subset of these leaks. The δ 13 CH 4 signatures (mean = −42.8‰ ± 1.3‰ s.e.; n = 32) strongly indicate a fossil fuel source rather than a biogenic source for most of the leaks; natural gas sampled across the city had average δ 13 CH 4 values of −36.8‰ (±0.7‰ s.e., n = 10), whereas CH 4 collected from landfill sites, wetlands, and sewer systems had δ 13 CH 4 signatures ∼20‰ lighter (μ = −57.8‰, ±1.6‰ s.e., n = 8). Repairing leaky natural gas distribution systems will reduce greenhouse gas emissions, increase consumer health and safety, and save money. Highlights: ► We mapped 3356 methane leaks in Boston. ► Methane leaks in Boston carry an isotopic signature of pipeline natural gas. ► Replacing failing gas pipelines will provide safety, environmental, and economic benefits. - We identified 3356 methane leaks in Boston, with isotopic characteristics consistent with pipeline natural gas.

  13. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  14. Mitigated Transfer Line Leaks that Result in Surface Pools and Spray Leaks into Pits

    Energy Technology Data Exchange (ETDEWEB)

    HEY, B.E.

    1999-12-07

    This analysis provides radiological and toxicological consequence calculations for postulated mitigated leaks during transfers of six waste compositions. Leaks in Cleanout Boxes equipped with supplemental covers and leaks in pits are analyzed.

  15. Mitigated Transfer Line Leaks that Result in Surface Pools and Spray Leaks into Pits

    International Nuclear Information System (INIS)

    HEY, B.E.

    1999-01-01

    This analysis provides radiological and toxicological consequence calculations for postulated mitigated leaks during transfers of six waste compositions. Leaks in Cleanout Boxes equipped with supplemental covers and leaks in pits are analyzed

  16. Sensors for Fluid Leak Detection

    Directory of Open Access Journals (Sweden)

    Gonzalo Pajares Martinsanz

    2015-02-01

    Full Text Available Fluid leak detection represents a problem that has attracted the interest of researchers, but not exclusively because in industries and services leaks are frequently common. Indeed, in water or gas supplies, chemical or thermal plants, sea-lines or cooling/heating systems leakage rates can cause important economic losses and sometimes, what it is more relevant, environmental pollution with human, animal or plant lives at risk. This last issue has led to increased national and international regulations with different degrees of severity regarding environmental conservation.[...

  17. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  18. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  20. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  1. Detecting leaks in vacuum bags

    Science.gov (United States)

    Carlstrom, E. E.

    1980-01-01

    Small leaks in vacuum bag can be readily detected by eye, using simple chemical reaction: combination of ammonia and acetic acid vapors to produce cloudy white smoke. Technique has been successfully used to test seam integrity and to identify minute pinholes in vacuum bag used in assembly of ceramic-tile heat shield for Space Shuttle Orbiter.

  2. LOCATING LEAKS WITH ACOUSTIC TECHNOLOGY

    Science.gov (United States)

    Many water distribution systems in this country are almost 100 years old. About 26 percent of piping in these systems is made of unlined cast iron or steel and is in poor condition. Many methods that locate leaks in these pipes are time-consuming, costly, disruptive to operations...

  3. Pipe Leak Detection Technology Development

    Science.gov (United States)

    The U. S. Environmental Protection Agency (EPA) has determined that one of the nation’s biggest infrastructural needs is the replacement or rehabilitation of the water distribution and transmission systems. The institution of more effective pipe leak detection technology will im...

  4. Reliability of leak detection systems in LWRs

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1986-10-01

    In this paper, NRC guidelines for leak detection will be reviewed, current practices described, potential safety-related problems discussed, and potential improvements in leak detection technology (with emphasis on acoustic methods) evaluated

  5. Stochastic Consequence Analysis for Waste Leaks

    International Nuclear Information System (INIS)

    HEY, B.E.

    2000-01-01

    This analysis evaluates the radiological consequences of potential Hanford Tank Farm waste transfer leaks. These include ex-tank leaks into structures, underneath the soil, and exposed to the atmosphere. It also includes potential misroutes, tank overflow

  6. Simulation of leaking fuel rods

    International Nuclear Information System (INIS)

    Hozer, Z.

    2006-01-01

    The behaviour of failed fuel rods includes several complex phenomena. The cladding failure initiates the release of fission product from the fuel and in case of large defect even urania grains can be released into the coolant. In steady state conditions an equilibrium - diffusion type - release is expected. During transients the release is driven by a convective type leaching mechanism. There are very few experimental data on leaking WWER fuel rods. For this reason the activity measurements at the nuclear power plants provide very important information. The evaluation of measured data can help in the estimation of failed fuel rod characteristics and the prediction of transient release dynamics in power plant transients. The paper deals with the simulation of leaking fuel rods under steady state and transient conditions and describes the following new results: 1) A new algorithm has been developed for the simulation of leaking fuel rods under steady state conditions and the specific parameters of the model for the Paks NPP has been determined; 2) The steady state model has been applied to calculation of leaking fuel characteristics using iodine and noble gas activity measurement data; 3) A new computational method has been developed for the simulation of leaking fuel rods under transient conditions and the specific parameters for the Paks NPP has been determined; 4) The transient model has been applied to the simulation of shutdown process at the Paks NPP and for the prediction of the time and magnitude of 123 I activity peak; 5) Using Paks NPP data a conservative value has been determined for the upper limit of the 123 I release from failed fuel rods during transients

  7. Quantum Encryption Minimising Key Leakage under Known Plaintext Attacks

    DEFF Research Database (Denmark)

    Pedersen, Thomas Brochmann

    2006-01-01

    , or interactive encryption schemes, where the interaction does not need to occur online. In our model we show that the amount of key leaked under a known plaintext attack can be made arbitrarily small even in non-interactive encryption schemes. We also give an encryption scheme where eavesdropping can be detected....... In this encryption scheme the entire key can be safely recycled when no eavesdropping is detected....

  8. Imaging review of cerebrospinal fluid leaks

    OpenAIRE

    Naga V Vemuri; Lakshmi S P Karanam; Venkatesh Manchikanti; Srinivas Dandamudi; Sampath K Puvvada; Vineet K Vemuri

    2017-01-01

    Cerebrospinal fluid (CSF) leak occurs due to a defect in the dura and skull base. Trauma remains the most common cause of CSF leak; however, a significant number of cases are iatrogenic, and result from a complication of functional endoscopic sinus surgery (FESS). Early diagnosis of CSF leak is of paramount importance to prevent life-threatening complications such as brain abscess and meningitis. Imaging plays a crucial role in the detection and characterization of CSF leaks. Three-dimensiona...

  9. Helium leak testing methods in nuclear applications

    International Nuclear Information System (INIS)

    Ahmad, Anis

    2004-01-01

    Helium mass-spectrometer leak test is the most sensitive leak test method. It gives very reliable and sensitive test results. In last few years application of helium leak testing has gained more importance due to increased public awareness of safety and environment pollution caused by number of growing chemical and other such industries. Helium leak testing is carried out and specified in most of the critical area applications like nuclear, space, chemical and petrochemical industries

  10. Calibration of a leak detection spectrometer

    International Nuclear Information System (INIS)

    Geller, R.

    1958-01-01

    This paper describes a study of the possible methods for calibrating a leak detection spectrometer, and the estimation of outputs from the leaks is considered. With this in mind the question of sensitivity of leak detection is tackled on a very general level; first the sensitivity of the isolated instrument is determined, and then the sensitivity of an instrument connected to an installation where leaks may be suspected. Finally, practical solutions are proposed. (author) [fr

  11. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  12. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  13. Intraoperative leak testing has no correlation with leak after laparoscopic sleeve gastrectomy.

    Science.gov (United States)

    Sethi, Monica; Zagzag, Jonathan; Patel, Karan; Magrath, Melissa; Somoza, Eduardo; Parikh, Manish S; Saunders, John K; Ude-Welcome, Aku; Schwack, Bradley F; Kurian, Marina S; Fielding, George A; Ren-Fielding, Christine J

    2016-03-01

    Staple line leak is a serious complication of sleeve gastrectomy. Intraoperative methylene blue and air leak tests are routinely used to evaluate for leak; however, the utility of these tests is controversial. We hypothesize that the practice of routine intraoperative leak testing is unnecessary during sleeve gastrectomy. A retrospective cohort study was designed using a prospectively collected database of seven bariatric surgeons from two institutions. All patients who underwent sleeve gastrectomy from March 2012 to November 2014 were included. The performance of intraoperative leak testing and the type of test (air or methylene blue) were based on surgeon preference. Data obtained included BMI, demographics, comorbidity, presence of intraoperative leak test, result of test, and type of test. The primary outcome was leak rate between the leak test (LT) and no leak test (NLT) groups. SAS version 9.4 was used for univariate and multivariate analyses. A total of 1550 sleeve gastrectomies were included; most were laparoscopic (99.8%), except for one converted and two open cases. Routine intraoperative leak tests were performed in 1329 (85.7%) cases, while 221 (14.3%) did not have LTs. Of the 1329 cases with LTs, there were no positive intraoperative results. Fifteen (1%) patients developed leaks, with no difference in leak rate between the LT and NLT groups (1 vs. 1%, p = 0.999). After adjusting for baseline differences between the groups with a propensity analysis, the observed lack of association between leak and intraoperative leak test remained. In this cohort, leaks presented at a mean of 17.3 days postoperatively (range 1-67 days). Two patients with staple line leaks underwent repeat intraoperative leak testing at leak presentation, and the tests remained negative. Intraoperative leak testing has no correlation with leak due to laparoscopic sleeve gastrectomy and is not predictive of the later development of staple line leak.

  14. Nuclear fuel element leak detection system

    International Nuclear Information System (INIS)

    John, C.D. Jr.

    1978-01-01

    Disclosed is a leak detection system integral with a wall of a building used to fabricate nuclear fuel elements for detecting radiation leakage from the nuclear fuel elements as the fuel elements exit the building. The leak detecting system comprises a shielded compartment constructed to withstand environmental hazards extending into a similarly constructed building and having sealed doors on both ends along with leak detecting apparatus connected to the compartment. The leak detecting system provides a system for removing a nuclear fuel element from its fabrication building while testing for radiation leaks in the fuel element

  15. Leak testing and repair of fusion devices

    International Nuclear Information System (INIS)

    Kozman, T.A.

    1983-01-01

    The leak testing, reporting and vacuum leak repair techniques of the MFTF yin-yang number one magnet system, the world's largest superconducting magnet system, are discussed. Based on this experience, techniques will be developed for testing and repairing leaks on the 42 MFTF-B magnets. The leak-hunting techniques for the yin-yang magnet systems were applied to two helium circuits (the coil bundle and guard vacuum; both require helium flow for magnet cooldown), their associated piping, liquid nitrogen radiation shields, and piping. Additionally, during MFTF-B operation there will be warm water plasma shields and piping that require leak checking

  16. Leak rate measurements and detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.; Shack, W.J.; Claytor, T.

    1983-10-01

    A research program is under way to evaluate and develop improve leak detection systems. The primary focus of the work has been on acoustic emission detection of leaks. Leaks from artificial flaws, laboratory-generated IGSCCs and thermal fatigue cracks, and field-induced intergranular stress corrosion cracks (IGSCCs) from reactor piping have been examined. The effects of pressure, temperature, and leak rate and geometry on the acoustic signature are under study. The use of cross-correlation techniques for leak location and pattern recognition and autocorrelation for source discrimination is also being considered

  17. Leak detection by vibrational diagnostic methods

    International Nuclear Information System (INIS)

    Siklossy, P.

    1983-01-01

    The possibilities and methods of leak detection due to mechanical failures in nuclear power plants are reviewed on the basis of the literature. Great importance is attributed to vibrational diagnostic methods for their adventageous characteristics which enable them to become final leak detecting methods. The problems of noise analysis, e.g. leak detection by impact sound measurements, probe characteristics, gain problems, probe selection, off-line analysis and correlation functions, types of leak noises etc. are summarized. Leak detection based on noise analysis can be installed additionally to power plants. Its maintenance and testing is simple. On the other hand, it requires special training and measuring methods. (Sz.J.)

  18. Leaking electricity in domestic appliances

    International Nuclear Information System (INIS)

    Meier, Alan; Rosen, Karen

    1999-01-01

    Many types of home electronic equipment draw electric power when switched off or not performing their principal functions. Standby power use (or ''leaking electricity'') for most appliances ranges from 1 - 20 watts. Even though standby use of each device is small, the combined standby power use of all appliances in a home can easily exceed 50 watts. Leaking electricity is already responsible for 5 to 10 percent of residential electricity use in the United States and over 10 percent in Japan. An increasing number of white goods also have standby power requirements. There is a growing international effort to limit standby power to around one watt per device. New and existing technologies are available to meet this target at little or no extra cost

  19. Recognition and management of idiopathic systemic capillary leak syndrome: an evidence-based review.

    Science.gov (United States)

    Baloch, Noor Ul-Ain; Bikak, Marvi; Rehman, Abdul; Rahman, Omar

    2018-05-01

    Idiopathic systemic capillary leak syndrome (SCLS) is a unique disorder characterized by episodes of massive systemic leak of intravascular fluid leading to volume depletion and shock. A typical attack of SCLS consists of prodromal, leak and post-leak phases. Complications, such as compartment syndrome and pulmonary edema, usually develop during the leak and post-leak phases respectively. Judicious intravenous hydration and early use of vasopressors is the cornerstone of management in such cases. Areas covered: The purpose of the present review is to provide an up-to-date, evidence-based review of our understanding of SCLS and its management in the light of currently available evidence. Idiopathic SCLS was first described in 1960 and, since then, more than 250 cases have been reported. A large number of cases have been reported over the past one decade, most likely due to improved recognition. In the acute care setting, most patients with SCLS are managed as per the Surviving Sepsis guidelines and receive aggressive volume resuscitation - which is not the optimal management strategy for such patients. There is a need to raise awareness amongst physicians and clinicians in order to improve recognition of this disorder and ensure its appropriate management.

  20. Leak testing. Environment and workplaces

    International Nuclear Information System (INIS)

    1984-01-01

    Workplaces specified for leak testing are divided into clean workplaces of the 1st degree, clean workplaces of the second degree, clean workplaces of the third degree and semi-clean workplaces. Clean workplaces are further subdivided into permanent and temporary workplaces. For all said types of workplaces the standard sets the following provisions: basic equipment, machines and instrumentation, permitted and prohibited working activities and principles for maintenance and inspection. (E.S.)

  1. Hydrogen Leak Detection Sensor Database

    Science.gov (United States)

    Baker, Barton D.

    2010-01-01

    This slide presentation reviews the characteristics of the Hydrogen Sensor database. The database is the result of NASA's continuing interest in and improvement of its ability to detect and assess gas leaks in space applications. The database specifics and a snapshot of an entry in the database are reviewed. Attempts were made to determine the applicability of each of the 65 sensors for ground and/or vehicle use.

  2. Repair of EL4 leaks

    International Nuclear Information System (INIS)

    1985-03-01

    The reactor shutdown was decided on the 15th of November 1984, because the evolution of the carbon dioxide quantity in the helium blanket of the heavy water. Leaks have been localized on three different channels. Repairs have been made in hard conditions taking into account the reactor state (materials strongly irradiated). The restart has been authorized on the 24th of January 1985 [fr

  3. Development of sodium leak detectors for PFBR

    International Nuclear Information System (INIS)

    Sylvia, J.I.; Rao, P. Vijayamohana; Babu, B.; Madhusoodanan, K.; Rajan, K.K.

    2012-01-01

    Highlights: ► Sodium leak detection system developed for PFBR using diverse principle. ► Miniature, remotely locatable diverse leak detector developed for Main Vessel. ► Mutual inductance type leak detectors designed and adapted for different locations. ► Sodium Ionisation detectors used for area monitoring. ► Crosswire type leak detector designed, developed and tested. - Abstract: The 500 MWe Prototype Fast Breeder Reactor (PFBR) is under advanced stage of construction at Kalpakkam near Chennai in India. The wide and high operating temperature, highly chemically active nature of sodium and its reaction with air make the sodium instrumentation complex over the conventional instrumentation. Over the years, traditional instruments such as wire type leak detectors, spark plug type leak detectors were developed and used in different sodium systems. The redundant and diverse leak detection method calls for development of special instrumentation for sodium systems which include sodium ionization (leak) detector for detecting minute sodium leak in addition to those systems based on mutual inductance principle. For detection of sodium leak from reactor Main Vessel (MV), diverse methods are used such as miniature, remotely locatable, Mutual Inductance type Leak Detector(MILD) and specially modified spark plug type leak detector. The design of MILD is suitably modified for detecting leak in double wall pipes and Diverse Safety Rod drive Mechanism (DSRDM). Steam/water leak in steam generator produces hydrogen and leads to high pressure and temperature in the system. Rupture disc is used as a safety device which punctures itself due to sudden pressure rise. To detect the discharge of sodium and its reaction products at the downstream of the rupture disc due to bursting of the rupture disc, cross wire type leak detector has been designed, developed and tested. The selection of the leak detection system depends on the location where leak has to be detected. This paper

  4. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  5. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  6. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  7. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  8. Leak detection capability in CANDU reactors

    International Nuclear Information System (INIS)

    Azer, N.; Barber, D.H.; Boucher, P.J.

    1997-01-01

    This paper addresses the moisture leak detection capability of Ontario Hydro CANDU reactors which has been demonstrated by performing tests on the reactor. The tests confirmed the response of the annulus gas system (AGS) to the presence of moisture injected to simulate a pressure tube leak and also confirmed the dew point response assumed in leak before break assessments. The tests were performed on Bruce A Unit 4 by injecting known and controlled rates of heavy water vapor. To avoid condensation during test conditions, the amount of moisture which could be injected was small (2-3.5 g/hr). The test response demonstrated that the AGS is capable of detecting and annunciating small leaks. Thus confidence is provided that it would alarm for a growing pressure tube leak where the leak rate is expected to increase to kg/hr rapidly. The measured dew point response was close to that predicted by analysis

  9. Leak detection capability in CANDU reactors

    Energy Technology Data Exchange (ETDEWEB)

    Azer, N.; Barber, D.H.; Boucher, P.J. [and others

    1997-04-01

    This paper addresses the moisture leak detection capability of Ontario Hydro CANDU reactors which has been demonstrated by performing tests on the reactor. The tests confirmed the response of the annulus gas system (AGS) to the presence of moisture injected to simulate a pressure tube leak and also confirmed the dew point response assumed in leak before break assessments. The tests were performed on Bruce A Unit 4 by injecting known and controlled rates of heavy water vapor. To avoid condensation during test conditions, the amount of moisture which could be injected was small (2-3.5 g/hr). The test response demonstrated that the AGS is capable of detecting and annunciating small leaks. Thus confidence is provided that it would alarm for a growing pressure tube leak where the leak rate is expected to increase to kg/hr rapidly. The measured dew point response was close to that predicted by analysis.

  10. Acoustic leak detection of LMFBR steam generator

    International Nuclear Information System (INIS)

    Kumagai, Hiromichi; Yoshida, Kazuo

    1993-01-01

    The development of a water leak detector with short response time for LMFBR steam generators is required to prevent the failure propagation caused by the sodium-water reaction and to maintain structural safety in steam generators. The development of an acoustic leak detector assuring short response time has attracted. The purpose of this paper is to confirm the basic detection feasibility of the active acoustic leak detector, and to investigate the leak detection method by erasing the background noise by spectrum analysis of the passive acoustic leak detector. From a comparison of the leak detection sensitivity of the active and the passive method, the active method is not influenced remarkably by the background noise, and it has possibility to detect microleakage with short response time. We anticipate a practical application of the active method in the future. (author)

  11. Paravalvular Leak in Structural Heart Disease.

    Science.gov (United States)

    Goel, Kashish; Eleid, Mackram F

    2018-03-06

    This review will summarize the growing importance of diagnosing and managing paravalvular leak associated with surgical and transcatheter valves. The burden of paravalvular leak is increasing; however, advanced imaging techniques and high degree of clinical suspicion are required for diagnosis and management. The latest data from pivotal clinical trials in the field of transcatheter aortic valve replacement suggest that any paravalvular leak greater than mild was associated with worse clinical outcomes. Percutaneous techniques for paravalvular leak closure are now the preferred approach, and surgical repair is reserved for contraindications and unsuccessful procedures. Recent data from studies evaluating paravalvular leak closure outcomes report a greater than 90% success rate with a significant improvement in patient symptoms. Paravalvular leak is a growing problem in the structural heart disease arena. Percutaneous closure is successful in more than 90% of the procedures with a low complication rate.

  12. Hermetic compartments leak-tightness enhancement

    International Nuclear Information System (INIS)

    Murani, J.

    2000-01-01

    In connection with the enhancement of the nuclear safety of the Jaslovske Bohunice V-1 NPP actions for the increase of the leak tightness are performed. The reconstruction has been done in the following directions: hermetic compartments leak tightness enhancement; air lock installation; installation of air lock in SP 4 vent system; integrated leakage rate test to hermetic compartments with leak detection. After 'major' leaks on the hermetic boundary components had been eliminated, since 1994 works on a higher qualitative level began. The essence of the works consists in the detection and identification of leaks in the structural component of the hermetic boundary during the planned refueling outages. The results of the Small Reconstruction and gradual enhancement of leak tightness are presented

  13. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  14. Benign Biliary Strictures and Leaks.

    Science.gov (United States)

    Devière, Jacques

    2015-10-01

    The major causes of benign biliary strictures include surgery, chronic pancreatitis, primary sclerosing cholangitis, and autoimmune cholangitis. Biliary leaks mainly occur after surgery and, rarely, abdominal trauma. These conditions may benefit from a nonsurgical approach in which endoscopic retrograde cholangiopancreatography (ERCP) plays a pivotal role in association with other minimally invasive approaches. This approach should be evaluated for any injury before deciding about the method for repair. ERCP, associated with peroral cholangioscopy, plays a growing role in characterizing undeterminate strictures, avoiding both unuseful major surgeries and palliative options that might compromise any further management. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. Leak detection of KNI seals

    International Nuclear Information System (INIS)

    Baranyai, G.; Peter, A.; Windberg, P.

    1990-03-01

    In Unit 3 and 4 of the Paks Nuclear Power Plant, Hungary, KNI type seals are used as lead-throughs with conical nickel sealing rings. Their failure can be critical for the operation of the reactor. An Acoustical Leak Detection System (ALDS) was constructed and tested for the operational testing of the seals. Some individual papers are presented in this collection on the calibration and testing of the ALDS intended to be placed on the top of the reactor vessels. The papers include simulation measurements of Unit 3 of NPP, laboratory experiments, evaluation of measurements, and further development needs with the ALDS. (R.P.) 50 figs.; 19 tabs

  16. Vacuum leak detector and method

    Science.gov (United States)

    Edwards, Jr., David

    1983-01-01

    Apparatus and method for detecting leakage in a vacuum system involves a moisture trap chamber connected to the vacuum system and to a pressure gauge. Moisture in the trap chamber is captured by freezing or by a moisture adsorbent to reduce the residual water vapor pressure therein to a negligible amount. The pressure gauge is then read to determine whether the vacuum system is leaky. By directing a stream of carbon dioxide or helium at potentially leaky parts of the vacuum system, the apparatus can be used with supplemental means to locate leaks.

  17. Acoustic emission leak monitoring system LMS-96

    International Nuclear Information System (INIS)

    Liska, J.; Cvrcek, M.; Mueller, L.

    1997-01-01

    On-line acoustic emission leak monitoring under industrial conditions of nuclear power plants is a problem with specific features setting specific demands on the leak monitoring system. The paper briefly reviews those problems (attenuation pattern of a real structure, acoustic background, alarm system, etc.) and the solution of some of them is discussed. Information is presented on the Acoustic Emission Leak Monitoring System LMS-96 by SKODA NUCLEAR MACHINERY and the system's function is briefly described. (author)

  18. Leak detection using structure-borne noise

    Science.gov (United States)

    Holland, Stephen D. (Inventor); Chimenti, Dale E. (Inventor); Roberts, Ronald A. (Inventor)

    2010-01-01

    A method for detection and location of air leaks in a pressure vessel, such as a spacecraft, includes sensing structure-borne ultrasound waveforms associated with turbulence caused by a leak from a plurality of sensors and cross correlating the waveforms to determine existence and location of the leak. Different configurations of sensors and corresponding methods can be used. An apparatus for performing the methods is also provided.

  19. Hepatobiliary scintigraphy in patients with bile leaks

    International Nuclear Information System (INIS)

    Carichner, S.L.; Nagle, C.E.

    1987-01-01

    Hepatobiliary scintigraphy has been recognized as a useful tool in detecting the presence and sites of bile leaks. The clinical settings in which bile leaks are likely to occur, as well as some of the scintigraphic patterns seen in patients with bile leaks, are reviewed here. Tips for technologists are offered on interventions that might enhanced the quality of information available to the nuclear physician

  20. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  1. Acoustic surveillance techniques for SGU leak monitoring

    International Nuclear Information System (INIS)

    McKnight, J.A.; Rowley, R.; Beesley, M.J.

    1990-01-01

    The paper presents a brief review of the acoustic techniques applicable to the detection of steam generator unit leaks that have been studied in the UK. Before discussion of the acoustic detection methods a reference representation of the required performance as developed in the UK is given. The conclusion is made that preliminary specification for the acoustic leak detection of sodium/water leaks in steam generating units suggests that it will be necessary to detect better than a leak rate of 3 g/s within a few seconds. 10 refs, 12 figs

  2. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  3. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  4. Study on water leak-tightness of small leaks on a 1 inch cylinder valve

    International Nuclear Information System (INIS)

    Miyazawa, T.; Kasai, Y.; Inabe, N.; Aritomi, M.

    2002-01-01

    Practical thresholds for water leak-tightness of small leaks were determined by experimentation. Measurements for small leak samples were taken of air leakage rates and water leakage rates for identical leak samples in order to identify parameters that influence water leak-tightness threshold. Four types of leaks were evaluated: a fine wire inserted in an O-ring seal, a glass capillary tube, a stainless steel orifice, and a scratched valve stem on a 1 inch UF 6 cylinder valve. Experimental results demonstrated that the key parameter for water leak-tightness is the opening size of the leak hole. The maximum allowable hole size to achieve water leak-tightness ranged from 10 to 20 μm in diameter in this study. Experimental results with 1 inch UF 6 cylinder valve samples demonstrated that the acceptance criteria for preshipment leakage test, 1x10 -3 ref-cm 3 .s -1 , as prescribed in ANSI N14.5 is an appropriate value from the point of view of water leak-tightness for enriched UF 6 packages. The mechanism of water leak-tightness is plugging by tiny particles existing in water. The water used in experiments in this study contained far fewer particles than in water assumed to be encountered under accident conditions of transport. Therefore, the water leak-tightness threshold determined in this study is a conservative value in a practical evaluation. (author)

  5. The Big Mac Attack.

    Science.gov (United States)

    Bushweller, Kevin

    1995-01-01

    Schools are increasingly turning to fast-food restaurants such as Taco Bell, McDonald's, and Pizza Hut to fill the stomachs of kids turned off by standard school lunches. Kids are delighted, but critics say fast-food infiltration of school cafeterias encourages poor nutrition. Schools might consider adopting lighter fast-food fare or starting…

  6. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  8. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  9. Summary of PWR leak detection studies

    International Nuclear Information System (INIS)

    Cho, J.H.; Elia, F.A. Jr.

    1986-01-01

    Thermal-hydraulic analysis can be used to determine the location and magnitude of leaks inside and location of leaks outside a pressurized water reactor (PWR) containment as required by plant technical specifications. The major advantage of this detection method is that it minimizes radiation exposure of maintenance personnel because most of the leak detection process is performed from the control room outside containment. Plant-specific analyses are utilized to predict change in parameters such as local dew point temperature, relative humidity, dry bulb temperature, and flow rate to sump for various leak rates and enthalpies. These parameter responses are then programmed into the plant computer and instrumentation is provided for area monitoring. The actual inputs are continuously monitored and compared to the predicted plant responses to identify the leak location and quantify the leak. This study concludes that a system that monitors dew point (or relative humidity) and dry bulb temperature changes together with the flow rate to the sump will provide the capability to both locate and quantify a leak inside a containment, while a system that monitors dew point temperature (or relative humidity) changes will provide the capability to locate a leak outside a containment

  10. ISOLDE Off-line Gas Leak Upgrade

    CERN Document Server

    Nielsen, Kristoffer Bested

    2017-01-01

    This study investigates gas injection system of the ISOLDE Off-line separator. A quadrupole mass spectrometer is used to analysis the composition of the gas. Based on these measurements a contamination of the injected gas is found and a system upgrade is purposed. Furthermore a calibration of the leak rate of the leak valve is made.

  11. Leak testing requirements at a research facility

    International Nuclear Information System (INIS)

    Conner, J.B.

    1979-01-01

    Since September, 1952, Lawrence Livermore Laboratory has conducted pioneering research in applied science. A vital part of this activity has been the development of a variety of high vacuum and ultrahigh vacuum systems. Leaks occur in everything, including vacuum systems. The mass spectrometer leak detection equipment is described

  12. Improved method of measurement for outer leak

    International Nuclear Information System (INIS)

    Xu Guang

    2012-01-01

    Pneumatic pipeline is installed for the airborne radioactivity measurement equipment, air tightness and outer leak rate are essential for the testing of the characteristics, both in the national criteria and ISO standards, an improved practical method is available for the measurement of the outer air leak rate based on the engineering experiences for the equipment acceptance and testing procedure. (authors)

  13. Capacitive system detects and locates fluid leaks

    Science.gov (United States)

    1966-01-01

    Electronic monitoring system automatically detects and locates minute leaks in seams of large fluid storage tanks and pipelines covered with thermal insulation. The system uses a capacitive tape-sensing element that is adhesively bonded over seams where fluid leaks are likely to occur.

  14. Leak detector of liquid sodium

    International Nuclear Information System (INIS)

    Himeno, Yoshiaki.

    1975-01-01

    Object: To arrange a cable core connected to a leakage current detector on the outer wall of piping for liquid sodium, devices or the like and apply a voltage to said core and outer wall to quickly and securely detect the leakage of liquid sodium. Structure: A cable, which is composed of metal coating formed of metal material (copper, steel, stainless, etc.) which is apt to be corroded by reaction products of liquid sodium with water and oxygen in air, and metal oxide (such as magnesium oxide, beryllium oxide, aluminum oxide) as an electric insulator is arranged on the outer wall of pipes or devices. In the event sodium is leaked from the pipes or devices, said metal coating and the insulator are corroded, and the leakage of sodium is sensed by a leakage current detector through the core in the cable. (Kamimura, M.)

  15. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  16. On the helium gas leak test

    International Nuclear Information System (INIS)

    Nishikawa, Akira; Ozaki, Susumu

    1975-01-01

    The helium gas leak test (Helium mass spectrometer testing) has a leak detection capacity of the highest level in practical leak tests and is going to be widely applied to high pressure vessels, atomic and vacuum equipments that require high tightness. To establish a standard test procedure several series of experiments were conducted and the results were investigated. The conclusions are summarized as follows: (1) The hood method is quantitatively the most reliable method. The leak rate obtained by tests using 100% helium concentration should be the basis of the other method of test. (2) The integrating method, bell jar method, and vacuum spray method can be considered quantitative when particular conditions are satisfied. (3) The sniffer method is not to be considered quantitive. (4) The leak rate of the hood, integrating, and bell jar methods is approximately proportional to the square of the helium partial pressure. (auth.)

  17. Leak detection for underground storage tanks

    International Nuclear Information System (INIS)

    Durgin, P.B.; Young, T.M.

    1993-01-01

    This symposium was held in New Orleans, Louisiana on January 29, 1992. The purpose of this conference was to provide a forum for exchange of state-of-the-art information on leak detection for underground storage tanks that leaked fuel. A widespread concern was protection of groundwater supplies from these leaking tanks. In some cases, the papers report on research that was conducted two or three years ago but has never been adequately directed to the underground storage tank leak-detection audience. In other cases, the papers report on the latest leak-detection research. The symposium was divided into four sessions that were entitled: Internal Monitoring; External Monitoring; Regulations and Standards; and Site and Risk Evaluation. Individual papers have been cataloged separately for inclusion in the appropriate data bases

  18. SCTI chemical leak detection test plan

    International Nuclear Information System (INIS)

    1981-01-01

    Tests will be conducted on the CRBRP prototype steam generator at SCTI to determine the effects of steam generator geometry on the response of the CRBRP chemical leak detection system to small water-to-sodium leaks in various regions of the steam generator. Specifically, small injections of hydrogen gas (simulating water leaks) will be made near the two tubesheets, and the effective transport times to the main stream exit and vent line hydrogen meters will be measured. The magnitude and time characteristics of the meters' response will also be measured. This information will be used by the Small Leak Protection Base Program (SG027) for improved predictions of meter response times and leak detection sensitivity

  19. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  20. Leak Signature Space: An Original Representation for Robust Leak Location in Water Distribution Networks

    Directory of Open Access Journals (Sweden)

    Myrna V. Casillas

    2015-03-01

    Full Text Available In this paper, an original model-based scheme for leak location using pressure sensors in water distribution networks is introduced. The proposed approach is based on a new representation called the Leak Signature Space (LSS that associates a specific signature to each leak location being minimally affected by leak magnitude. The LSS considers a linear model approximation of the relation between pressure residuals and leaks that is projected onto a selected hyperplane. This new approach allows to infer the location of a given leak by comparing the position of its signature with other leak signatures. Moreover, two ways of improving the method’s robustness are proposed. First, by associating a domain of influence to each signature and second, through a time horizon analysis. The efficiency of the method is highlighted by means of a real network using several scenarios involving different number of sensors and considering the presence of noise in the measurements.

  1. A mathematical model for leak location and leak area determination in pipeline networks

    Directory of Open Access Journals (Sweden)

    Oyedokun O.I.

    2013-01-01

    Full Text Available Prompt leak location and leak area determination in oil and gas pipeline installations is an indispensable approach to controlling petroleum products wastages in pipes. However, there is an evident lack of literature information on this subject. In this paper, we modelled leak location detection and leak area determination in pipes by applying two methodologies and gave an illustrative example using simulated data with the aid of Matlab. A comparison of these two approaches resulted in an error of 6.24%, suggesting that the closer the leak is to the measurement station, the lower will be the time interval between two successive waves that will pass through the leak and get to the measurement station. The relationship between the pipe area and coefficient of reflection is parabolic. This contribution is valuable to pipeline engineers in the economic control of leaks.

  2. Ultrasonic Detectors Safely Identify Dangerous, Costly Leaks

    Science.gov (United States)

    2013-01-01

    In 1990, NASA grounded its space shuttle fleet. The reason: leaks detected in the hydrogen fuel systems of the Space Shuttles Atlantis and Columbia. Unless the sources of the leaks could be identified and fixed, the shuttles would not be safe to fly. To help locate the existing leaks and check for others, Kennedy Space Center engineers used portable ultrasonic detectors to scan the fuel systems. As a gas or liquid escapes from a leak, the resulting turbulence creates ultrasonic noise, explains Gary Mohr, president of Elmsford, New York-based UE Systems Inc., a long-time leader in ultrasonic detector technologies. "In lay terms, the leak is like a dog whistle, and the detector is like the dog ear." Because the ultrasound emissions from a leak are highly localized, they can be used not only to identify the presence of a leak but also to help pinpoint a leak s location. The NASA engineers employed UE s detectors to examine the shuttle fuel tanks and solid rocket boosters, but encountered difficulty with the devices limited range-certain areas of the shuttle proved difficult or unsafe to scan up close. To remedy the problem, the engineers created a long-range attachment for the detectors, similar to "a zoom lens on a camera," Mohr says. "If you are on the ground, and the leak is 50 feet away, the detector would now give you the same impression as if you were only 25 feet away." The enhancement also had the effect of reducing background noise, allowing for a clearer, more precise detection of a leak s location.

  3. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

    DEFF Research Database (Denmark)

    Jiang, Lijun; Meng, Weizhi; Wang, Michael Yu

    2017-01-01

    ) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector...... that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500...... participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging...

  4. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  5. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  6. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  7. Imaging review of cerebrospinal fluid leaks.

    Science.gov (United States)

    Vemuri, Naga V; Karanam, Lakshmi S P; Manchikanti, Venkatesh; Dandamudi, Srinivas; Puvvada, Sampath K; Vemuri, Vineet K

    2017-01-01

    Cerebrospinal fluid (CSF) leak occurs due to a defect in the dura and skull base. Trauma remains the most common cause of CSF leak; however, a significant number of cases are iatrogenic, and result from a complication of functional endoscopic sinus surgery (FESS). Early diagnosis of CSF leak is of paramount importance to prevent life-threatening complications such as brain abscess and meningitis. Imaging plays a crucial role in the detection and characterization of CSF leaks. Three-dimensional, isotropic, high resolution computed tomography (HRCT) accurately detects the site and size of the bony defect. CT cisternography, though invasive, helps accurately identify the site of CSF leak, especially in the presence of multiple bony defects. Magnetic resonance imaging (MRI) accurately detects CSF leaks and associated complications such as the encephaloceles and meningoceles. In this review, we emphasize the importance and usefulness of 3D T2 DRIVE MR cisternography in localizing CSF leaks. This sequence has the advantages of effective bone and fat suppression, decreased artefacts, faster acquisition times, three-dimensional capability, y and high spatial resolution in addition to providing very bright signal from the CSF.

  8. Imaging review of cerebrospinal fluid leaks

    Directory of Open Access Journals (Sweden)

    Naga V Vemuri

    2017-01-01

    Full Text Available Cerebrospinal fluid (CSF leak occurs due to a defect in the dura and skull base. Trauma remains the most common cause of CSF leak; however, a significant number of cases are iatrogenic, and result from a complication of functional endoscopic sinus surgery (FESS. Early diagnosis of CSF leak is of paramount importance to prevent life-threatening complications such as brain abscess and meningitis. Imaging plays a crucial role in the detection and characterization of CSF leaks. Three-dimensional, isotropic, high resolution computed tomography (HRCT accurately detects the site and size of the bony defect. CT cisternography, though invasive, helps accurately identify the site of CSF leak, especially in the presence of multiple bony defects. Magnetic resonance imaging (MRI accurately detects CSF leaks and associated complications such as the encephaloceles and meningoceles. In this review, we emphasize the importance and usefulness of 3D T2 DRIVE MR cisternography in localizing CSF leaks. This sequence has the advantages of effective bone and fat suppression, decreased artefacts, faster acquisition times, three-dimensional capability, y and high spatial resolution in addition to providing very bright signal from the CSF.

  9. Successful Endoscopic Therapy of Traumatic Bile Leaks

    Directory of Open Access Journals (Sweden)

    Matthew P. Spinn

    2013-02-01

    Full Text Available Traumatic bile leaks often result in high morbidity and prolonged hospital stay that requires multimodality management. Data on endoscopic management of traumatic bile leaks are scarce. Our study objective was to evaluate the efficacy of the endoscopic management of a traumatic bile leak. We performed a retrospective case review of patients who were referred for endoscopic retrograde cholangiopancreatography (ERCP after traumatic bile duct injury secondary to blunt (motor vehicle accident or penetrating (gunshot trauma for management of bile leaks at our tertiary academic referral center. Fourteen patients underwent ERCP for the management of a traumatic bile leak over a 5-year period. The etiology included blunt trauma from motor vehicle accident in 8 patients, motorcycle accident in 3 patients and penetrating injury from a gunshot wound in 3 patients. Liver injuries were grade III in 1 patient, grade IV in 10 patients, and grade V in 3 patients. All patients were treated by biliary stent placement, and the outcome was successful in 14 of 14 cases (100%. The mean duration of follow-up was 85.6 days (range 54-175 days. There were no ERCP-related complications. In our case review, endoscopic management with endobiliary stent placement was found to be successful and resulted in resolution of the bile leak in all 14 patients. Based on our study results, ERCP should be considered as first-line therapy in the management of traumatic bile leaks.

  10. Pipeline leak detection using volatile tracers

    International Nuclear Information System (INIS)

    Thompson, G.M.; Golding, R.D.

    1993-01-01

    A method of leak detection for underground storage tanks and pipelines adds volatile tracers to the products in the tanks and analyzes the surrounding shallow soil gases for tracer vapors. This method has several advantages: the success of the test is not limited by the size and structural design of the vessels, tanks can be tested at any fill level without taking the tank out of service, the location of a leak along a pipeline is clearly marked by the location of the tracer, and liquid leaks as small as 0.2 liters per hour (lph) can be detected. A limitation is: the backfill material must have some degree of air permeability in the zone above the water table. Several field tests document the success achieved using this method. A tracer leak detection system was installed at Homestead AFB after several other testing methods failed to locate a leak at a valve pit location along approximately 4 kilometers of fuel transfer piping. The leak was detected to the side of the valve pit at a depth of approximately 2.5 meters below the ground surface. Another installation of Edwards AFB involved the collection of 415 soil gas samples along approximately 3,050 meters of 15.25-centimeter fiberglass pipeline. Fourteen separate leaks were detected

  11. Vacuum leak test technique of JT-60

    International Nuclear Information System (INIS)

    Kaminaga, Atsushi; Arai, Takashi; Kodama, Kozo; Sasaki, Noboru; Saidoh, Masahiro

    1998-01-01

    Since a vacuum vessel of JT-60 is very large (167 m 3 ) and is combined with many components, such as magnetic coils, neutral beam injection systems and RF heating systems, etc., the position of leak testing exceeds 700. The two kind of techniques for vacuum leak test used in JT-60 has been described. Firstly the probe helium gas can be fed remotely in the three-dimensionally sectioned 54 regions of the JT-60 torus. The leak test was very rapidly performed by using this method. Secondly the helium detector system has been modified by the additional installation of the cryopump, which reduced the background level of the deuterium gas. The sensitivity of vacuum leak test with the cryopump was two orders of magnitude larger than that of without it. The examples of the performed vacuum leak test are stated. The vacuum leaks during experiments were 9 times. They were caused by thermal strain and plasma discharge. The vacuum leaks just after maintenance are 36 times which mainly caused by mis-installation. (author)

  12. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  13. Transient leak detection in crude oil pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Beushausen, R.; Tornow, S.; Borchers, H. [Nord-West Oelleitung, Wilhelmshaven (Germany); Murphy, K.; Zhang, J. [Atmos International Ltd., Manchester (United Kingdom)

    2004-07-01

    Nord-West Oelleitung (NWO) operates 2 crude oil pipelines from Wilhemshaven to Koln and Hamburg respectively. German regulations for transporting flammable substances stipulate that 2 independent continuously working procedures be used to detect leaks. Leak detection pigs are used routinely to complement the surveillance system. This paper described the specific issues of transient leak detection in crude oil pipelines. It was noted that traditional methods have failed to detect leaks that occur immediately after pumps are turned on or off because the pressure wave generated by the transient dominates the pressure wave that results from the leak. Frequent operational changes in a pipeline are often accompanied by an increased number of false alarms and failure to detect leaks due to unsteady operations. NWO therefore decided to have the Atmos statistical pipeline leak detection (SPLD) system installed on their pipelines. The key to the SPLD system is the sequential probability ratio test. Comprehensive data validation is performed following reception of pipeline data from the supervisory control and data acquisition (SCADA) system. The validated data is then used to calculate the corrected flow imbalance, which is fed into the SPRT to determine if there is an increase in the flow imbalance. Pattern recognition is then used to distinguish a leak from operational changes. The SPLD is unique because it uses 3 computational pipeline monitoring methods simultaneously, namely modified volume balance, statistical analysis, and pressure and flow monitoring. The successful installation and testing of the SPLD in 2 crude oil pipelines was described along with the main difficulties associated with transient leaks. Field results were presented for both steady-state and transient conditions. 5 refs., 2 tabs., 16 figs.

  14. Leak detection system for RBMK coolant circuit

    International Nuclear Information System (INIS)

    Cherkashov, Ju.M.; Strelkov, B.P.; Korolev, Yu.V.; Eperin, A.P.; Kozlov, E.P.; Belyanin, L.A.; Vanukov, V.N.

    1996-01-01

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab

  15. Acoustic leak detector in Monju steam generator

    International Nuclear Information System (INIS)

    Wachi, E.; Inoue, T.

    1990-01-01

    Acoustic leak detectors are equipped with the Monju steam generators for one of the R and D activities, which are the same type of the detectors developed in the PNC 50MW Steam Generator Test Facility. Although they are an additional leak detection system to the regular one in Monju SG, they would also detect the intermediate or large leaks of the SG tube failures. The extrapolation method of a background noise analysis is expected to be verified by Monju SG data. (author). 4 figs

  16. Means for preventing radioactive fluid leaking

    International Nuclear Information System (INIS)

    Akatsu, Jun-ichi.

    1975-01-01

    Object: To permit prevention of leakage of radioactive fluid from line and valve leak sections while also recovering the liquid by producing a vacuum state in a leak-off line by means of a water ejector. Structure: A portion of the water from a condenser is forced by a condensed water pump through a water ejector tank to a recovery tank while controlling an orifice and valve, whereby a vacuum state is produced in the leak-off line to withdraw the leakage fluid. (Kamimura, M.)

  17. Leak detection system for RBMK coolant circuit

    Energy Technology Data Exchange (ETDEWEB)

    Cherkashov, Ju M; Strelkov, B P; Korolev, Yu V; Eperin, A P; Kozlov, E P; Belyanin, L A; Vanukov, V N [Leningrad Nuclear Power Plant, Leningrad (Russian Federation). Research and Development Inst. of Power Engineering

    1997-12-31

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab.

  18. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  19. The leak microstructure, preliminary results

    International Nuclear Information System (INIS)

    Lombardi, M.

    1997-01-01

    The leak microstructure, a new type of element for position-sensitive proportional gas counter, is introduced. For every single detected ionizing radiation it gives a pair of ''induced'' charges of the same quantity (pulses of the same amplitude), of opposite sign, with the same collection time and essentially in time coincidence, that are proportional to the collected primary ionization. A gas multiplication up to 1.5 x 10 5 was achieved. The complete absence of insulating materials in the active volume of this microstructure enables to avoid problems of charging-up and makes its behaviour stable and repeatable. By using the charge-pair generated, it allows the development of a position-sensitive detecting board with a two-dimensional read-out. Between the two external surfaces of this board it is possible to insert an intermediate third conducting layer which reduces (or practically suppresses) the capacitive cross-talk between the X and Y read-out strip systems. Furthermore, this intermediate layer can give a very fast trigger to coordinate the charge-pair and to govern the data acquisition system. By reading every strip separately it is possible to resolve the multi hit problem in two-dimensions. Using isobutane as the gas, an energy resolution of about 8% FWHM was recorded with α-particles from an 241 Am source. In isobutane gas, X-rays from a 55 Fe source and β-particles from a 14 C source were also detected. (orig.)

  20. Assessment and Intervention for Academic Task Attack Strategy Competencies

    Science.gov (United States)

    Busse, R. T.; Lee, Charlene

    2015-01-01

    Many students who underachieve in schools may not be learning as effectively as they could. Direct assessments such as the Academic Competence Evaluation Scales (ACES), School Motivation and Learning Strategies Inventory (SMALSI), and the Academic Task Attack Checklist System (ATACS) can be used to evaluate students' knowledge and use of…

  1. Endoscopic management of bile leaks after laparoscopic ...

    African Journals Online (AJOL)

    Endoscopic management of bile leaks after laparoscopic cholecystectomy. ... endoscopic management at a median of 12 days (range 2 - 104 days) after surgery. Presenting features included intra-abdominal collections with pain in 58 cases ...

  2. Evaluation of leak rate by EPRI code

    International Nuclear Information System (INIS)

    Isozaki, Toshikuni; Hashiguchi, Issei; Kato, Kiyoshi; Miyazono, Shohachiro

    1987-08-01

    From 1987, a research on the leak rate from a cracked pipe under BWR or PWR operating condition is going to be carried out at the authors' laboratory. This report describes the computed results by EPRI's leak rate code which was mounted on JAERI FACOM-M380 machine. Henry's critical flow model is used in this program. For the planning of an experimental research, the leak rate from a crack under BWR or PWR operating condition is computed, varying a crack length 2c, crack opening diameter COD and pipe diameter. The COD value under which the minimum detectable leak rate of 5 gpm is given is 0.22 mm or 0.21 mm under the BWR or PWR condition with 2c = 100 mm and 16B pipe geometry. The entire lists are shown in the appendix. (author)

  3. The new CSA standard for leak detection

    Energy Technology Data Exchange (ETDEWEB)

    Pietsch, Ulli [TAU, Edmonton, Alberta, (Canada); Scott, Don [TransCanada Pipelines, Edmonton, Alberta, (Canada)

    2010-07-01

    Standards need to be updated regularly to reflect current technology and industry practices. This paper describes the new Canadian Standards Association (CSA) for leak detection called Recommended Practice for Liquid Hydrocarbon Pipeline System Leak Detection, Annex E, which can be found in the CSA Z662 Oil and Gas Pipeline Systems standard. The CSA formed a task force of industry experts and regulators for a period of 18 months to draft the new standards. Several comparisons were made with the American Petroleum Institute (API) recommended practice API 1130. This new version introduces and defines the terms, critical instrument, critical process and dependent instrument. The most significant improvement made by the new Annex E is the new requirement that an operating company must develop a leak detection strategy. The writing of a leak detection manual is given high priority. The use of both Annex E and API 1130 is recommended.

  4. Postoperative ascitic leaks: the ongoing challenge.

    Science.gov (United States)

    Rosemurgy, A S; Statman, R C; Murphy, C G; Albrink, M H; McAllister, E W

    1992-06-01

    The leak of ascitic fluid from surgical incisions is thought to be associated with a very high mortality rate. There have been few reports, however, focusing on the clinical characteristics, management, or mortality rates of this condition. During a 10-year period, 18 patients with postoperative ascitic fluid leaks were treated. All patients had ascites before surgery and all had liver disease; in 13 of the 18 patients alcoholic liver disease was the cause of ascites. Ten of the 18 patients died (56%). Midline incisions were more often associated with recalcitrant leaks and fatal complications than were transverse incisions. Early consideration of fascial dehiscence and prompt repair is emphasized. The most effective predictor of survival was cessation of the leak.

  5. Helium leak testing the Westinghouse LCP coil

    International Nuclear Information System (INIS)

    Merritt, P.A.; Attaar, M.H.; Hordubay, T.D.

    1983-01-01

    The tests, equipment, and techniques used to check the Westinghouse LCP coil for coolant flow path integrity and helium leakage are unique in terms of test sensitivity and application. This paper will discuss the various types of helium leak testing done on the LCP coil as it enters different stages of manufacture. The emphasis will be on the degree of test sensitivity achieved under shop conditions, and what equipment, techniques and tooling are required to achieve this sensitivity (5.9 x 10 -8 scc/sec). Other topics that will be discussed are helium flow and pressure drop testing which is used to detect any restrictions in the flow paths, and the LCP final acceptance test which is the final leak test performed on the coil prior to its being sent for testing. The overall allowable leak rate for this coil is 5 x 10 -6 scc/sec. A general evaluation of helium leak testing experience are included

  6. Leak Detectives Saving Money, Water in Virginia

    Science.gov (United States)

    “Circuit riders” from the Virginia Rural Water Association (VRWA) are traveling to small communities across the Commonwealth using special equipment financed by EPA to locate expensive and wasteful leaks in drinking water distribution systems.

  7. Acoustic leak detection in piping systems, 4

    International Nuclear Information System (INIS)

    Kitajima, Akira; Naohara, Nobuyuki; Aihara, Akihiko

    1983-01-01

    To monitor a high-pressure piping of nuclear power plants, a possibility of acoustic leak detection method has been experimentally studied in practical field tests and laboratory tests. Characteristics of background noise in field test and the results of experiment are summarized as follows: (1) The level of background noise in primary loop (PWR) was almost constant under actual plant operation. But it is possible that it rises at the condition of the pressure in primary loop. (2) Based on many experience of laboratory tests and practical field tests. The leak monitoring system for practical field was designed and developed. To improve the reliability, a judgment of leak on this system is used three factors of noise level, duration time of phenomena and frequency spectrum of noise signal emitted from the leak point. (author)

  8. Acoustic leak detection in nuclear power plants

    International Nuclear Information System (INIS)

    McElroy, J.W.

    1986-01-01

    For several years now, utilities have been utilizing acoustic leak detection methods as an operating tool in their nuclear power stations. The purpose for using the leak detection system at the various stations vary from safety, ALARA, improved operations, preventive maintenance, or increased plant availability. This paper describes the various acoustic techniques and their application. The techniques are divided into three categories: specific component leakage, intersystem leakage, and pipe through-wall crack leakage. The paper addresses each category in terms of motivation to monitor, method of application and operation, and benefits to be gained. Current requirements are reviewed and analyzed with respect to the acoustic techniques. The paper shows how acoustic leak detection is one of the most effective leak detection tools available. 9 figures, 1 table

  9. Leaking Underground Storage Tank Sites in Iowa

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — Leaking Underground Storage Tank (LUST) sites where petroleum contamination has been found. There may be more than one LUST site per UST site.

  10. Routine intraoperative leak testing for sleeve gastrectomy: is the leak test full of hot air?

    Science.gov (United States)

    Bingham, Jason; Lallemand, Michael; Barron, Morgan; Kuckelman, John; Carter, Preston; Blair, Kelly; Martin, Matthew

    2016-05-01

    Staple line leak after sleeve gastrectomy (SG) is a rare but dreaded complication with a reported incidence of 0% to 8%. Many surgeons routinely test the staple line with an intraoperative leak test (IOLT), but there is little evidence to validate this practice. In fact, there is a theoretical concern that the leak test may weaken the staple line and increase the risk of a postop leak. Retrospective review of all SGs performed over a 7-year period was conducted. Cases were grouped by whether an IOLT was performed, and compared for the incidence of postop staple line leaks. The ability of the IOLT for identifying a staple line defect and for predicting a postoperative leak was analyzed. Five hundred forty-two SGs were performed between 2007 and 2014. Thirteen patients (2.4%) developed a postop staple line leak. The majority of patients (n = 494, 91%) received an IOLT, including all 13 patients (100%) who developed a subsequent clinical leak. There were no (0%) positive IOLTs and no additional interventions were performed based on the IOLT. The IOLT sensitivity and positive predictive value were both 0%. There was a trend, although not significant, to increase leak rates when a routine IOLT was performed vs no routine IOLT (2.6% vs 0%, P = .6). The performance of routine IOLT after SG provided no actionable information, and was negative in all patients who developed a postoperative leak. The routine use of an IOLT did not reduce the incidence of postop leak, and in fact was associated with a higher leak rate after SG. Published by Elsevier Inc.

  11. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  12. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  13. Cable-Based Water Leak Detection Technology

    OpenAIRE

    ECT Team, Purdue

    2007-01-01

    Water leaks can be considered as a serious problem from many sources such as water supply and return chains, air conditioning units, cold-water chillers, clogged drains, damaged skylights or windows, or even construction errors. The new water leak detection technologies can provide significant advantages in cost, reliability, and easy adoption have continued since the traditional technology mainly focusing on a spot detector revealed several limitations.

  14. Evaluation of pipeline leak detection systems

    International Nuclear Information System (INIS)

    Glauz, W.D.; Flora, J.D.; Hennon, G.J.

    1993-01-01

    Leaking underground storage tank system presents an environmental concern and a potential health hazard. It is well known that leaks in the piping associated with these systems account for a sizeable fraction of the leaks. EPA has established performance standards for pipeline leak detection systems, and published a document presenting test protocols for evaluating these systems against the standards. This paper discusses a number of facets and important features of evaluating such systems, and presents results from tests of several systems. The importance of temperature differences between the ground and the product in the line is shown both in theory and with test data. The impact of the amount of soil moisture present is addressed, along with the effect of frozen soil. These features are addressed both for line tightness test systems, which must detect leaks of 0.10 gal/h (0.38 L/h) at 150% of normal line pressure, or 0.20 gal/h (0.76 L/h) at normal line pressure, and for automatic line leak detectors that must detect leaks of 3 gal/h (11 L/h) at 10 psi (69 kPa) within an hour of the occurrence of the leak. This paper also addresses some statistical aspects of the evaluation of these systems. Reasons for keeping the evaluation process ''blind'' to the evaluated company are given, along with methods for assuring that the tests are blind. Most importantly, a test procedure is presented for evaluating systems that report a flow rate (not just a pass/fail decision) that is much more efficient than the procedure presented in the EPA protocol, and is just as stringent

  15. Detection of primary coolant leaks in NPP

    International Nuclear Information System (INIS)

    Slavov, S.; Bakalov, I.; Vassilev, H.

    2001-01-01

    The thermo-hydraulic analyses of the SG box behaviour of Kozloduy NPP units 3 and 4 in case of small primary circuit leaks and during normal operation of the existing ventilation systems in order to determine the detectable leakages from the primary circuit by analysing different parameters used for the purposes of 'Leak before break' concept, performed by ENPRO Consult Ltd. are presented. The following methods for leak detection: measurement of relative air humidity in SG box (can be used for detection of leaks with flow rate 3.78 l/min within one hour at ambient parameters - temperature 40 0 - 60 0 C and relative humidity form 30% to 60%); measurement of water level in SG box sumps (can not be used for reliable detection of small primary circuit leakages with flow rate about 3.78 l/min); measurement of gaseous radioactivity in SG box( can be used as a general global indication for detection of small leakages from the primary circuit); measurement of condensate flow after the air coolers of P-1 venting system (can be used for primary circuit leak detection) are considered. For determination of the confinement behaviour, a model used with computer code MELCOR has been developed by ENPRO Consult Ltd. A brief summary based on the capabilities of the different methods of leak detection, from the point of view of the applicability of a particular method is given. For both Units 3 and 4 of Kozloduy NPP a qualified complex system for small leak detection is planned to be constructed. Such a system has to unite the following systems: acoustic system for leak detection 'ALUS'; system for control of the tightness of the main primary circuit pipelines by monitoring the local humidity; system for primary circuit leakage detection by measuring condensate run-off in collecting tank after ventilation system P-1 air coolers

  16. Leak of draft report on radioactive waste

    International Nuclear Information System (INIS)

    1986-01-01

    The Environment Committee's second report discusses the leak of the draft report on radioactive waste. The circumstances of the leak are discussed and ''The Times'' and ''The Guardian'' articles of December 1985 are printed in full, as are the letter from the Chairman of the environmental committee to the members and their replies. The letters from Mr John Large of Large and Associates to the Chairman of the Environment Committee, and Mr Large's correspondence with Greenpeace are also printed. (UK)

  17. Leak detection systems for VVER units based on leak before break concept. PowerPoint presentation

    International Nuclear Information System (INIS)

    Matal, Oldrich

    2010-01-01

    To comply with international standards, independent leak monitoring systems should be installed based on the monitoring of different physical parameters capable of detecting any small leak within one hour from the start of the leak. Such leak detection systems are based mainly on acoustic emission monitoring, humidity monitoring and/or radiation monitoring. Advanced systems integrate the monitoring of different physical parameters into one integrated leak detection system. The Integrated Leak Detection System (ILDS) for NPP Metsamor is described. This system consists of three independent leak detection subsystems, viz. LEMOP (LEak MOnitoring of Pipelines) based on acoustic emission monitoring, HUMOS (HUmidity MOnitoring System) based on humidity monitoring, and RAMOS (RAdiation MOnitoring System) based on radiation monitoring). The Integrated Leak Detection System (ILDS) collects data from the three systems, performs data evaluation, data storage, generates alarms and provides a user interface for the whole system including all subsystems. An example of DiagAssist user interface in the ILDS system in the pictorial form. (P.A.)

  18. Wireless sensor network for sodium leak detection

    International Nuclear Information System (INIS)

    Satya Murty, S.A.V.; Raj, Baldev; Sivalingam, Krishna M.; Ebenezer, Jemimah; Chandran, T.; Shanmugavel, M.; Rajan, K.K.

    2012-01-01

    Highlights: ► Early detection of sodium leak is mandatory in any reactor handling liquid sodium. ► Wireless sensor networking technology has been introduced for detecting sodium leak. ► We designed and developed a wireless sensor node in-house. ► We deployed a pilot wireless sensor network for handling nine sodium leak signals. - Abstract: To study the mechanical properties of Prototype Fast Breeder Reactor component materials under the influence of sodium, the IN Sodium Test (INSOT) facility has been erected and commissioned at Indira Gandhi Centre for Atomic Research. Sodium reacts violently with air/moisture leading to fire. Hence early detection of sodium leak if any is mandatory for such plants and almost 140 sodium leak detectors are placed throughout the loop. All these detectors are wired to the control room for data collection and monitoring. To reduce the cost, space and maintenance that are involved in cabling, the wireless sensor networking technology has been introduced in the sodium leak detection system of INSOT. This paper describes about the deployment details of the pilot wireless sensor network and the measures taken for the successful deployment.

  19. Helium leak testing of scanning electron microscope

    International Nuclear Information System (INIS)

    Ahmad, Anis; Tripathi, S.K.; Mukherjee, D.

    2015-01-01

    Scanning Electron Microscope (SEM) is a specialized electron-optical device which is used for imaging of miniscule features on topography of material specimens. Conventional SEMs used finely focused high energy (about 30 KeV) electron beam probes of diameter of about 10nm for imaging of solid conducting specimens. Vacuum of the order of 10"-"5 Torr is prerequisite for conventional Tungsten filament type SEMs. One such SEM was received from one of our laboratory in BARC with a major leak owing to persisting poor vacuum condition despite continuous pumping for several hours. He-Leak Detection of the SEM was carried out at AFD using vacuum spray Technique and various potential leak joints numbering more than fifty were helium leak tested. The major leak was detected in the TMP damper bellow. The part was later replaced and the repeat helium leak testing of the system was carried out using vacuum spray technique. The vacuum in SEM is achieved is better than 10"-"5 torr and system is now working satisfactorily. (author)

  20. Leak detector for reactor pressure vessel

    International Nuclear Information System (INIS)

    Morimoto, Mikio.

    1991-01-01

    A branched pipe is disposed to a leak off pipeline led from a flange surface which connects the main body and the upper lid of a reactor pressure vessel. An exhaust pump is disposed to the branched pipe and a moisture gage is disposed on the side of the exhaustion and a dry air supplier is connected to the branched pipe. Upon conducting a pressure-proof leak test for the reactor pressure vessel, the exhaust pump is operated and an electromagnet valve disposed at the upstream of the dry air supplier is opened and closed repeatedly. The humidity of air sucked by the exhaust pump is detected by the moisture gage. If leaks should be caused in the joining surface of the flange, leaked water is diffused as steams. Accordingly, occurrence of leak can be detected instantly based on the comparison with the moisture level of the dry air as a standard. In this way, a leak test can be conducted reliably in a short period of time with no change of for the reactor pressure container itself. (I.N.)

  1. Photojournalistic coverage of the attack against the school of Beslan in six Portuguese and Brazilian newsmagazines A cobertura fotojornalística do atentado à escola de Beslan em seis newsmagazines portuguesas e brasileiras

    Directory of Open Access Journals (Sweden)

    Maria Érica de Oliveira Lima

    2006-12-01

    Full Text Available This work describes how six Portuguese and Brazilian newsmagazines used photojournalism to cover the attack against the school of Beslan (Russia on september 2004, through a qualitative and quantitative analysis of the speech. Main conclusions: 1 Photos had been a structural element of the narrative and had contributed to support a speech of condemnation and excommunication of the terrorists; 2 Photojournalists used historically consolidated professional routines and standards, what shows that history helps to define the shape of news photos; 3 Photojournalism is as selective and biased as written journalism: shows in the same proportion that hides. O texto descreve-se como seis newsmagazines portuguesas e brasileiras cobriram fotojornalisticamente o atentado à escola de Beslan (Rússia em setembro de 2004, através de uma análise quantitativa e qualitativa do discurso. Principais conclusões: 1 As fotografias foram estruturantes da narrativa e contribuíram para suportar um discurso de condenação e excomunhão dos terroristas; 2 Os fotojornalistas recuperaram padrões históricos de abordagem da realidade, enfatizando que a história contribui para moldar a forma das fotonotícias; 3 O discurso fotojornalístico é tão selectivo e enviesado como o verbal: mostra na mesma medida em que oculta.

  2. 40 CFR 63.424 - Standards: Equipment leaks.

    Science.gov (United States)

    2010-07-01

    ....424 Standards: Equipment leaks. (a) Each owner or operator of a bulk gasoline terminal or pipeline... location of all equipment in gasoline service at the facility. (c) Each detection of a liquid or vapor leak... replacement of leaking equipment shall be completed within 15 calendar days after detection of each leak...

  3. Small leak shutdown, location, and behavior in LMFBR steam generators

    International Nuclear Information System (INIS)

    Sandusky, D.W.

    1976-01-01

    The paper summarizes an experimental study of small leaks tested under LMFBR steam generator conditions. Defected tubes were exposed to flowing sodium and steam. The observed behavior of the defected tubes is reported along with test results of shutdown methods. Leak location methods were investigated. Methods were identified to open plugged defects for helium leak testing and detect plugged leaks by nondestructive testing

  4. 40 CFR 86.328-79 - Leak checks.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false Leak checks. 86.328-79 Section 86.328... Gasoline-Fueled and Diesel-Fueled Heavy-Duty Engines; Gaseous Exhaust Test Procedures § 86.328-79 Leak checks. (a) Vacuum side leak check. (1) Any location within the analysis system where a vacuum leak could...

  5. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  6. Field tests and commercialization of natural gas leak detectors

    Energy Technology Data Exchange (ETDEWEB)

    Choi, D S; Jeon, J S; Kim, K D; Cho, Y A [R and D Center, Korea Gas Corporation, Ansan (Korea)

    1999-09-01

    Objectives - (1) fields test of industrial gas leak detection monitoring system. (2) commericialization of residential gas leak detector. Contents - (1) five sets of gas leak detection monitoring system were installed at natural gas transmition facilities and tested long term stability and their performance. (2) improved residential gas leak detector was commercialised. Expected benefits and application fields - (1) contribution to the improvement of domestic gas sensor technology. (2) localization of fabrication technology for gas leak detectors. 23 refs., 126 figs., 37 tabs.

  7. Remote leak localization approach for fusion machines

    International Nuclear Information System (INIS)

    Durocher, Au.; Bruno, V.; Chantant, M.; Gargiulo, L.; Gherman, T.; Hatchressian, J.-C.; Houry, M.; Le, R.; Mouyon, D.

    2013-01-01

    Highlights: ► Description of leaks issue. ► Selection of leak localization concepts. ► Qualification of leak localization concepts. -- Abstract: Fusion machine operation requires high-vacuum conditions and does not tolerate water or gas leak in the vacuum vessels, even if they are micrometric. Tore Supra, as a fully actively cooled tokamak, has got a large leak management experience; 34 water leaks occurred since the beginning of its operation in 1988. To handle this issue, after preliminary machine protection phases, the current process for leak localization is based on water or helium pressurization network by network. It generally allows the identification of a set of components where the leakage element is located. However, the unique background of CEA-IRFM laboratory points needs of accuracy and promptness out in the leak localization process. Moreover, in-vessel interventions have to be performed trying to minimize time and risks for the persons. They are linked to access conditions, radioactivity, tracer gas high pressure and vessel conditioning. Remote operation will be one of the ways to improve these points on future fusion machines. In this case, leak sensors would have to be light weight devices in order to be integrated on a carrier or to be located outside with a sniffing process set up. A leak localization program is on-going at CEA-IRFM Laboratory with the first goal of identifying and characterizing relevant concepts to localize helium or water leaks on ITER. In the same time, CEA has developed robotic carrier for effective in-vessel intervention in a hostile environment. Three major tests campaigns with the goal to identify leak sensors have been achieved on several CEA test-beds since 2010. Very promising results have been obtained: relevant scenario of leak localization performed, concepts tested in a high volume test-bed called TITAN, and, in several conditions of pressure and temperature (ultrahigh vacuum to atmospheric pressure and 20

  8. Remote leak localization approach for fusion machines

    Energy Technology Data Exchange (ETDEWEB)

    Durocher, Au., E-mail: aurelien.durocher@cea.fr [CEA-IRFM, F-13108 Saint Paul-Lez-Durance (France); Bruno, V.; Chantant, M.; Gargiulo, L. [CEA-IRFM, F-13108 Saint Paul-Lez-Durance (France); Gherman, T. [Floralis UJF Filiale, F-38610 Gières (France); Hatchressian, J.-C.; Houry, M.; Le, R.; Mouyon, D. [CEA-IRFM, F-13108 Saint Paul-Lez-Durance (France)

    2013-10-15

    Highlights: ► Description of leaks issue. ► Selection of leak localization concepts. ► Qualification of leak localization concepts. -- Abstract: Fusion machine operation requires high-vacuum conditions and does not tolerate water or gas leak in the vacuum vessels, even if they are micrometric. Tore Supra, as a fully actively cooled tokamak, has got a large leak management experience; 34 water leaks occurred since the beginning of its operation in 1988. To handle this issue, after preliminary machine protection phases, the current process for leak localization is based on water or helium pressurization network by network. It generally allows the identification of a set of components where the leakage element is located. However, the unique background of CEA-IRFM laboratory points needs of accuracy and promptness out in the leak localization process. Moreover, in-vessel interventions have to be performed trying to minimize time and risks for the persons. They are linked to access conditions, radioactivity, tracer gas high pressure and vessel conditioning. Remote operation will be one of the ways to improve these points on future fusion machines. In this case, leak sensors would have to be light weight devices in order to be integrated on a carrier or to be located outside with a sniffing process set up. A leak localization program is on-going at CEA-IRFM Laboratory with the first goal of identifying and characterizing relevant concepts to localize helium or water leaks on ITER. In the same time, CEA has developed robotic carrier for effective in-vessel intervention in a hostile environment. Three major tests campaigns with the goal to identify leak sensors have been achieved on several CEA test-beds since 2010. Very promising results have been obtained: relevant scenario of leak localization performed, concepts tested in a high volume test-bed called TITAN, and, in several conditions of pressure and temperature (ultrahigh vacuum to atmospheric pressure and 20

  9. SINGLE-SHELL TANKS LEAK INTEGRITY ELEMENTS/SX FARM LEAK CAUSES AND LOCATIONS - 12127

    Energy Technology Data Exchange (ETDEWEB)

    VENETZ TJ; WASHENFELDER D; JOHNSON J; GIRARDOT C

    2012-01-25

    Washington River Protection Solutions, LLC (WRPS) developed an enhanced single-shell tank (SST) integrity project in 2009. An expert panel on SST integrity was created to provide recommendations supporting the development of the project. One primary recommendation was to expand the leak assessment reports (substitute report or LD-1) to include leak causes and locations. The recommendation has been included in the M-045-9IF Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement) as one of four targets relating to SST leak integrity. The 241-SX Farm (SX Farm) tanks with leak losses were addressed on an individual tank basis as part of LD-1. Currently, 8 out of 23 SSTs that have been reported to having a liner leak are located in SX Farm. This percentage was the highest compared to other tank farms which is why SX Farm was analyzed first. The SX Farm is comprised of fifteen SSTs built 1953-1954. The tanks are arranged in rows of three tanks each, forming a cascade. Each of the SX Farm tanks has a nominal I-million-gal storage capacity. Of the fifteen tanks in SX Farm, an assessment reported leak losses for the following tanks: 241-SX-107, 241-SX-108, 241-SX-109, 241-SX-111, 241-SX-112, 241-SX-113, 241-SX-114 and 241-SX-115. The method used to identify leak location consisted of reviewing in-tank and ex-tank leak detection information. This provided the basic data identifying where and when the first leaks were detected. In-tank leak detection consisted of liquid level measurement that can be augmented with photographs which can provide an indication of the vertical leak location on the sidewall. Ex-tank leak detection for the leaking tanks consisted of soil radiation data from laterals and drywells near the tank. The in-tank and ex-tank leak detection can provide an indication of the possible leak location radially around and under the tank. Potential leak causes were determined using in-tank and ex-tank information that is not directly related to

  10. Single-Shell Tanks Leak Integrity Elements/ SX Farm Leak Causes and Locations - 12127

    Energy Technology Data Exchange (ETDEWEB)

    Girardot, Crystal [URS- Safety Management Solutions, Richland, Washington 99352 (United States); Harlow, Don [ELR Consulting Richland, Washington 99352 (United States); Venetz, Theodore; Washenfelder, Dennis [Washington River Protection Solutions, LLC Richland, Washington 99352 (United States); Johnson, Jeremy [U.S. Department of Energy, Office of River Protection Richland, Washington 99352 (United States)

    2012-07-01

    Washington River Protection Solutions, LLC (WRPS) developed an enhanced single-shell tank (SST) integrity project in 2009. An expert panel on SST integrity was created to provide recommendations supporting the development of the project. One primary recommendation was to expand the leak assessment reports (substitute report or LD-1) to include leak causes and locations. The recommendation has been included in the M-045-91F Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement) as one of four targets relating to SST leak integrity. The 241-SX Farm (SX Farm) tanks with leak losses were addressed on an individual tank basis as part of LD-1. Currently, 8 out of 23 SSTs that have been reported to having a liner leak are located in SX Farm. This percentage was the highest compared to other tank farms which is why SX Farm was analyzed first. The SX Farm is comprised of fifteen SSTs built 1953-1954. The tanks are arranged in rows of three tanks each, forming a cascade. Each of the SX Farm tanks has a nominal 1-million-gal storage capacity. Of the fifteen tanks in SX Farm, an assessment reported leak losses for the following tanks: 241-SX-107, 241-SX-108, 241-SX-109, 241-SX- 111, 241-SX-112, 241-SX-113, 241-SX-114 and 241-SX-115. The method used to identify leak location consisted of reviewing in-tank and ex-tank leak detection information. This provided the basic data identifying where and when the first leaks were detected. In-tank leak detection consisted of liquid level measurement that can be augmented with photographs which can provide an indication of the vertical leak location on the sidewall. Ex-tank leak detection for the leaking tanks consisted of soil radiation data from laterals and dry-wells near the tank. The in-tank and ex-tank leak detection can provide an indication of the possible leak location radially around and under the tank. Potential leak causes were determined using in-tank and ex-tank information that is not directly related to

  11. Capillary leak syndrome: etiologies, pathophysiology, and management.

    Science.gov (United States)

    Siddall, Eric; Khatri, Minesh; Radhakrishnan, Jai

    2017-07-01

    In various human diseases, an increase in capillary permeability to proteins leads to the loss of protein-rich fluid from the intravascular to the interstitial space. Although sepsis is the disease most commonly associated with this phenomenon, many other diseases can lead to a "sepsis-like" syndrome with manifestations of diffuse pitting edema, exudative serous cavity effusions, noncardiogenic pulmonary edema, hypotension, and, in some cases, hypovolemic shock with multiple-organ failure. The term capillary leak syndrome has been used to describe this constellation of disease manifestations associated with an increased capillary permeability to proteins. Diseases other than sepsis that can result in capillary leak syndrome include the idiopathic systemic capillary leak syndrome or Clarkson's disease, engraftment syndrome, differentiation syndrome, the ovarian hyperstimulation syndrome, hemophagocytic lymphohistiocytosis, viral hemorrhagic fevers, autoimmune diseases, snakebite envenomation, and ricin poisoning. Drugs including some interleukins, some monoclonal antibodies, and gemcitabine can also cause capillary leak syndrome. Acute kidney injury is commonly seen in all of these diseases. In addition to hypotension, cytokines are likely to be important in the pathophysiology of acute kidney injury in capillary leak syndrome. Fluid management is a critical part of the treatment of capillary leak syndrome; hypovolemia and hypotension can cause organ injury, whereas capillary leakage of administered fluid can worsen organ edema leading to progressive organ injury. The purpose of this article is to discuss the diseases other than sepsis that produce capillary leak and review their collective pathophysiology and treatment. Copyright © 2017 International Society of Nephrology. Published by Elsevier Inc. All rights reserved.

  12. JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones

    DEFF Research Database (Denmark)

    Meng, Weizhi; Jiang, Lijun; Wang, Yu

    2017-01-01

    Smartphones have become necessities in people' lives, so that many more public charging stations are under deployment worldwide to meet the increasing demand of phone charging (i.e., in airports, subways, shops, etc). However, this situation may expose a hole for cyber-criminals to launch various...... attacks especially charging attacks and threaten user's privacy. As an example, juice filming charging (JFC) attack is able to steal users' sensitive and private information from both Android OS and iOS devices, through automatically recording phone-screen and monitoring users' inputs during the whole...... charging period. More importantly, this attack does not need any permission or installing any pieces of apps on user's side. The rationale is that users' information can be leaked through a standard micro USB connector that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential...

  13. Practical security and privacy attacks against biometric hashing using sparse recovery

    Science.gov (United States)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  14. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  15. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  16. Operational Philosophy Concerning Manned Spacecraft Cabin Leaks

    Science.gov (United States)

    DeSimpelaere, Edward

    2011-01-01

    The last thirty years have seen the Space Shuttle as the prime United States spacecraft for manned spaceflight missions. Many lessons have been learned about spacecraft design and operation throughout these years. Over the next few decades, a large increase of manned spaceflight in the commercial sector is expected. This will result in the exposure of commercial crews and passengers to many of the same risks crews of the Space Shuttle have encountered. One of the more dire situations that can be encountered is the loss of pressure in the habitable volume of the spacecraft during on orbit operations. This is referred to as a cabin leak. This paper seeks to establish a general cabin leak response philosophy with the intent of educating future spacecraft designers and operators. After establishing a relative definition for a cabin leak, the paper covers general descriptions of detection equipment, detection methods, and general operational methods for management of a cabin leak. Subsequently, all these items are addressed from the perspective of the Space Shuttle Program, as this will be of the most value to future spacecraft due to similar operating profiles. Emphasis here is placed upon why and how these methods and philosophies have evolved to meet the Space Shuttle s needs. This includes the core ideas of: considerations of maintaining higher cabin pressures vs. lower cabin pressures, the pros and cons of a system designed to feed the leak with gas from pressurized tanks vs. using pressure suits to protect against lower cabin pressures, timeline and consumables constraints, re-entry considerations with leaks of unknown origin, and the impact the International Space Station (ISS) has had to the standard Space Shuttle cabin leak response philosophy. This last item in itself includes: procedural management differences, hardware considerations, additional capabilities due to the presence of the ISS and its resource, and ISS docking/undocking considerations with a

  17. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  18. Standard practice for leaks using ultrasonics

    CERN Document Server

    American Society for Testing and Materials. Philadelphia

    2011-01-01

    1.1 Practice A, Pressurization—This practice covers procedures for calibration of ultrasonic instruments, location, and estimated measurements of gas leakage to atmosphere by the airborne ultrasonic technique. 1.2 In general practice this should be limited to leaks detected by two classifications of instruments, Class I and Class II. Class I instruments should have a minimum detectable leak rate of 6.7 × 10−7 mol/s (1.5 × 10−2 std. cm3/s at 0°C) or more for the pressure method of gas leakage to atmosphere. Class II instruments should have a minimal detectable leak rate of 6.7 × 10−6 mol/s (1.5 × 10−1 std. cm3/s at 0°C) or more for the pressure method of gas leakage to atmosphere. Refer to Guide E432 for additional information. 1.3 Practice B, Ultrasonic Transmitter—For object under test not capable of being pressurized but capable of having ultrasonic tone placed/injected into the test area to act as an ultrasonic leak trace source. 1.3.1 This practice is limited to leaks producing leakage o...

  19. Leak processing system for valve gland portion

    International Nuclear Information System (INIS)

    Nishino, Masami

    1990-01-01

    When a process fluid for a valve to be checked is at such a normal temperature as during reactor operation, leaked fluid can be detected depending on the temperature increase accompanying the leakage. However, detection is difficult if the temperature of the process fluid for the valve to be checked is low and, if leakage is detected after the reactor start-up, repair has to be applied after the shutdown of the plant. Then, gland leak is detected by detecting the pressure instead of the temperature in the pipeline system and the leak flow rate is calculated based on the pressure. As a result, leakage is detected irrespective of the temperature of the leaked fluid and, for instance, leakage can be detected even in a case where the temperature is not high as in the case of pressure proof test for the pressure vessel before start-up. It can contribute much to the improvement of the plant operation efficiency and can determine the leak flow rate at a high accuracy. (N.H.)

  20. Recent Progress in Technology of Leak detection

    Energy Technology Data Exchange (ETDEWEB)

    Jung, H. K.; Kim, S. H.; Cho, J. W.; Joo, Y. S.; Yang, D. J

    2005-07-15

    It is very important to check for leakage points of fluids and gases on primary pressure boundary of nuclear power plants in order to maintain and manage various structures safely. Even though much investigation has been performed by a number of researchers, there are a lot of problems to detect the leakage under some areas to which people can not approach. In particular, it is certainly necessary to find the leakage point in order to repair and replace the pressure boundaries. In this report, the basic principle and application situations for the development of the leak detection system which can detect micro-leaks are introduced. As the technologies and performances of recent sensors have been improving, the application range of leak detection has been increasing steadily. Therefore the sensor technologies written in this report will be able to contribute to nuclear safety to detect the leakage rate and the leakage point with an on-line monitoring system in the near future.

  1. Location of leaks in pressurized underground pipelines

    International Nuclear Information System (INIS)

    Eckert, E.G.; Maresca, J.W. Jr.

    1993-01-01

    Millions of underground storage tanks (UST) are used to store petroleum and other chemicals. The pressurized underground pipelines associated with USTs containing petroleum motor fuels are typically 2 in. in diameter and 50 to 200 ft in length. These pipelines typically operate at pressures of 20 to 30 psi. Longer lines, with diameters up to 4 in., are found in some high-volume facilities. There are many systems that can be used to detect leaks in pressurized underground pipelines. When a leak is detected, the first step in the remediation process is to find its location. Passive-acoustic measurements, combined with advanced signal-processing techniques, provide a nondestructive method of leak location that is accurate and relatively simple, and that can be applied to a wide variety of pipelines and pipeline products

  2. Enhanced leak detection risk model development

    Energy Technology Data Exchange (ETDEWEB)

    Harron, Lorna; Barlow, Rick; Farquhar, Ted [Enbridge Pipelines Inc., Edmonton, Alberta (Canada)

    2010-07-01

    Increasing concerns and attention to pipeline safety have engaged pipeline companies and regulatory agencies to extend their approaches to pipeline integrity. The implementation of High Consequence Areas (HCAs) has especially had an impact on the development of integrity management protocols (IMPs) for pipelines. These IMPs can require that a risk based assessment of integrity issues be applied to specific HCA risk factors. This paper addresses the development of an operational risk assessment approach for pipeline leak detection requirements for HCAs. A detailed risk assessment algorithm that includes 25 risk variables and 28 consequence variables was developed for application to all HCA areas. This paper describes the consultative process that was used to workshop the development of this algorithm. Included in this description is how the process addressed various methods of leak detection across a wide variety of pipelines. The paper also looks at development challenges and future steps in applying operation risk assessment techniques to mainline leak detection risk management.

  3. Remote leak detection for the TFTR

    International Nuclear Information System (INIS)

    Walthers, C.R.

    1977-01-01

    The planned design for the TFTR (TOKAMAK Fusion Test Reactor) remote leak detection system consists of a central console which controls the application of tracer gas to possible leak areas. Seals are tested by admitting tracer gas to machined cavities on the atmospheric side of the seal. The tracer gas is brought to the seal cavity by 1 / 8 -inch diameter tubes which connect to local tracer gas/vacuum manifolds located outside the protective radiation shielding. Vacuum shell walls and welds are checked by flowing tracer gas through annular heating/cooling passages. The detector will be either an MSLD (mass spectrometer leak detector) or an RGA (residual gas analyzer), the location of which is not finalized. Feasibility tests performed and planned include response and sensitivity measurements of possible tubing/detector configurations with several tracer gases

  4. Combustion suppressing device for leaked sodium

    International Nuclear Information System (INIS)

    Ooto, Akihiro.

    1985-01-01

    Purpose: To suppress the atmospheric temperature to secure the building safety and shorten the recovery time after the leakage in a chamber for containing sodium leaked from coolant circuit equipments or pipeways of LMFBR type rector by suppressing the combustion of sodium contained in the chamber. Constitution: To the inner wall of a chamber for containing sodium handling equipments, are vertically disposed a panel having a coolant supply port at the upper portion and a coolant discharge port at the lower portion thereof and defined with a coolant flowing channel and a panel for sucking the coolant discharged from the abovementioned panel and exhausting the same externally. Further, a corrugated combustion suppressing plate having apertures for draining the condensated leaked sodium is disposed near the sodium handling equipments. If ruptures are resulted to the sodium handling equipments or pipeway, leaked sodium is passed through the drain apertures in the suppressing plate and stored at the bottom of the containing chamber. (Horiuchi, T.)

  5. Cold Leak Tests of LHC Beam Screens

    CERN Document Server

    Collomb-Patton, C; Jenninger, B; Kos, N

    2009-01-01

    In order to guide the high energy proton beams inside its two 27 km long vacuum rings, the Large Hadron Collider (LHC) at CERN, Geneva, makes use of superconducting technology to create the required magnetic fields. More than 4000 beam screens, cooled at 7 20 K, are inserted inside the 1.9 K beam vacuum tubes to intercept beam induced heat loads and to provide dynamic vacuum stability. As extremely high helium leak tightness is required, all beam screens have been leak tested under cold conditions in a dedicated test stand prior to their installation. After describing the beam screen design and its functions, this report focuses on the cold leak test sequence and discusses the results.

  6. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  7. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  8. Novel Methods of Hydrogen Leak Detection

    International Nuclear Information System (INIS)

    Pushpinder S Puri

    2006-01-01

    With the advent of the fuel cell technology and a drive for clean fuel, hydrogen gas is emerging as a leading candidate for the fuel of choice. For hydrogen to become a consumer fuel for automotive and domestic power generation, safety is paramount. It is, therefore, desired to have a method and system for hydrogen leak detection using odorant which can incorporate a uniform concentration of odorant in the hydrogen gas, when odorants are mixed in the hydrogen storage or delivery means. It is also desired to develop methods where the odorant is not added to the bulk hydrogen, keeping it free of the odorization additives. When odorants are not added to the hydrogen gas in the storage or delivery means, methods must be developed to incorporate odorant in the leaking gas so that leaks can be detected by small. Further, when odorants are not added to the stored hydrogen, it may also be desirable to observe leaks by sight by discoloration of the surface of the storage or transportation vessels. A series of novel solutions are proposed which address the issues raised above. These solutions are divided into three categories as follows: 1. Methods incorporating an odorant in the path of hydrogen leak as opposed to adding it to the hydrogen gas. 2. Methods where odorants are generated in-situ by chemical reaction with the leaking hydrogen 3. Methods of dispensing and storing odorants in high pressure hydrogen gas which release odorants to the gas at a uniform and predetermined rates. Use of one or more of the methods described here in conjunction with appropriate engineering solutions will assure the ultimate safety of hydrogen use as a commercial fuel. (authors)

  9. CT assessment of anastomotic bowel leak

    International Nuclear Information System (INIS)

    Power, N.; Atri, M.; Ryan, S.; Haddad, R.; Smith, A.

    2007-01-01

    Aim: To evaluate the predictors of clinically important gastrointestinal anastomotic leaks using multidetector computed tomography (CT). Subjects and methods: Ninety-nine patients, 73 with clinical suspicion of anastomotic bowel leak and 26 non-bowel surgery controls underwent CT to investigate postoperative sepsis. Fifty patients had undergone large bowel and 23 small bowel anastomoses. The time interval from surgery was 3-30 days (mean 10 ± 5.9 SD) for the anastomotic group and 3-40 days (mean 14 ± 11 SD) for the control group (p = 0.3). Two radiologists blinded to the final results reviewed the CT examinations in consensus and recorded the presence of peri-anastomotic air, fluid or combination of the two; distant loculated fluid or combination of fluid and air; free air or fluid; and intestinal contrast leak. Final diagnosis of clinically important anastomotic leak (CIAL) was confirmed at surgery or by chart review of predetermined clinical and laboratory criteria. Results: The prevalence of CIAL in the group undergoing CT was 31.5% (23/73). The CT examinations with documented leak were performed 5-28 (mean; 11.4 ± 6 SD) days after surgery. Nine patients required repeat operation, 10 percutaneous abscess drainage, two percutaneous drainage followed by surgery, and two prolonged antibiotic treatment and total parenteral nutrition (TPN). Of the CT features examined, only peri-anastomotic loculated fluid containing air was more frequently seen in the CIAL group as opposed to the no leak group (p = 0.04). There was no intestinal contrast leakage in this cohort. Free air was present up to 9 days and loculated air up to 26 days without CIAL. Conclusion: Most postoperative CT features overlap between patients with and without CIAL. The only feature seen statistically more frequently with CIAL is peri-anastomotic loculated fluid containing air

  10. CT assessment of anastomotic bowel leak

    Energy Technology Data Exchange (ETDEWEB)

    Power, N. [Department of Radiology, Sunnybrook Hospital, Toronto, Ontario M4N 3M5 (Canada); Atri, M. [Department of Radiology, Sunnybrook Hospital, Toronto, Ontario M4N 3M5 (Canada)]. E-mail: mostafa.atri@sw.ca; Ryan, S. [Department of Radiology, Sunnybrook Hospital, Toronto, Ontario M4N 3M5 (Canada); Haddad, R. [Department of Surgery, Sunnybrook Hospital, Toronto, Ontario M4N 3M5 (Canada); Smith, A. [Department of Surgery, Sunnybrook Hospital, Toronto, Ontario M4N 3M5 (Canada)

    2007-01-15

    Aim: To evaluate the predictors of clinically important gastrointestinal anastomotic leaks using multidetector computed tomography (CT). Subjects and methods: Ninety-nine patients, 73 with clinical suspicion of anastomotic bowel leak and 26 non-bowel surgery controls underwent CT to investigate postoperative sepsis. Fifty patients had undergone large bowel and 23 small bowel anastomoses. The time interval from surgery was 3-30 days (mean 10 {+-} 5.9 SD) for the anastomotic group and 3-40 days (mean 14 {+-} 11 SD) for the control group (p = 0.3). Two radiologists blinded to the final results reviewed the CT examinations in consensus and recorded the presence of peri-anastomotic air, fluid or combination of the two; distant loculated fluid or combination of fluid and air; free air or fluid; and intestinal contrast leak. Final diagnosis of clinically important anastomotic leak (CIAL) was confirmed at surgery or by chart review of predetermined clinical and laboratory criteria. Results: The prevalence of CIAL in the group undergoing CT was 31.5% (23/73). The CT examinations with documented leak were performed 5-28 (mean; 11.4 {+-} 6 SD) days after surgery. Nine patients required repeat operation, 10 percutaneous abscess drainage, two percutaneous drainage followed by surgery, and two prolonged antibiotic treatment and total parenteral nutrition (TPN). Of the CT features examined, only peri-anastomotic loculated fluid containing air was more frequently seen in the CIAL group as opposed to the no leak group (p = 0.04). There was no intestinal contrast leakage in this cohort. Free air was present up to 9 days and loculated air up to 26 days without CIAL. Conclusion: Most postoperative CT features overlap between patients with and without CIAL. The only feature seen statistically more frequently with CIAL is peri-anastomotic loculated fluid containing air.

  11. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  12. LMFBR steam generator leak detection development in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Magee, P M; Gerrels, E E; Greene, D A [General Electric Company, Sunnyvale, CA (United States); McKee, J [Argonne National Laboratory, Argonne, IL (United States)

    1978-10-01

    Leak detection for Liquid Metal Fast Breeder Reactor steam generators is an important economic factor in the shutdown, repair and restart of a plant. Development of leak detection systems in the U.S. has concentrated on four areas: (1) chemical (H{sub 2} and O{sub 2}) leak detection meters; (2) acoustic leak detection/location techniques; (3) investigation of leak behavior (enlargement, damage effects, plugging and unplugging); and (4) data management for plant operations. This paper discusses the status, design aspects, and applications of leak detection technology for LMFBR plants. (author)

  13. LMFBR steam generator leak detection development in the United States

    International Nuclear Information System (INIS)

    Magee, P.M.; Gerrels, E.E.; Greene, D.A.; McKee, J.

    1978-01-01

    Leak detection for Liquid Metal Fast Breeder Reactor steam generators is an important economic factor in the shutdown, repair and restart of a plant. Development of leak detection systems in the U.S. has concentrated on four areas: (1) chemical (H 2 and O 2 ) leak detection meters; (2) acoustic leak detection/location techniques; (3) investigation of leak behavior (enlargement, damage effects, plugging and unplugging); and (4) data management for plant operations. This paper discusses the status, design aspects, and applications of leak detection technology for LMFBR plants. (author)

  14. Fuel leak detection on large transport airplanes

    OpenAIRE

    Behbahani-Pour, M.J.; Radice, G.

    2016-01-01

    Fuel leakage has the risk of being ignited by external ignition sources, and therefore it is important to detect\\ud any fuel leakage before the departure of the aircraft. Currently, there are no fuel leak detection systems installed\\ud on commercial aircrafts, to detect fuel tank leakage, while only a small number of more recent aircraft, have a fuel\\ud monitoring system, that generates a fuel leak-warning message in cockpit in the case of fuel imbalance between the\\ud tanks. The approach pro...

  15. Technique for detecting liquid metal leaks

    International Nuclear Information System (INIS)

    Bauerle, J.E.

    1979-01-01

    In a system employing flowing liquid metal as a heat transfer medium in contact with tubular members containing a working fluid, i.e., steam, liquid metal leaks through the wall of the tubular member are detected by dislodging the liquid metal compounds forming in the tubular member at the leak locations and subsequently transporting the dislodged compound in the form of an aerosol to a detector responsive to the liquid metal compound. In the application to a sodium cooled tubular member, the detector would consist of a sodium responsive device, such as a sodium ion detector

  16. Hydrogen detection systems leak response codes

    International Nuclear Information System (INIS)

    Desmas, T.; Kong, N.; Maupre, J.P.; Schindler, P.; Blanc, D.

    1990-01-01

    A loss in tightness of a water tube inside a Steam Generator Unit of a Fast Reactor is usually monitored by hydrogen detection systems. Such systems have demonstrated in the past their ability to detect a leak in a SGU. However, the increase in size of the SGU or the choice of ferritic material entails improvement of these systems in order to avoid secondary leak or to limit damages to the tube bundle. The R and D undertaken in France on this subject is presented. (author). 11 refs, 10 figs

  17. Acoustic leak detection development in the USA

    International Nuclear Information System (INIS)

    Greene, D.A.; Malovrh, J.W.; Magee, P.M.

    1984-01-01

    Acoustic monitoring systems that detect and locate a leak of water/steam from a defective tube in an LMFBR steam generator have been developed in the United States. A low frequency (approx. 10 KHz) system was developed by General Electric, and a high frequency (200 to 300 KHz) system by Rockwell International with support from Argonne National Laboratory. A comprehensive base technology program provided absolute signal amplitudes, background noise amplitudes, and signal source-to-detector transfer functions. Field tests of these systems demonstrated an ability to detect and locate simulated leaks under operating and quiescent conditions in an LMFBR steam generator. (author)

  18. Transanal Drainage of Coloanal Anastomotic Leaks

    Directory of Open Access Journals (Sweden)

    Bradley Sherman

    2018-01-01

    Full Text Available The conventional operative intervention for leaks following coloanal anastomoses has been proximal fecal diversion with or without take-down of anastomosis. A few of these cases are also amenable to percutaneous drainage. Ostomies created in this situation are often permanent, specifically in cases where coloanal anastomoses are taken down at the time of reoperation. We present two patients who developed perianastomotic pelvic abscesses that were treated with transanal large bore catheter drainage resulting in successful salvage of coloanal anastomoses without the need for a laparotomy or ostomy creation. We propose this to be an effective therapeutic approach to leaks involving low coloanal anastomoses in the absence of generalized peritonitis.

  19. Apparatus for Leak Testing Pressurized Hoses

    Science.gov (United States)

    Underwood, Steve D. (Inventor); Garrison, Steve G. (Inventor); Gant, Bobby D. (Inventor); Palmer, John R. (Inventor)

    2015-01-01

    A hose-attaching apparatus for leak-testing a pressurized hose may include a hose-attaching member. A bore may extend through the hose-attaching member. An internal annular cavity may extend coaxially around the bore. At least one of a detector probe hole and a detector probe may be connected to the internal annular cavity. At least a portion of the bore may have a diameter which is at least one of substantially equal to and less than a diameter of a hose to be leak-tested.

  20. Single-Shell Tank Leak Integrity Summary

    Energy Technology Data Exchange (ETDEWEB)

    Harlow, D. G. [Washington River Protection Solutions LLC, Richland, WA (United States); Girardot, C. L. [Washington River Protection Solutions LLC, Richland, WA (United States); Venetz, T. J. [Washington River Protection Solutions LLC, Richland, WA (United States)

    2015-03-26

    This document summarizes and evaluates the information in the Hanford Tri-Party Agreement Interim Milestone M-045-91F Targets completed between 2010 and 2015. 1) Common factors of SST liner failures (M-045-91F-T02), 2) the feasibility of testing for ionic conductivity between the inside and outside of SSTs (M-045-91F-T03, and 3) the causes, locations, and rates of leaks from leaking SSTs (M-045-91F-T04).

  1. I Was Attacked Online!

    Science.gov (United States)

    Hensel, Jan

    1996-01-01

    Considers some of the problems posed by electronic mail systems when the identity of the user is protected by the server. Suggests that high school instructors and administrators have good reason to circulate electronic messages through a central site, as students need to be protected from exploitative users and prohibited from sending abusive…

  2. A Correlated Active Acoustic Leak Detection in a SFR Steam Generator

    International Nuclear Information System (INIS)

    Kim, Tae Joon; Jeong, Ji Young; Kim, Jong Man; Kim, Byung Ho; Kim, Yong Il

    2009-01-01

    The methods of acoustic leak detection are active acoustic leak detection and passive acoustic leak detection. The methods for passive acoustic leak detection are already established, but because our goal is development of passive acoustic leak detection for detecting a leakage range of small and micro leak rates, it is difficult detecting a leak in steam generator using this developed passive acoustic leak detection. Thus the acoustic leak detection system is required to be able to detect wide range of water leaks. From this view point we need to develop an active acoustic leak detection technology to be able to detect intermediate leak rates

  3. Anatomy of a defective barrier: sequential glove leak detection in a surgical and dental environment.

    Science.gov (United States)

    Albin, M S; Bunegin, L; Duke, E S; Ritter, R R; Page, C P

    1992-02-01

    a) To determine the frequency of perforations in latex surgical gloves before, during, and after surgical and dental procedures; b) to evaluate the topographical distribution of perforations in latex surgical gloves after surgical and dental procedures; and c) to validate methods of testing for latex surgical glove patency. Multitrial tests under in vitro conditions and a prospective sequential patient study using consecutive testing. An outpatient dental clinic at a university dental school, the operating suite in a medical school affiliated with the Veteran's Hospital, and a biomechanics laboratory. Surgeons, scrub nurses, and dental technicians participating in 50 surgical and 50 dental procedures. We collected 679 latex surgical gloves after surgical procedures and tested them for patency by using a water pressure test. We also employed an electronic glove leak detector before donning, after sequential time intervals, and upon termination of 47 surgical (sequential surgical), 50 dental (sequential dental), and in three orthopedic cases where double gloving was used. The electronic glove leak detector was validated by using electronic point-by-point surface probing, fluorescein dye diffusion, as well as detecting glove punctures made with a 27-gauge needle. The random study indicated a leak rate of 33.0% (224 out of 679) in latex surgical gloves; the sequential surgical study demonstrated patency in 203 out of 347 gloves (58.5%); the sequential dental study showed 34 leaks in the 106 gloves used (32.1%); and with double gloving, the leak rate decreased to 25.0% (13 of 52 gloves tested). While the allowable FDA defect rate for unused latex surgical gloves is 1.5%, we noted defect rates in unused gloves of 5.5% in the sequential surgical, 1.9% in the sequential dental, and 4.0% in our electronic glove leak detector validating study. In the sequential surgical study, 52% of the leaks had occurred by 75 mins, and in the sequential dental study, 75% of the leaks

  4. Humos monitoring system of leaks in to the containment atmosphere

    International Nuclear Information System (INIS)

    Matal, O.; Zaloudek, J.; Matal, O. Jr.; Klinga, J.; Brom, J.

    1997-01-01

    HUmidity MOnitoring System (HUMOS) has been developed and designed to detect the presence of leak in selected primary circuit high energy pipelines and components that are evaluated from the point of view of Leak Before Break (LBB) requirements. It also requires to apply technical tools for detection and identification of coolant leaks from primary circuit and components of PWRs reactors. Safety significant of leaks depend on: leak source (location); leak rate, and leak duration. Therefore to detect and monitor coolant leaks in to the containment atmosphere during reactor operation is one of important safety measures. As potential leak sources flange connection in the upper head region of WWER reactors can be considered. HUMOS does not rely on the release of radioactivity to detect leaks but rather the relies on detection of moisture in the air resulting from a primary boundary leak. Because HUMOS relies on moisture and temperature detection, leaks can be detected without requiring the reactor to be critical. Therefore leaks can be detected during integrity pressure tests and any other mode of operation provided the reactor ventilation system is operating and primary circuit and components are pressurized. 3 figs

  5. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  6. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  7. Localized leak detection utilizing moisture sensitive tape

    International Nuclear Information System (INIS)

    Riddle, P.

    1984-01-01

    Moisture sensitive tape (MST) has been used in various nuclear power plants to detect leaks in reactor piping systems. The sensor assembly consists of MST, transponder, and sensor carrier, and is installed on the exterior of thermal insulation. The components, applications, installation, and purchasing information are discussed in the paper

  8. Steam generator leak detection using acoustic method

    International Nuclear Information System (INIS)

    Goluchko, V.V.; Sokolov, B.M.; Bulanov, A.N.

    1982-05-01

    The main requirements to meet by a device for leak detection in sodium - water steam generators are determined. The potentialities of instrumentation designed based on the developed requirements have been tested using a model of a 550 kw steam generator [fr

  9. GASFLOW analysis of a tritium leak accident

    International Nuclear Information System (INIS)

    Farman, R.F.; Fujita, R.K.; Travis, J.R.

    1994-01-01

    The consequences of an earthquake-induced fire involving a tritium leak were analyzed using the GASFLOW computer code. Modeling features required by the analysis include ventilation boundary conditions, flow of a gas mixture in an enclosure containing obstacles, thermally induced buoyancy, and combustion phenomena. (author). 2 refs., 6 figs

  10. GASFLOW analysis of a tritium leak accident

    International Nuclear Information System (INIS)

    Farman, R.F.; Fujita, R.K.; Travis, J.R.

    1994-01-01

    The consequences of an earthquake-induced fire involving a tritium leak were analyzed using the GASFLOW computer code. Modeling features required by the analysis include ventilation boundary conditions, flow of a gas mixture in an enclosure containing obstacles, thermally induced buoyancy, and combustion phenomena

  11. Detecting gas leaks by ultrasonic emission

    DEFF Research Database (Denmark)

    Rasmussen, Karsten Bo; Henriksen, Eigil

    1997-01-01

    The emission of noise in the frequency range 10 kHz to 25.6 kHz from an experimental gas leak in a flanged joint has been experimentally investigated. The overall conclusion is that the emitted noise is almost frequency independent in level within the considered frequency range.A small PC program...

  12. A Quick Guide to Paravalvular Leak Closure

    Science.gov (United States)

    Gafoor, Sameer; Franke, Jennifer; Bertog, Stefan; Lam, Simon; Vaskelyte, Laura; Hofmann, Ilona; Matic, Predrag

    2015-01-01

    Paravalvular leak (PVL) is a seldomly covered aspect of structural heart disease. However, this is a condition that frequently presents after valvular replacement. This article will cover the diagnosising and treating PVL (i.e. imaging, access, and device selection). In addition, specific aspects of aortic and mitral PVL closure will be covered in this review. PMID:29588686

  13. The concept of leak before failure

    International Nuclear Information System (INIS)

    Pellissier-Tanon, A.

    1985-01-01

    The ability to demonstrate the state of leak before failure introduce a new tangible element in the estimation of safety from which it becomes possible to estimate more rationnally the risks associated to crack formation. This paper presents the international positions on the full section break suppression of steam and primary pipes (Federal Republic of Germany, USA, France) [fr

  14. Developments in steam generator leak detection at Ontario Hydro

    Energy Technology Data Exchange (ETDEWEB)

    Maynard, K.J.; Singh, V.P. [Ontario Hydro Technologies, Toronto, Ontario (Canada)

    1998-07-01

    A method for locating small tube leaks in steam generators has been developed and implemented at Ontario Hydro. The technique utilizes both helium leak detection and moisture leak detection. The combination of these two methods allows tube leaks to be detected in any part of the tube bundle, including those submerged below water near the tubesheet. The estimated detection limits for the helium and moisture leak detection systems are 0.001 kg/hr and 0.05 kg/hr respectively, expressed as leak rates measured at typical boiler operating conditions. This technology is best utilized in situations where the leak rate under operating conditions is smaller than the practical limit for fluorescein dye techniques ({approx}2 kg/hour). Other novel techniques have been utilized to increase the reliability and speed of the boiler leak search process. These include the use of argon carrier gas to stabilize the buoyant helium gas in the boiler secondary. (author)

  15. Developments in steam generator leak detection at Ontario Hydro

    International Nuclear Information System (INIS)

    Maynard, K.J.; Singh, V.P.

    1998-01-01

    A method for locating small tube leaks in steam generators has been developed and implemented at Ontario Hydro. The technique utilizes both helium leak detection and moisture leak detection. The combination of these two methods allows tube leaks to be detected in any part of the tube bundle, including those submerged below water near the tubesheet. The estimated detection limits for the helium and moisture leak detection systems are 0.001 kg/hr and 0.05 kg/hr respectively, expressed as leak rates measured at typical boiler operating conditions. This technology is best utilized in situations where the leak rate under operating conditions is smaller than the practical limit for fluorescein dye techniques (∼2 kg/hour). Other novel techniques have been utilized to increase the reliability and speed of the boiler leak search process. These include the use of argon carrier gas to stabilize the buoyant helium gas in the boiler secondary. (author)

  16. Development of pressure boundaries leak detection technology for nuclear reactor

    International Nuclear Information System (INIS)

    Zhang Yao; Zhang Dafa; Chen Dengke; Zhang Liming

    2008-01-01

    The leak detection for the pressure boundaries is an important safeguard in nuclear reactor operation. In the paper, the status and the characters on the development of the pressure boundaries leak detection technology for the nuclear reactor were reviewed, especially, and the advance of the radiation leak detection technology and the acoustic emission leak detection technology were analyzed. The new advance trend of the leak detection technology was primarily explored. According to the analysis results, it is point out that the advancing target of the leak detection technology is to enhance its response speed, sensitivity, and reliability, and to provide effective information for operator and decision-maker. The realization of the global leak detection and the whole life cycle health monitoring for the nuclear boundaries is a significant advancing tendency of the leak detection technology. (authors)

  17. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  18. Multiple-feature extracting modules based leak mining system design.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.

  19. Experiments and calculations to leak openings and leak rates on typical piping components and systems

    International Nuclear Information System (INIS)

    Hoefler, A.; Grebner, H.

    1992-01-01

    Calculations of leak opening and leak rate for through cracks in piping components have been performed. The analyses are pre- or mostly post-calculations to experiments performed at the HDR facility under PWR operating conditions. Piping components under consideration are small diameter straight pipes with circumferential cracks, pipe bends with longitudinal or circumferential cracks and pipe branches with weldment cracks. The component are loaded by internal pressure and opening as well as closing bending moment. The finite element method and two-phase flow leak rate programs are used for the calculations. Results of the analyses are presented as J-integral values, crack opening displacements and areas and leak rates as well as comparisons to the experimental results. 6 refs., 16 figs., 2 tabs

  20. Comparison of leak opening and leak rate calculations to HDR experimental results

    International Nuclear Information System (INIS)

    Grebner, H.; Hoefler, A.; Hunger, H.

    1993-01-01

    During the last years a number of calculations of leak opening and leak rate for through cracks in piping components have been performed. Analyses are pre- or mostly post-calculations to experiments performed at the HDR facility under PWR operating conditions. Piping components under consideration were small diameter straight pipes with circumferential cracks, pipe bends with longitudinal or circumferential cracks and pipe branches with weldment cracks. The components were loaded by internal pressure and opening as well as closing bending moment. The finite element method and two-phase flow leak rate programs were used for the calculations. Results of the analyses are presented as J-integral values, crack opening displacements and areas and leak rates as well as comparisons to the experimental results

  1. Performance evaluation of PFBR wire type sodium leak detectors

    International Nuclear Information System (INIS)

    Vijayakumar, G.; Rajan, K.K.; Nashine, B.K.; Chandramouli, S.; Madhusoodanan, K.; Kalyanasundaram, P.

    2011-01-01

    Highlights: → Performance evaluation of wire type leak detectors was conducted in LEENA facility by creating sodium leaks. → The lowest leak rate of 214 g/h was detected in 50 min and the highest detection time was 6 h for a leak rate of 222 g/h. → Factors affecting the leak detection time are packing density of thermal insulation, layout of heater, temperature, etc. → Relationship between leak rate and detection time was established and a leak rate of 100 g/h is likely to be detected in 11.1 h. → Contact resistance of leaked sodium increased to 3.5 kilo ohms in 20 h. - Abstract: Wire type leak detectors working on conductivity principle are used for detecting sodium leak in the secondary sodium circuits of fast breeder reactors. It is required to assess the performance of these detectors and confirm that they are meeting the requirements. A test facility by name LEENA was constructed at Indira Gandhi Centre for Atomic Research (IGCAR), Kalpakkam to test the wire type leak detector lay out by simulating different sodium leak rates. This test facility consists of a sodium dump tank, a test vessel, interconnecting pipelines with valves, micro filter and test section with leak simulators. There are three different test sections in the test set up of length 1000 mm each. These test sections simulate piping of Prototype Fast Breeder Reactor (PFBR) secondary circuit and the wire type leak detector layout in full scale. All test sections are provided with leak simulators. A leak simulator consists of a hole of size one mm drilled in the test section and closed with a tapered pin. The tapered pin position in the hole is adjusted by a screw mechanism and there by the annular gap of flow area is varied for getting different leak rates. Various experiments were conducted to evaluate the performance of the leak detectors by creating different sodium leak rates. This paper deals with the details of wire type leak detector layout for the secondary sodium circuit of

  2. Endoscopic management of biliary injuries and leaks

    Directory of Open Access Journals (Sweden)

    T S Chandrasekar

    2012-01-01

    Full Text Available Bile duct injuries and subsequent leaks can occur following laparoscopic and open cholecystectomies and also during other hepatobiliary surgeries. Various patient related and technical factors are implicated in the causation of biliary injuries. Over a period of twenty five years managing such patients of biliary injuries our team has found a practical approach to assess the cause of biliary injuries based on the symptoms, clinical examination and imaging. Bismuth classification is helpful in most of the cases. Immediate referral to a centre experienced in the management of bile duct injury and timely intervention is associated with improved outcomes. Resuscitation, correcting dyselectrolytemia, aspiration of undrained biloma and antibiotics take the priority in the management. The goal is to restore the bile conduit, and to prevent short and longterm complications such as biliary fistula, intra-abdominal abscess, biliary stricture, recurrent cholangitis and secondary biliary cirrhosis. Endoscopic therapy by reducing the transpapillary pressure gradient helps in reducing the leak. Endoscopic therapy with biliary sphincterotomy alone or with additional placement of a biliary stent/ nasobiliary drainage is advocated. In our tertiary care referral unit, we found endoscopic interventions are useful in situations where there is leak with associated CBD calculus or a foreign body, peripheral bile duct injury, cystic duct stump leak and partial bile duct injury with leak/ narrowing of the lumen. Endotherapy is not useful in case of complete transection (total cut off and complete stricture involving common hepatic or common bile ducts. In conclusion, endoscopic treatment can be considered a highly effective therapy and should be the first-line therapy in such patients. Though less successful, an endoscopic attempt is warranted in patients suffering from central bile duct leakages failing which surgical management is recommended.

  3. Modeling leaks from liquid hydrogen storage systems.

    Energy Technology Data Exchange (ETDEWEB)

    Winters, William Stanley, Jr.

    2009-01-01

    This report documents a series of models for describing intended and unintended discharges from liquid hydrogen storage systems. Typically these systems store hydrogen in the saturated state at approximately five to ten atmospheres. Some of models discussed here are equilibrium-based models that make use of the NIST thermodynamic models to specify the states of multiphase hydrogen and air-hydrogen mixtures. Two types of discharges are considered: slow leaks where hydrogen enters the ambient at atmospheric pressure and fast leaks where the hydrogen flow is usually choked and expands into the ambient through an underexpanded jet. In order to avoid the complexities of supersonic flow, a single Mach disk model is proposed for fast leaks that are choked. The velocity and state of hydrogen downstream of the Mach disk leads to a more tractable subsonic boundary condition. However, the hydrogen temperature exiting all leaks (fast or slow, from saturated liquid or saturated vapor) is approximately 20.4 K. At these temperatures, any entrained air would likely condense or even freeze leading to an air-hydrogen mixture that cannot be characterized by the REFPROP subroutines. For this reason a plug flow entrainment model is proposed to treat a short zone of initial entrainment and heating. The model predicts the quantity of entrained air required to bring the air-hydrogen mixture to a temperature of approximately 65 K at one atmosphere. At this temperature the mixture can be treated as a mixture of ideal gases and is much more amenable to modeling with Gaussian entrainment models and CFD codes. A Gaussian entrainment model is formulated to predict the trajectory and properties of a cold hydrogen jet leaking into ambient air. The model shows that similarity between two jets depends on the densimetric Froude number, density ratio and initial hydrogen concentration.

  4. Investigation for the sodium leak in Monju. Sodium leak and fire test-1

    International Nuclear Information System (INIS)

    Kawata, Koji; Ohno, Shuji; Miyahara, Shinya; Miyake, Osamu; Tanabe, Hiromi

    2000-08-01

    As a part of the work for investigating the sodium leak accident which occurred in the Monju reactor (hereinafter referred to as Monju) on December 8, 1995, three tests, (1) a sodium leak test, (2) a sodium leak and fire test-1, and (3) a sodium leak and fire test-II, were carried out at OEC/PEC. The main objectives of these tests were to confirm the leak and burning behavior of sodium from the damaged thermometer, and the effects of the sodium fire on the integrity of the surrounding structure. This report describes the results of the sodium fire test-I carried out as a preliminary test. The test was performed using the SOLFA-2 (Sodium Leak, Fire and Aerosol) facility on April 8, 1996. In this test, sodium heated to 480degC was leaked for approximately 1.5 hours from a leak simulating apparatus and caused to drop onto a ventilation duct and a grating with the same dimensions and layout as those in Monju. The main conclusions obtained from the test are shown below: 1) Observation from video cameras in the test revealed that in the early stages of the sodium leak, sodium dripped out of the flexible tube of the thermometer. This dripping and burning expanded in range as the sodium splashed on the duct. 2) No damage to the duct itself was detected. However, the aluminum louver frame of the ventilation duct's lower inlet was damaged. Its machine screws came off, leaving half of the grill (on the grating side) detached. 3) No large hole, like the one seen at Monju, was found when the grating was removed from the testing system for inspection, although the area centered on the point were the sodium dripped was damaged in a way indicating the first stages of grating failure. The 5mm square lattice was corroded through in some parts, and numerous blades (originally 3.2 mm thick) had become sharpened like the blade of a knife. 4) The burning pan underside thermocouple near the leak point measured 700degC in within approximately 10 minutes, and for the next hour remained

  5. Experiences with leak rate calculations methods for LBB application

    International Nuclear Information System (INIS)

    Grebner, H.; Kastner, W.; Hoefler, A.; Maussner, G.

    1997-01-01

    In this paper, three leak rate computer programs for the application of leak before break analysis are described and compared. The programs are compared to each other and to results of an HDR Reactor experiment and two real crack cases. The programs analyzed are PIPELEAK, FLORA, and PICEP. Generally, the different leak rate models are in agreement. To obtain reasonable agreement between measured and calculated leak rates, it was necessary to also use data from detailed crack investigations

  6. Dynamic pressure measures for long pipeline leak detection

    Energy Technology Data Exchange (ETDEWEB)

    Likun Wang; Hongchao Wang; Min Xiong; Bin Xu; Dongjie Tan; Hengzhang Zhou [PetroChina Pipeline Company, Langfang (China). R and D Center

    2009-07-01

    Pipeline leak detection method based on dynamic pressure is studied. The feature of dynamic pressure which is generated by the leakage of pipeline is analyzed. The dynamic pressure method is compared with the static pressure method for the advantages and disadvantages in pipeline leak detection. The dynamic pressure signal is suitable for pipeline leak detection for quick-change of pipeline internal pressure. Field tests show that the dynamic pressure method detects pipeline leak rapidly and precisely. (author)

  7. Experiences with leak rate calculations methods for LBB application

    Energy Technology Data Exchange (ETDEWEB)

    Grebner, H.; Kastner, W.; Hoefler, A.; Maussner, G. [and others

    1997-04-01

    In this paper, three leak rate computer programs for the application of leak before break analysis are described and compared. The programs are compared to each other and to results of an HDR Reactor experiment and two real crack cases. The programs analyzed are PIPELEAK, FLORA, and PICEP. Generally, the different leak rate models are in agreement. To obtain reasonable agreement between measured and calculated leak rates, it was necessary to also use data from detailed crack investigations.

  8. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  9. Vehicle-based Methane Mapping Helps Find Natural Gas Leaks and Prioritize Leak Repairs

    Science.gov (United States)

    von Fischer, J. C.; Weller, Z.; Roscioli, J. R.; Lamb, B. K.; Ferrara, T.

    2017-12-01

    Recently, mobile methane sensing platforms have been developed to detect and locate natural gas (NG) leaks in urban distribution systems and to estimate their size. Although this technology has already been used in targeted deployment for prioritization of NG pipeline infrastructure repair and replacement, one open question regarding this technology is how effective the resulting data are for prioritizing infrastructure repair and replacement. To answer this question we explore the accuracy and precision of the natural gas leak location and emission estimates provided by methane sensors placed on Google Street View (GSV) vehicles. We find that the vast majority (75%) of methane emitting sources detected by these mobile platforms are NG leaks and that the location estimates are effective at identifying the general location of leaks. We also show that the emission rate estimates from mobile detection platforms are able to effectively rank NG leaks for prioritizing leak repair. Our findings establish that mobile sensing platforms are an efficient and effective tool for improving the safety and reducing the environmental impacts of low-pressure NG distribution systems by reducing atmospheric methane emissions.

  10. Acoustic leak detection at complicated topologies using neural netwoks

    International Nuclear Information System (INIS)

    Hessel, G.; Schmitt, W.; Weiss, F.P.

    1994-01-01

    Considering the shortcomings of all the existing leak detecting principles, a new method again based on the measurement of the leak induced sound but also applying pattern recognition is being developed. The capability of neural networks to localize leaks at the reactor pressure vessel (RPV) head of VVER-440 reactors is discussed. (orig./DG)

  11. Damage phenomena at target surface by small leak

    International Nuclear Information System (INIS)

    Jeong, Kyung Chai; Jeong, J. Y.; Kim, B. H.; Kim, T. J.; Choi, J. H.

    2001-04-01

    Design of the steam generator should be considered the safety about the sodium-water reaction occurred by water leak in heat transfer tube. Water leak mainly occurred from welding defect at the process of tube connection, the vibration of heat transfer tube bundle in steam generating system, fretting, and pin hole in original tube manufacturing. The classification of water leak divided to two parts, roughly, in case of the water leak studies. One is small leak phenomena analysis, and the other is it of large leak which was mainly treated to the evaluation on pressure increasing from hydrogen gas formed by sodium-water reaction in sodium system. In small water leak, the leak propagation phenomena and the development of leak detecting system at initial stage of small water leak were studied, mainly. In this study, the corrosion phenomena on the target tube surface appeared by sodium-water reaction was analyzed through the small water leak experiments, and, also, the jet phenomena formed by N 2 gas injection through the leak nozzle under water medium was observed

  12. Small leak detection requirements for SNR-300 steam generator operation

    International Nuclear Information System (INIS)

    Dumm, K.

    1975-01-01

    The leak detection philosophy of the SNR-300 steam generators is described. Due to operational demands small leaks have already to be detectable at a stage where secondary tube damage has not yet occurred. The requirements on a leak detection instrument are developed and the instrument itself is described. (author)

  13. Double Shell Tank AY-102 Radioactive Waste Leak Investigation

    International Nuclear Information System (INIS)

    Washenfelder, Dennis J.

    2014-01-01

    PowerPoint. The objectives of this presentation are to: Describe Effort to Determine Whether Tank AY-102 Leaked; Review Probable Causes of the Tank AY-102 Leak; and, Discuss Influence of Leak on Hanford's Double-Shell Tank Integrity Program

  14. 1999 Leak Detection, Monitoring, and Mitigation Strategy Update

    International Nuclear Information System (INIS)

    OHL, P.C.

    1999-01-01

    This document is a complete revision of WHC-SD-WM-ES-378, Rev 1. This update includes recent developments in Leak Detection, Leak Monitoring, and Leak Mitigation technologies, as well as, recent developments in single-shell tank retrieval technologies. In addition, a single-shell tank retrieval release protection strategy is presented

  15. Special storage of leaking fuel at Paks NPP

    International Nuclear Information System (INIS)

    Biro, Janos; Szőke, L.; Burján, T.; Lukács, R.; Hózer, H.

    2015-01-01

    In this paper the activities related with spent, hermetic as well as leaking fuel handling and storage, including: Spent fuel pool; Transportation criteria for the spent fuel assemblies and Interim spent fuel dry storage; Short-term storage in the spent fuel pool; Identification of the leaking assemblies by the TS-device; Present conception of Identification, handling of the leaking FAs; Modified transport procedure for the leaking FAs; Calculation of solved activity inside the leaking fuel rod; Solved activity limit values for the leaking FAs; Long-term storage in the interim spent Fuel dry storage are presented. At the end authors’ concluded that: 1) The leaking FA can be transported to the interim dry storage together with the other spent fuel assemblies in the transport container. 2) The transport-documentation of the leaking FA has to contain: isotope inventory, calculated solved activity values of the failed FA and the quantity of failed fuel rods. 3) Performing three leakage tests of the identified leaking FA before the transportation in the 5FP. it is useful to decrease the solved activity concentration inside the leaking FA and give additional information about the extent of the leakage. 4) We can calculate simply the solved activity of the leaking FA. 5) The modified transport procedure will have to be authorized. 6) The radiological effects of the leaking FA are negligible relative to the natural background radiation

  16. Final evaluation of advanced and current leak detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Carlson, R.; Brewer, W.; Lanham, R.

    1989-01-01

    This report presents the results of a study to evaluate the adequacy of leak detection systems in light water reactors. The sources of numerous reported leaks and methods of detection have been documented. Research to advance the state of the art of acoustic leak detection is presented, and procedures for implementation are discussed

  17. Automated leak localization performance without detailed demand distribution data

    NARCIS (Netherlands)

    Moors, Janneke; Scholten, L.; van der Hoek, J.P.; den Besten, J.

    2018-01-01

    Automatic leak localization has been suggested to reduce the time and personnel efforts needed to localize
    (small) leaks. Yet, the available methods require a detailed demand distribution model for successful
    calibration and good leak localization performance. The main aim of this work was

  18. Water leaks in sodium-heated fast reactor boilers

    International Nuclear Information System (INIS)

    Hayes, D.J.

    1978-01-01

    Constraints on plant design which may result from considerations of leak behaviour and leak detection limits are briefly considered. The sodium-water interface and reactions, the behaviour of small leaks, hydrogen bubbles and detection methods, including galvanic cell methods, are included. (UK)

  19. 40 CFR 63.648 - Equipment leak standards.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false Equipment leak standards. 63.648...) National Emission Standards for Hazardous Air Pollutants From Petroleum Refineries § 63.648 Equipment leak...) through (c)(10) and (e) through (i) of this section. (1) The instrument readings that define a leak for...

  20. 40 CFR 63.769 - Equipment leak standards.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false Equipment leak standards. 63.769... § 63.769 Equipment leak standards. (a) This section applies to equipment subject to this subpart and... release to detect leaks, except under the following conditions. (i) The owner or operator has obtained...

  1. 40 CFR 63.1331 - Equipment leak provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Equipment leak provisions. 63.1331... Standards for Hazardous Air Pollutant Emissions: Group IV Polymers and Resins § 63.1331 Equipment leak... in pumps and agitator seals in light liquid service shall not be considered to be a leak. For...

  2. 10 CFR 39.35 - Leak testing of sealed sources.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Leak testing of sealed sources. 39.35 Section 39.35 Energy....35 Leak testing of sealed sources. (a) Testing and recordkeeping requirements. Each licensee who uses... record of leak test results in units of microcuries and retain the record for inspection by the...

  3. 40 CFR 63.1434 - Equipment leak provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Equipment leak provisions. 63.1434... Standards for Hazardous Air Pollutant Emissions for Polyether Polyols Production § 63.1434 Equipment leak provisions. (a) The owner or operator of each affected source shall comply with the HON equipment leak...

  4. 40 CFR 63.1410 - Equipment leak provisions.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 11 2010-07-01 2010-07-01 true Equipment leak provisions. 63.1410... leak provisions. The owner or operator of each affected source shall comply with the requirements of 40 CFR part 63, subpart UU (national emission standards for equipment leaks (control level 2)) for all...

  5. 49 CFR 195.444 - CPM leak detection.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false CPM leak detection. 195.444 Section 195.444... PIPELINE Operation and Maintenance § 195.444 CPM leak detection. Each computational pipeline monitoring (CPM) leak detection system installed on a hazardous liquid pipeline transporting liquid in single...

  6. 49 CFR 195.134 - CPM leak detection.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false CPM leak detection. 195.134 Section 195.134... PIPELINE Design Requirements § 195.134 CPM leak detection. This section applies to each hazardous liquid... computational pipeline monitoring (CPM) leak detection system and each replaced component of an existing CPM...

  7. Small leak detection requirements for SNR-300 steam generator operation

    Energy Technology Data Exchange (ETDEWEB)

    Dumm, K

    1975-07-01

    The leak detection philosophy of the SNR-300 steam generators is described. Due to operational demands small leaks have already to be detectable at a stage where secondary tube damage has not yet occurred. The requirements on a leak detection instrument are developed and the instrument itself is described. (author)

  8. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  9. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  10. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  11. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  12. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  13. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  14. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  15. Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

    OpenAIRE

    Sukarno, Pudjo; Sidarto, Kuntjoro Adji; Trisnobudi, Amoranto; Setyoadi, Delint Ira; Rohani, Nancy; Darmadi, Darmadi

    2007-01-01

    Leak detection is always interesting research topic, where leak location and leak rate are two pipeline leaking parameters that should be determined accurately to overcome pipe leaking problems. In this research those two parameters are investigated by developing transmission pipeline model and the leak detection model which is developed using Artificial Neural Network. The mathematical approach needs actual leak data to train the leak detection model, however such data could not be obtained ...

  16. Intraoperative air leak measured after lobectomy is associated with postoperative duration of air leak.

    Science.gov (United States)

    Brunelli, Alessandro; Salati, Michele; Pompili, Cecilia; Gentili, Paolo; Sabbatini, Armando

    2017-11-01

    To verify the association between the air leak objectively measured intraoperatively (IAL) using the ventilator and the air leak duration after pulmonary lobectomy. Prospective analysis on 111 patients submitted to pulmonary lobectomy (33 by video-assisted thoracic surgery). After resection, objective assessment of air leak (in milliliter per minute) was performed before closure of the chest by measuring the difference between a fixed inspired and expired volume, using a tidal volume of 8 ml/kg, a respiratory rate of 10 and a positive-end expiratory pressure of 5 cmH2O. A multivariable analysis was performed for identifying factors associated with duration of postoperative air leak. Average IAL was 158 ml/min (range 0-1500 ml/min). The best cut-off (receiver-operating characteristics analysis) associated with air leak longer than 5 days was 500 ml/min. Nine patients had IAL >500 ml/min (8%). They had a longer duration of postoperative air leak compared with those with a lower IAL (mean values, 10.1 days, SD 8.8 vs 1.5 days, SD 4.9 P leak duration after multivariable regression: left side resection (P = 0.018), upper site resection (P = 0.031) and IAL >500 ml/min (P leak duration was generated: 1.7 + 2.4 × left side + 2.2 × upper site + 8.8 × IAL >500. The air leak measurement using the ventilator parameters after lung resection may assist in estimating the risk of postoperative prolonged air leak. An IAL > 500 ml/min may warrant the use of intraoperative preventative measures, particularly after video-assisted thoracic surgery lobectomy where a submersion test is often unreliable. © 2017 European Society of Cardiology and European Atherosclerosis Association. All rights reserved. For permissions please email: journals.permissions@oup.com.

  17. Novel Methods of Hydrogen Leak Detection

    International Nuclear Information System (INIS)

    Pushpinder S Puri

    2006-01-01

    For hydrogen to become a consumer fuel for automotive and domestic power generation, safety is paramount. Today's hydrogen systems are built with inherent safety measures and multiple levels of protection. However, human senses, in particular, the sense of smell, is considered the ultimate safeguards against leaks. Since hydrogen is an odorless gas, use of odorants to detect leaks, as is done in case of natural gas, is obvious solution. The odorants required for hydrogen used in fuel cells have a unique requirement which must be met. This is because almost all of the commercial odorants used in gas leak detection contain sulfur which acts as poison for the catalysts used in hydrogen based fuel cells, most specifically for the PEM (polymer electrolyte membrane or proton exchange membrane) fuel cells. A possible solution to this problem is to use non-sulfur containing odorants. Chemical compounds based on mixtures of acrylic acid and nitrogen compounds have been adopted to achieve a sulfur-free odorization of a gas. It is, therefore, desired to have a method and system for hydrogen leak detection using odorant which can incorporate a uniform concentration of odorant in the hydrogen gas, when odorants are mixed in the hydrogen storage or delivery means. It is also desired to develop methods where the odorant is not added to the bulk hydrogen, keeping it free of the odorization additives. A series of novel solutions are proposed which address the issues raised above. These solutions are divided into three categories as follows: 1. Methods incorporating an odorant in the path of hydrogen leak as opposed to adding it to the hydrogen gas. 2. Methods where odorants are generated in-situ by chemical reaction with the leaking hydrogen 3. Methods of dispensing and storing odorants in high pressure hydrogen gas which release odorants to the gas at a uniform and predetermined rates. Use of one or more of the methods described here in conjunction with appropriate engineering

  18. Application of acoustic leak detection technology for the detection and location of leaks in light water reactors

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Prine, D.; Mathieson, T.

    1988-10-01

    This report presents the results of a study to evaluate the adequacy of leak detection systems in light water reactors. The sources of numerous reported leaks and methods of detection have been documented. Research to advance the state of the art of acoustic leak detection is presented, and procedures for implementation are discussed. 14 refs., 70 figs., 10 tabs

  19. Failure Analysis of End Grain Attack and Pit Corrosion in 316L Stainless Steel Pipe

    Energy Technology Data Exchange (ETDEWEB)

    Baek, Un Bong; Nam, Sung Hoon [Korea Research Institute of Standards and Science, Daejeon (Korea, Republic of); Choe, Byung Hak; Shim, Jong Hun [Gangneung-Wonju National University, Gangneung (Korea, Republic of); Lee, Jin Hee [Oil and Gas Technology SK E and C, Junggu (Korea, Republic of); Kim, Eui Soo [National Forensic Service, Wonju (Korea, Republic of)

    2015-01-15

    The aim of this paper was to analyze the cause of surface cracks and pit corrosion on 316L pipe. An End Grain Attack (EGA) as a kind of pit mechanism was conducted on the pipe surface. The early stage of the EGA may come from under-deposit of caustic-water formation compositions like Na+, K+, Ca+, and Mg+ etc. The under-deposit corrosion is caused by the corrosion layer on the pipe surface followed by crevice corrosion due to accumulation of Cl‒ or S‒ composition between the corrosion layer and the pipe surface. In the early stage, the EGA occurred in all grain boundaries beneath the under-deposit corrosion. In the later stage of EGA, almost all the early attacked grain boundaries stopped at a limited depth of about 10 µm. Meanwhile, only the smallest number of the attacked boundaries progressed into the pipe as pit corrosion and resulted in leak failure.

  20. Steam generator leak detection at Bruce A Unit 1

    International Nuclear Information System (INIS)

    Maynard, K.J.; McInnes, D.E.; Singh, V.P.

    1997-01-01

    A new steam generator leak detection system was recently developed and utilized at Bruce A. The equipment is based on standard helium leak detection, with the addition of moisture detection and several other capability improvements. All but 1% of the Unit 1 Boiler 03 tubesheet was inspected, using a sniffer probe which inspected tubes seven at a time and followed by individual tube inspections. The leak search period was completed in approximately 24 hours, following a prerequisite period of several days. No helium leak indications were found anywhere on the boiler. A single water leak indication was found, which was subsequently confirmed as a through-wall defect by eddy current inspection. (author)

  1. Fluid pipeline leak detection and location with miniature RF tags

    Science.gov (United States)

    McIntyre, Timothy J.

    2017-05-16

    Sensors locate troublesome leaks in pipes or conduits that carry a flowing medium. These sensors, through tailored physical and geometric properties, preferentially seek conduit leaks or breaches due to flow streaming. The sensors can be queried via transceivers outside the conduit or located and interrogated inside by submersible unmanned vehicle to identify and characterize the nature of a leak. The sensors can be functionalized with other capabilities for additional leak and pipeline characterization if needed. Sensors can be recovered from a conduit flow stream and reused for future leak detection activities.

  2. Experiences in integrated leak rate measurements

    International Nuclear Information System (INIS)

    Shirk, R.E.

    1982-01-01

    During a hypothetical design basis accident for nuclear power plants, the reactor containment system is relied upon to maintain radioactive exposure limits below acceptable limits. Integrated leak rate testing is a means of verifying that the leakage of radioactivity material from the reactor containment will be below allowable limits. Leakage rate computations are based on the ideal gas law. The absolute method of leakage rate testing utilizing mass point method of data analysis is recommended. Integrated leak rate testing data is obtained from pressure, drybulb temperature, dewpoint temperature, and flow measuring systems. Test data does not support the usual leakage (flow) - pressure square root relationship. The major source of potential leakage from the reactor containment is reactor containment isolation valves

  3. Monju secondary heat transport system sodium leak

    International Nuclear Information System (INIS)

    Suzuki, Takeo; Hiroi, Hiroshi; Usami, Shin; Iwata, Koji.

    1996-01-01

    On December 8, 1995, the sodium leakage from the secondary heat transport system (SHTS) occurred in the piping room of the reactor auxiliary building in Monju. The secondary sodium leaked through a temperature sensor, due to the breakaway of the tip of the well tube of the sensor installed near the outlet of the intermediate heat exchanger (IHX) in the C loop of SHTS. The reactor core remained cooled and thus, from the viewpoint of radiological hazards, the safety of the reactor was secured. There were no adverse effects for operating personnel or the surrounding environment. The cause of the well tube failure is considered to result from high cycle fatigue due to flow induced vibrations. Delay in draining the sodium from the leaking loop increased the consequential effects from sodium combustion products. (author)

  4. Development of leak detector by radiation. 2

    International Nuclear Information System (INIS)

    Suzuki, Takashi; Okano, Yasuhiro; Chisaka, Haruo

    1997-01-01

    Leak detector by radiation has been developed by cooperative research between Water Authority and us. In his fiscal year, the most suitable arrangement of detector system was simulated by Monte Carlo method. The first, the experimental values were compared with the results of simulation. The second, calculation was carried out by changing the quality of reflective materials and distance between radiation source and detector. The simulation results were agreed with the experimental results. On the basis of the rate of presence of leak, the most suitable arrangement of detector system was obtained under the conditions that both radiation source and detector covered with graphite or iron of 5 cm thickness and separated each other 3 cm apart. However, by comparing FOM (figure of merit), the suitable arrangement was that radiation source and detector adjoined each other and covered by graphite or iron of 20 cm thickness. (S.Y.)

  5. Heavy water leak detection using diffusion sampler

    International Nuclear Information System (INIS)

    Joshi, M.L.; Hussain, S.A.

    1990-01-01

    In the Pressurrised Heavy Water Reactors (PHWRs) detection of the sources of heavy water leaks is importent both for the purpose of radiation hazard control as well as for the reduction of escape/loss of heavy water which, is an expensive nuclear material. This paper describes an application of tritium diffusion sampler for heavy water leak detection. The diffusion sampler comprises an usual tritium counting glass vial with a special orifice. The counting vial has water vapour, deficient in HTO concentration. The HTO present outside diffuses in the vial through the orifice, gets exchanged with water of the wet filter paper kept at the bottom and the moisture in the vial atmosphere which has HTO concentration lower than that outside. This results in continuation of net movement of HTO in the vial. The exchanged tritium is counted in liquid scintillation spectrometer. The method has a sensitivity of 10000 dpm/DAC-h. (author). 2 figs., 2 ta bs

  6. Method for mapping a natural gas leak

    Science.gov (United States)

    Reichardt, Thomas A [Livermore, CA; Luong, Amy Khai [Dublin, CA; Kulp, Thomas J [Livermore, CA; Devdas, Sanjay [Albany, CA

    2009-02-03

    A system is described that is suitable for use in determining the location of leaks of gases having a background concentration. The system is a point-wise backscatter absorption gas measurement system that measures absorption and distance to each point of an image. The absorption measurement provides an indication of the total amount of a gas of interest, and the distance provides an estimate of the background concentration of gas. The distance is measured from the time-of-flight of laser pulse that is generated along with the absorption measurement light. The measurements are formatted into an image of the presence of gas in excess of the background. Alternatively, an image of the scene is superimposed on the image of the gas to aid in locating leaks. By further modeling excess gas as a plume having a known concentration profile, the present system provides an estimate of the maximum concentration of the gas of interest.

  7. Subsea leak detection systems - recommended practice

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Kristin Nergaard

    2010-07-01

    It is known in the industry that occasional leakages occur in subsea production systems. In spite of efforts to apply subsea leak detectors, the experience is that most leakages are either detected by ROV during routine inspections or interventions or as oil slicks on the surface . Operators and authority awareness towards the environmental impact of oil and gas production is increasing. The regulatory bodies in Norway, EU and USA specify requirements for detection of acute pollution. This paper presents the development of a Recommended Practice (RP) sponsored by OLF (The Norwegian Oil Industry Association). The JIP includes several major oil and gas operators. The objective of the RP is to serve as a technical and practical reference in the field of subsea leak detection. (Author)

  8. Fast leak in channel H9

    International Nuclear Information System (INIS)

    Bauer, E.

    1987-01-01

    The loss of seal of the H9 channel in vacuum, freeing the entire cross section of the front part, leads to a fast leak that progresses rapidly. The effect of depressurizing the reflector can leads to shutdown of the shutdown rod pumps. The source changer associated with the channel fills completely before the valve closes. All of the leak water remains contained within the source changer containment. After the valves open, cooling of the fuel element is handled by natural convection, requiring a reversal of the flow between the plates. This changeover, which takes place at a relatively low pressure level, could lead to local boiling in the fuel element. Consequently, irreversible transformations cannot be excluded as possibilities for the fuel element and even for the control rod. Subsequently, the can is refilled with heavy water with establishment of the usual pressure levels

  9. Probabilistic pipe fracture evaluations for leak-rate-detection applications

    International Nuclear Information System (INIS)

    Rahman, S.; Ghadiali, N.; Paul, D.; Wilkowski, G.

    1995-04-01

    Regulatory Guide 1.45, open-quotes Reactor Coolant Pressure Boundary Leakage Detection Systems,close quotes was published by the U.S. Nuclear Regulatory Commission (NRC) in May 1973, and provides guidance on leak detection methods and system requirements for Light Water Reactors. Additionally, leak detection limits are specified in plant Technical Specifications and are different for Boiling Water Reactors (BWRs) and Pressurized Water Reactors (PWRs). These leak detection limits are also used in leak-before-break evaluations performed in accordance with Draft Standard Review Plan, Section 3.6.3, open-quotes Leak Before Break Evaluation Proceduresclose quotes where a margin of 10 on the leak detection limit is used in determining the crack size considered in subsequent fracture analyses. This study was requested by the NRC to: (1) evaluate the conditional failure probability for BWR and PWR piping for pipes that were leaking at the allowable leak detection limit, and (2) evaluate the margin of 10 to determine if it was unnecessarily large. A probabilistic approach was undertaken to conduct fracture evaluations of circumferentially cracked pipes for leak-rate-detection applications. Sixteen nuclear piping systems in BWR and PWR plants were analyzed to evaluate conditional failure probability and effects of crack-morphology variability on the current margins used in leak rate detection for leak-before-break

  10. He leak testing of Indus-2 dipole vacuum chambers

    International Nuclear Information System (INIS)

    Sindal, B.K.; Bhavsar, S.T.; Shukla, S.K.

    2003-01-01

    Full text: Centre for Advanced Technology is developing its second synchrotron radiation source INDUS-2 which is a 2.5 GeV electron storage ring. Dipole vacuum chambers are the vital components of Indus-2 vacuum system. Each of these chambers is approx. 3.6 m long and 0.67 m wide with 24 nos. of ports of various sizes. The dipole chambers were made by machining two halves and they are then lip welded together. The dipole chamber has approx. 14 m of total weld length and it was leak tested for leak tightness of the order of 10 -10 mbar 1/s. Helium mass spectrometer leak detector (HMSLD) was utilized for the leak testing. Subsequently the leaks of various orders in welding joints were repaired and leak tightness achieved. This paper describes the experiences during leak testing of 20 nos. of aluminum dipole chambers for INDUS-2

  11. Fuel leak testing performance at NPP Jaslovske Bohunice

    International Nuclear Information System (INIS)

    Slugen, V.; Krnac, S.; Smiesko, I.

    1995-01-01

    The NPP Bohunice VVER-440 fuel leak testing experience are relatively extensive in comparison with other VVER-440 users. As the first Europe NPP was adapted Siemens (KWU) in core-sipping equipment to VVER-440 units and since this time were have done these tests also for NPP Paks (Hungary) and NPP Dukovany (Czech Republic). The occurrence of leaking fuel assemblies in NPP is in the last 5 years relatively stabilised and low. A significant difference can be observed between type V-230 (31 leaks) and type V-213 (1 leak). None of of the indicated leaking fuel assemblies has been investigated in the hot cell. Therefore cannot be confirm the effective causes of leak occurrence. Nevertheless, the fuel failure rate and the performance of leak testing in NPP Bohunice are comparable to the world standard at PWR's. 1 tab., 2 figs., 3 refs

  12. Fuel leak testing performance at NPP Jaslovske Bohunice

    Energy Technology Data Exchange (ETDEWEB)

    Slugen, V; Krnac, S [Slovak Technical Univ., Bratislava (Slovakia); Smiesko, I [Nuclear Powr Plant EBO, Jaslovske Bohuce (Slovakia)

    1996-12-31

    The NPP Bohunice VVER-440 fuel leak testing experience are relatively extensive in comparison with other VVER-440 users. As the first Europe NPP was adapted Siemens (KWU) in core-sipping equipment to VVER-440 units and since this time were have done these tests also for NPP Paks (Hungary) and NPP Dukovany (Czech Republic). The occurrence of leaking fuel assemblies in NPP is in the last 5 years relatively stabilised and low. A significant difference can be observed between type V-230 (31 leaks) and type V-213 (1 leak). None of of the indicated leaking fuel assemblies has been investigated in the hot cell. Therefore cannot be confirm the effective causes of leak occurrence. Nevertheless, the fuel failure rate and the performance of leak testing in NPP Bohunice are comparable to the world standard at PWR`s. 1 tab., 2 figs., 3 refs.

  13. Stimulated leaks found with SmartBall tool

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2011-05-15

    Pure Technologies has developed a SmartBall leak detection tool which can be used in oil and gas pipelines. This tool contains acoustic sensors which listen for leaks and other problems in pipelines. Pig tracking units are used to track the tool along with receivers positioned on the pipe. With these technologies, SmartBall is able to detect small leaks that conventional methods would not detect and to assess their location accurately. Two runs on a Petrobras pipeline in Brazil highlighted the effectiveness of this technology, detecting three simulated leaks as small as 240mL/min. In addition, this system can give an estimation of the leak rate and traverse non piggable pipelines. Software is then used to analyze data and generate a report giving the size and location of the leaks identified. SmartBall is a technology capable of detecting small leaks and locating them in all sorts of oil and gas pipelines.

  14. Feedback regarding leaks in pipe work

    International Nuclear Information System (INIS)

    Guerville, C.; Boudouin, E.

    2011-01-01

    Contaminated effluent from nuclear medicine departments is stored in decay tanks before being discharged via the sewage system. Generally speaking, these tanks are located outside hospital wards, within the hospital's maintenance rooms. Pipes leading from the evacuation points (e.g. toilets in isolation wards) to the tanks may nonetheless pass through various other parts of the hospital premises (wards, corridors, offices, etc.). Should a leak occur in any of these pipes, this may impact on the public, workers or the environment. (author)

  15. Natural gas pipeline leaks across Washington, DC.

    Science.gov (United States)

    Jackson, Robert B; Down, Adrian; Phillips, Nathan G; Ackley, Robert C; Cook, Charles W; Plata, Desiree L; Zhao, Kaiguang

    2014-01-01

    Pipeline safety in the United States has increased in recent decades, but incidents involving natural gas pipelines still cause an average of 17 fatalities and $133 M in property damage annually. Natural gas leaks are also the largest anthropogenic source of the greenhouse gas methane (CH4) in the U.S. To reduce pipeline leakage and increase consumer safety, we deployed a Picarro G2301 Cavity Ring-Down Spectrometer in a car, mapping 5893 natural gas leaks (2.5 to 88.6 ppm CH4) across 1500 road miles of Washington, DC. The δ(13)C-isotopic signatures of the methane (-38.2‰ ± 3.9‰ s.d.) and ethane (-36.5 ± 1.1 s.d.) and the CH4:C2H6 ratios (25.5 ± 8.9 s.d.) closely matched the pipeline gas (-39.0‰ and -36.2‰ for methane and ethane; 19.0 for CH4/C2H6). Emissions from four street leaks ranged from 9200 to 38,200 L CH4 day(-1) each, comparable to natural gas used by 1.7 to 7.0 homes, respectively. At 19 tested locations, 12 potentially explosive (Grade 1) methane concentrations of 50,000 to 500,000 ppm were detected in manholes. Financial incentives and targeted programs among companies, public utility commissions, and scientists to reduce leaks and replace old cast-iron pipes will improve consumer safety and air quality, save money, and lower greenhouse gas emissions.

  16. Anastomotic leak detection by electrolyte electrical resistance.

    Science.gov (United States)

    DeArmond, Daniel T; Cline, Adam M; Johnson, Scott B

    2010-08-01

    To characterize a new method of postoperative gastrointestinal leak detection based on electrical resistance changes due to extravasated electrolyte contrast. Postoperative gastrointestinal leak results in increased patient morbidity, mortality, and hospital costs that can be mitigated by early diagnosis. A sensitive and specific diagnostic test that could be performed at the bedside has the potential to shorten the time to diagnosis and thereby improve the quality of treatment. Anaesthetized rats underwent celiotomy and creation of a 5-mm gastrotomy. In experimental animals, electrical resistance changes were measured with a direct current ohmmeter after the introduction of 5 cc of 23.4% NaCl electrolyte solution via gavage and measured with a more sensitive alternating current ohmmeter after the gavage of 1-5 cc of 0.9% NaCl. Comparison was made to negative controls and statistical analysis was performed. Leakage from the gastrotomy induced by as little as 1 cc of gavage-delivered 0.9% NaCl contrast solution was detectable as a statistically significant drop in electrical resistance when compared to results from negative controls. Electrical resistance change associated with electrolyte-gated leak detection is highly sensitive and specific and has the potential to be rapidly translated into clinical settings.

  17. Color Changing Material for Hydrogen Leak Detection

    Science.gov (United States)

    Victor, Megan E.

    2014-01-01

    Kennedy Space Center scientists developed a hydrogen leak sensor utilizing a combination of chemochromic pigment and polymer that can be molded or fiber spun into rigid or flexible shapes such as tape. The sensor turns a dark color when exposed to hydrogen gas. This sensor has proven to be very effective for pinpointing the exact location of leaks in hydrogen gas lines and fittings at launch pads. Kennedy Space Center exclusively licensed this technology to the University of Central Florida (UCF), who also holds patents that are complimentary to KSC's. UCF has bundled the patents and exclusively licensed the portfolio to HySense Technology LLC, a startup company founded by a UCF professor who supports the UCF Florida Solar Energy Center (FSEC). HySense has fully developed its product (known as Intellipigment"TM"), and currently has five commercial customers. The company recently won the $100,000 first-place award at the CAT5 innovation competition at the Innovation Concourse of the Southeast: Safety & Manufacturing event in Orlando, FL. Commercial production and sales of this technology by HySense Technology will make this leak sensor widely available for use by NASA, DoD, and industries that utilize hydrogen gas.

  18. FFTF integrated leak rate computer system

    International Nuclear Information System (INIS)

    Hubbard, J.A.

    1987-01-01

    The Fast Flux Test Facility (FFTF) is a liquid-metal-cooled test reactor located on the Hanford site. The FFTF is the only reactor of this type designed and operated to meet the licensing requirements of the Nuclear Regulatory Commission. Unique characteristics of the FFTF that present special challenges related to leak rate testing include thin wall containment vessel construction, cover gas systems that penetrate containment, and a low-pressure design basis accident. The successful completion of the third FFTF integrated leak rate test 5 days ahead of schedule and 10% under budget was a major achievement for the Westinghouse Hanford Company. The success of this operational safety test was due in large part to a special network (LAN) of three IBM PC/XT computers, which monitored the sensor data, calculated the containment vessel leak rate, and displayed test results. The equipment configuration allowed continuous monitoring of the progress of the test independent of the data acquisition and analysis functions, and it also provided overall improved system reliability by permitting immediate switching to backup computers in the event of equipment failure

  19. Leak rate test of containment personnel lock

    International Nuclear Information System (INIS)

    Julien, J.T.; Peters, S.W.

    1988-01-01

    As part of the US NRC Containment Integrity Program, a leak rate test was performed on a full size personnel airlock for a nuclear containment building. The airlock was subjected to conditions simulating severe accident conditions. The objective of the test was to characterize the performance of airlock door seals when subjected to conditions that exceeded design. The seals tested were a double dog-ear configuration and made from EPDM E603. The data obtained from this test will be used by SNL as a benchmark for development of analytical methods. In addition to leak rate information, strain, temperature, displacements, and pressure data were measured and recorded from over 330 transducers. The test lasted approximately 60 hours. Data were recorded at regular intervals and during heating, pressurization and depressurization. The inner airlock door and bulkhead were exposed to a maximum air temperature of 850 F and a maximum air pressure of 300 psig. The airlock was originally designed for 340 F and 60 psig. Two heating and pressurization cycles were planned; one to heat to 400 F and pressurize to 300 psig, and the second to heat to 800 F and pressurize to 300 psig. No significant leakage was recorded during these two cycles. A third cycle was added to the test program. The air temperature was increased to 850 F and held at this temperature for approximately 10 hours. The inner door seal failed quickly at a pressure of 150.5 psig. The maximum leak rate was 706 SCFM

  20. Confidence Leak in Perceptual Decision Making.

    Science.gov (United States)

    Rahnev, Dobromir; Koizumi, Ai; McCurdy, Li Yan; D'Esposito, Mark; Lau, Hakwan

    2015-11-01

    People live in a continuous environment in which the visual scene changes on a slow timescale. It has been shown that to exploit such environmental stability, the brain creates a continuity field in which objects seen seconds ago influence the perception of current objects. What is unknown is whether a similar mechanism exists at the level of metacognitive representations. In three experiments, we demonstrated a robust intertask confidence leak-that is, confidence in one's response on a given task or trial influencing confidence on the following task or trial. This confidence leak could not be explained by response priming or attentional fluctuations. Better ability to modulate confidence leak predicted higher capacity for metacognition as well as greater gray matter volume in the prefrontal cortex. A model based on normative principles from Bayesian inference explained the results by postulating that observers subjectively estimate the perceptual signal strength in a stable environment. These results point to the existence of a novel metacognitive mechanism mediated by regions in the prefrontal cortex. © The Author(s) 2015.

  1. Waste Transfer Leaks Control Decision Record

    International Nuclear Information System (INIS)

    RYAN, G.W.

    2000-01-01

    Control decision meetings for Waste Transfer Leaks were held on April 24,25,26, and 27, 2000. The agenda for the control decision meetings is included in Appendix A, and attendee lists are included in Appendix B. The purpose of the control decision meetings was to review and revise previously selected controls for the prevention or mitigation of waste transfer leak accidents. Re-evaluation of the controls is warranted due to revisions in the hazard and accident analysis for these Tank Farm events. In particular, calculated radiological consequences are significantly reduced from those currently reported in the Final Safety Analysis Report (FSAR). Revised hazard and accident analysis and a revised control recommendation will be reflected in an Authorization Basis Amendment to be submitted at the Department of Energy, Office of River Protection's (ORP's) request by June 30, 2000 to satisfy ORP Performance Incentive (PI) 2.1.1, Revision 1, ''Authorization Basis Management Process Efficiency Improvement''. The scope of the control decision meetings was to address all waste transfer leak-related hazardous conditions identified in the Tank Farm hazard analysis database, excluding those associated with the use of the Replacement Cross-Site Transfer System (RCSTS) slurry line and sluicing of Tank 241-C-106, which is addressed in FSAR Addendum 1. The scope of this control decision process does include future waste feed delivery waste transfer operations

  2. Leak monitoring method for a reactor container

    International Nuclear Information System (INIS)

    Uehara, Toshio.

    1987-01-01

    Purpose: To confirm leakages from a container upon nuclear reactor operation. Method: Leakages from a nuclear reactor container has been prevented by lowering the inner pressure of the container relative to the external pressure. In the conventional method of calculating the leakage by applying an inner pressure to the container and measuring the pressure change, etc. after the elapse of a pre-determined time, the measurement has to be conducted at periodical inspection when the nuclear reactor is shut-down. In view of the above, the leak test is conducted in the present invention by applying a slight inner pressure to the inside of the reactor container by supplying gases from a gas supply system and detecting the flow rate of the gases in the gas supply system while maintaining the slight inner pressure constant by controlling the supply and discharge of the gases. By applying such a inner pressure as causing no effect to the reactor operation, it is possible to monitor the leaks during operation and to detect the flow rate value surely and continuously if the leak is resulted. (Kamimura, M.)

  3. Airborne pipeline leak detection: UV or IR?

    Science.gov (United States)

    Babin, François; Gravel, Jean-François; Allard, Martin

    2016-05-01

    This paper presents a study of different approaches to the measurement of the above ground vapor plume created by the spill caused by a small 0.1 l/min (or less) leak in an underground liquid petroleum pipeline. The scenarios are those for the measurement from an airborne platform. The usual approach is that of IR absorption, but in the case of liquid petroleum products, there are drawbacks that will be discussed, especially when using alkanes to detect a leak. The optical measurements studied include UV enhanced Raman lidar, UV fluorescence lidar and IR absorption path integrated lidars. The breadboards used for testing the different approaches will be described along with the set-ups for leak simulation. Although IR absorption would intuitively be the most sensitive, it is shown that UV-Raman could be an alternative. When using the very broad alkane signature in the IR, the varying ground spectral reflectance are a problem. It is also determined that integrated path measurements are preferred, the UV enhanced Raman measurements showing that the vapor plume stays very close to the ground.

  4. Epidural block and neostigmine cause anastomosis leak

    Directory of Open Access Journals (Sweden)

    Ataro G

    2016-05-01

    Full Text Available Getu Ataro Department of Anesthesia, Jimma University, Jimma, EthiopiaI read the article by Phillips entitled, “Reducing gastrointestinal anastomotic leak rates: review of challenges and solutions”, published in the journal of Open Access Surgery with enthusiasm and found it crucial for perioperative management of patients with gastrointestinal (GI surgery, particularly anastomosis. I appreciate the author’s exhaustive search of literature and discussion with some limitation on review basics like methodology, which may affect the reliability of the review findings. The effects of risk factors for anastomosis leak, such as malnutrition, smoking, steroid use, bowel preparation, chemotherapy, duration of surgery, use of pressors, intravenous fluid administration, blood transfusion, and surgical anastomotic technique, were well discussed.1 However, from anesthesia perspective, there are some other well-studied risk factors that can affect healing of anastomosis wound and cause anastomosis leak. Among others, the effect of neostigmine and epidural block has been reported in many studies since half a century ago. View the original paper by Phillips

  5. Circadian and seasonal variation of migraine attacks in children.

    Science.gov (United States)

    Soriani, Stefano; Fiumana, Elisa; Manfredini, Roberto; Boari, Benedetta; Battistella, Pier Antonio; Canetta, Elisabetta; Pedretti, Stefania; Borgna-Pignatti, Caterina

    2006-01-01

    To investigate the rhythmicity of migraine episodes without aura in a pediatric population. Time of occurrence of 2517 migraine attacks in 115 children was recorded, by means of a diary, both by hourly and monthly intervals. A significant circadian variation, characterized by a peak in the afternoon (P < .001) and one in the early morning (P= .002) was found. A seasonal peak was also observed between November and January, while a nadir was observed in July. The clustering of attacks in the morning and midday and in autumn-winter, with a minimum frequency in July, suggests that school activities may represent an important cause of migraine.

  6. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  7. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  8. The detection of leaks on sodium pipes in a 'leak before break' approach

    International Nuclear Information System (INIS)

    Antonakas, D.

    1989-01-01

    The operation of circuits containing liquid sodium requires, given the chemical affinity of this fluid for air and water, a reliable detection of possible leaks. This system of detection should alert the operators to the occurrence of a leak in sufficient time to limit the potential consequences of a discharge of sodium in the building, leading to a severe sodium fire or at least to an extended corrosion of the pipe system. From a design point of view, the most likely event leading to this situation can be the consequence. of an initial undetected defect which develops under the effect of thermo-mechanical loadings, produces a sodium. leak below the dejection threshold remains undetectable white progressing and finally leads to a guillotine-type rupture when an incidental loading is superimposed to the normal one. The 'leak before break' approach which is now currently introduced in design considerations consists of insuring the detection of incipient leaks corresponding to through-the-wall cracks well below instability of the pipe. Under this short statement, lies a considerable and still necessary effort of research broadly presented in the present paper

  9. School Shootings Stun Reservation

    Science.gov (United States)

    Borja, Rhea R.; Cavanagh, Sean

    2005-01-01

    This article deals with the impact brought by the school shootings at Red Lake Indian Reservation in Minnesota to the school community. A deeply troubled 16-year-old student shot and killed seven other people and himself at a high school. The nation's deadliest school attack since the 1999 slayings at Colorado's suburban Columbine High School took…

  10. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  11. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  12. Sodium leak at Monju (II): Sodium leak, burning and aerosol behavior

    International Nuclear Information System (INIS)

    Funada, T.; Yamagishi, Y.

    1996-01-01

    The amount of leaked sodium was estimated as approximately 640 kg during the 220 minute leak. The ventilation duct and the walkway grating under the leak site were severely damaged by Na-Fe-O reaction, but the floor liner and the concrete wall were not. A total 100 kg of sodium aerosol was deposited in the reactor auxiliary building and 230 kg was released to the atmosphere. The sodium concentration at the site boundary was calculated as 0.05 mg/m 3 , NaOH equivalent, which was low in comparison with the permitted level of 2 mg/m 3 . The tritium quantity released was estimated as 4.4 x 10 7 Bq, which was about 0.03% of the average released value per month for a LWR. (author)

  13. Evaluation of advanced and current leak detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1988-01-01

    U.S. Nuclear Regulatory Commission Guide 1.45 recommends the use of at least three different detection methods in reactors to detect leakage. Monitoring of both sump-flow and airborne particulate radioactivity is mandatory. A third method can involve either monitoring of condensate flow rate from air coolers or monitoring of airborne gaseous radioactivity. Although the methods currently used for leak detection reflect the state of the art, other techniques may be developed and used. Since the recommendations of Regulatory Guide 1.45 are not mandatory, Licensee Event Report Compilations have been reviewed to help establish actual capabilities for leak detection. The review of event reports, which had previously covered the period of June 1985 to August 1986 has been extended, and now covers events to June 1987. The total number of significant events is now 83. These reports have provided documented, sometimes detailed, summaries of reactor leaks. They have helped establish the capabilities of existing systems to detect and locate leaks. Differences between PWRs and BWRs with regard to leak detection have now been analyzed. With regard to detection methods, the greatest differences between reactor types are as follows: (a) The sump pump is reported as the detection method more frequently in BWRs than in PWRs (64% vs. 35%). (b) The radiation monitor is reported as the detection method (excluding false alarms) more frequently in PWRs. Current efforts at Argonne National Laboratory (ANL) to evaluate advanced acoustic leak detection methods are directed toward the generation and analysis of acoustic data from large (0.5 to 10 gal/min) leaks and modification of the software of the GARD/ANL advanced acoustic leak detection system. In order to reach the goal of 10 gal/min leaks, the Steam Generator Test Facility at ANL has been modified to carry out the leak testing. Tests were carried out with water at 525 deg. F and 1100 psi leaking through a fatigue crack in a 4-in

  14. The experiment and analysis on small leak phenomena

    International Nuclear Information System (INIS)

    Jeong, Kyung Chai; Hwang, S. T.; Kim, B. H.; Jeong, J. Y.

    2000-07-01

    The liquid sodium which is used as a coolant in LMFBR, may give rise to a serious trouble in the safety aspect of steam generator. The defects in a heat transfer tube, such as pin-hole or tube welding defect, will result in a leakage of high pressure steam into the sodium side and production of hydrogen gas and corrosive sodium compounds which can cause significant damage to the tube wall of steam generator by using exothermic reaction. In significant damage to the tube wall of steam generator by using exothermic reaction. In this case, initial leak size will be enlarged with time and the leak rate developed to large leak through the micro, small, intermediate leaks. Therefore, the analysis of sodium-water reaction phenomena on the micro and small water leaks in the heat transfer tube is very important in the initial leak stage in the aspects of the protection of leak progress and safety evaluation of steam generator. In this study, firstly, the micro and small leaks phenomena, such as reopen size, shape, and time of leak path, self-wastage, corrosion of tube materials, was analyzed from the literature survey and water leakage experiments using the leak specimen. In small water leak experiments, the leak path was plugged by the sodium-water reaction products at the leak path of a specimen, and re-open phenomena were not observed in initial experiments. Other leak experiments, reopen phenomena of self-plugged leak path was observed. Re-open mechanism of sealed path could be explained by the thermal transient and vibration of heat transfer tube. As a result, perfect reopen time of self plugged leak path was observed to be about 130 minutes after water leak initiation. Reopen shape of a specimen was appeared with double layer of circular type, and reopen size of this specimen surface was about 2 mm diameter on sodium side. Also, the corrosion of a specimen initiated from sodium side, the segregation phenomena of Cr in the specimen was found much more than those of

  15. Environmental risk comparisons with internal methods of UST leak detection

    International Nuclear Information System (INIS)

    Durgin, P.B.

    1993-01-01

    The past five years have seen a variety of advances in how leaks can be detected from within underground storage tanks. Any leak-detection approach employed within a storage tanks must be conducted at specific time intervals and meet certain leak-rate criteria according to federal and state regulations. Nevertheless, the potential environmental consequences of leak detection approaches differ widely. Internal, volumetric UST monitoring techniques have developed over time including: (1) inventory control with stick measurements, (2) precision tank testing, (3) automatic tank gauging (ATG), (4) statistical inventory reconciliation (SIR), and (5) statistical techniques with automatic tank gauging. An ATG focuses on the advantage of precise data but measured for only a brief period. On the other hand, stick data has less precision but when combined with SIR over extended periods it too can detect low leak rates. Graphs demonstrate the comparable amounts of fuel than can leak out of a tank before being detected by these techniques. The results indicate that annual tank testing has the greatest potential for large volumes of fuel leaking without detection while new statistical approaches with an ATG have the least potential. The environmental implications of the volumes of fuel leaked prior to detection are site specific. For example, if storage tank is surrounded by a high water table and in a sole-source aquifer even small leaks may cause problems. The user must also consider regulatory risks. The level of environmental and regulatory risk should influence selection of the UST leak detection method

  16. Fabrication of ultra-sensitive leak detection standards

    International Nuclear Information System (INIS)

    Winkelman, C.R.

    1980-01-01

    The primary difficulty with flow rate measurements below 10 -10 standard cubic centimeters per second (std. cc/sec) is that there are no commercially available standards. The requirements, however, dictate that the problem of design and construction of a qualifiable standard in the ultra-sensitive range had to be solved. There are a number of leak types which were considered - capillary leaks, orifice leaks, and the pore type leaks, among others. The capillary leak was not used because of the cracking or sorting effects that are common to this type leak. For example, a gas blend flowing through a capillary leak will result in the lighter gases passing through the leak first. The difficulty of fabricating the proper hole size in relation to the flow rate requirements ruled out the orifice type leak. The choice was the pore type leak which utilizes the basic concept of a stainless steel knife edge driven into a fixed section composed of stainless steel with a gold over-lay and maintained under force

  17. Prioritizing Test Cases for Memory Leaks in Android Applications

    Institute of Scientific and Technical Information of China (English)

    Ju Qian; Di Zhou

    2016-01-01

    Mobile applications usually can only access limited amount of memory. Improper use of the memory can cause memory leaks, which may lead to performance slowdowns or even cause applications to be unexpectedly killed. Although a large body of research has been devoted into the memory leak diagnosing techniques after leaks have been discovered, it is still challenging to find out the memory leak phenomena at first. Testing is the most widely used technique for failure discovery. However, traditional testing techniques are not directed for the discovery of memory leaks. They may spend lots of time on testing unlikely leaking executions and therefore can be inefficient. To address the problem, we propose a novel approach to prioritize test cases according to their likelihood to cause memory leaks in a given test suite. It firstly builds a prediction model to determine whether each test can potentially lead to memory leaks based on machine learning on selected code features. Then, for each input test case, we partly run it to get its code features and predict its likelihood to cause leaks. The most suspicious test cases will be suggested to run at first in order to reveal memory leak faults as soon as possible. Experimental evaluation on several Android applications shows that our approach is effective.

  18. LEAK: A source term generator for evaluating release rates from leaking vessels

    International Nuclear Information System (INIS)

    Clinton, J.H.

    1994-01-01

    An interactive computer code for estimating the rate of release of any one of several materials from a leaking tank or broken pipe leading from a tank is presented. It is generally assumed that the material in the tank is liquid. Materials included in the data base are acetonitrile, ammonia, carbon tetrachloride, chlorine, chlorine trifluoride, fluorine, hydrogen fluoride, nitric acid, nitrogen tetroxide, sodium hydroxide, sulfur hexafluoride, sulfuric acid, and uranium hexafluoride. Materials that exist only as liquid and/or vapor over expected ranges of temperature and pressure can easily be added to the data base file. The Fortran source code for LEAK and the data file are included with this report

  19. Acoustic detection for water/steam leak from a tube of LMFBR steam generator

    International Nuclear Information System (INIS)

    Sonoda, Masataka; Shindo, Yoshihisa

    1989-01-01

    Acoustic leak detector is useful for detecting more quickly intermediate leak than the existing hydrogen detector and is available for identification of leak location on the accident of water/steam leak from a tube of LMFBR steam generator. This paper presents the overview of HALD (High frequency Acoustics Leak Detection) system, which is more sensitive for leak detection and lower cost of equipment for identification of leak location than a low frequency type detector. (author)

  20. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  1. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  2. Leak detection and location in MONJU steam generators

    International Nuclear Information System (INIS)

    Saito, T.; Kosugi, T.

    1978-01-01

    Leak detection system of MONJU steam generator depends mostly on in-sodium hydrogen detectors. The requirements on leak detector performance are determined from the point of view of protecting tube leak propagation due to wastage, and the process of determining the performance is shown briefly. Research and development activities on in-sodium hydrogen detectors are described and the specifications of leak detectors for MONJU are also presented. In-cover-gas hydrogen detector and acoustic detector are under development. Research and development activities on the leak location after steam generator shutdown by such methods as an electromagnetic method and ultrasonic method are described. The results of the research and development work on inserting the test probes into tubes are described also. An idea for finding the condition of tubes in the neighbourhood of the leak is also presented. (author)

  3. Leak detection and location in MONJU steam generators

    Energy Technology Data Exchange (ETDEWEB)

    Saito, T; Kosugi, T [Prototype Reactor Office, Tokyo (Japan)

    1978-10-01

    Leak detection system of MONJU steam generator depends mostly on in-sodium hydrogen detectors. The requirements on leak detector performance are determined from the point of view of protecting tube leak propagation due to wastage, and the process of determining the performance is shown briefly. Research and development activities on in-sodium hydrogen detectors are described and the specifications of leak detectors for MONJU are also presented. In-cover-gas hydrogen detector and acoustic detector are under development. Research and development activities on the leak location after steam generator shutdown by such methods as an electromagnetic method and ultrasonic method are described. The results of the research and development work on inserting the test probes into tubes are described also. An idea for finding the condition of tubes in the neighbourhood of the leak is also presented. (author)

  4. Leak Detection of High Pressure Feedwater Heater Using Empirical Models

    International Nuclear Information System (INIS)

    Lee, Song Kyu; Kim, Eun Kee; Heo, Gyun Young; An, Sang Ha

    2009-01-01

    Even small leak from tube side or pass partition within the high pressure feedwater heater (HPFWH) causes a significant deficiency in its performance. Plant operation under the HPFWH leak condition for long time will result in cost increase. Tube side leak within HPFWH can produce the high velocity jet of water and it can cause neighboring tube failures. However, most of plants are being operated without any information for internal leaks of HPFWH, even though it is prone to be damaged under high temperature and high pressure operating conditions. Leaks from tubes and/or pass partition of HPFWH occurred in many nuclear power plants, for example, Mihama PS-2, Takahama PS-2 and Point Beach Nuclear Plant Unit 1. If the internal leaks of HPFWH are monitored, the cost can be reduced by inexpensive repairs relative to loss in performance and moreover plant shutdown as well as further tube damages can be prevented

  5. Management of vacuum leak-detection processes, calibration, and standards

    International Nuclear Information System (INIS)

    Wilson, N.G.

    1985-01-01

    Vacuum leak detection requires integrated management action to ensure the successful production of apparatus having required leak tightness. Implementation of properly planned, scheduled, and engineered procedures and test arrangements are an absolute necessity to prevent unexpected, impractical, technically inadequate, or unnecessarily costly incidents in leak-testing operations. The use of standard procedures, leak standards appropriate to the task, and accurate calibration systems or devices is necessary to validate the integrity of any leak-test procedure. In this paper, the need for implementing these practices is discussed using case histories of typical examples of large complex vacuum systems. Aggressive management practices are of primary importance throughout a project's life cycle to ensure the lowest cost; this includes successful leak testing of components. It should be noted that the opinions and conclusions expressed in this paper are those of the author and are not those of the Los Alamos National Laboratory or the Department of Energy

  6. Lessons learned from MONJU sodium leak accident

    International Nuclear Information System (INIS)

    Nakai, Ryodai; Ito, Kazumoto; Nagata, Takashi

    2000-01-01

    MONJU sodium leak accident was a small accident with a large public impact. There was no injures or exposure to radiation, nor was there any loss of safety function such as reactor shutdown or reactor cooling. On the contrary a social impact is considerably large, whereby the plant remains shutdown. This paper describes the lessons learned from the accident, i.e. the impact of the accident and its cause, and the features on risk management in view of social aspect as well as technical aspect. (author)

  7. Leak before break experience in CANDU reactors

    International Nuclear Information System (INIS)

    Price, E.G.; Moan, G.D.; Coleman, C.E.

    1988-04-01

    The paper describes how the requirements for Leak-Before-Break are met in CANDU reactors. The requirements are based on operational and laboratory experience. After the onset of leakage in a fuel channel from a delayed hydride crack, time is available to the operator to take action before the crack grows to an unstable length. The time available is calculated using different models which use crack growth data from small specimen tests. When the results from crack growth behaviour experiments, carried out on components removed from reactor are used in the model, the time available for operator response is about 100 hours

  8. IR analyzer spots heavy water leaks

    International Nuclear Information System (INIS)

    Anon.

    1978-01-01

    A correlation spectrometer developed by Barringer Research Ltd. (in collaboration with Atomic Energy of Canada and Ontario Hydro) is used to measure HDO concentrations in DTO in the final (distillation) stage of heavy-water production. A unit has been installed at Bruce Heavy Water Plant. Previously, such spectrometers had been installed to detect heavy-water leaks in CANDU reactors. The principle on which the instrument works is explained, with illustrations. It works by comparing the absorption at 2.9 μm, due to HDO, with that at 2.6 μm, due to both HDO and D 2 O. (N.D.H.)

  9. Cerebrospinal fluid leak mimicking allergic rhinitis.

    Science.gov (United States)

    Ricketti, Anthony J; Cleri, Dennis J; Porwancher, Richard B; Panesar, Mandip; Villota, Francisco J; Seelagy, Marc M

    2005-01-01

    Rhinitis and rhinorrhea are common clinical complaints that may be allergic or nonallergic in etiology. Distinguishing between allergic and nonallergic etiologies can be difficult but necessary for treatment. Here, we present a case of a 50-year-old woman with > 20 years of rhinorrhea before a diagnosis of cerebrospinal fluid leak and a life-threatening complication occurred. It is essential that no symptom, especially that which persists and resists treatment, is trivialized. Here, we establish how a careful history and evaluation will direct the clinician to the correct diagnosis.

  10. Leak detection device for reactor coolant

    International Nuclear Information System (INIS)

    Oshima, Koichiro.

    1990-01-01

    In a light water cooled reactor, if reactor coolants are leaked from pipelines in a pipeline chamber, activated products (N-16) are diffused together to an atmosphere in the pipeline chamber. N-16 is sucked from an extracting tube which is always sucking the atmosphere in the pipeline chamber to a sucking blower. Then, β-rays released from N-16 are monitored by a radiation monitor in a measuring chamber which is radiation-shielded from the pipeline chamber. Accordingly, since the radiation monitor can detect even slight leakage, the slight leakage of reactor coolants in the pipelines can be detected at an early stage. (I.N.)

  11. 340 Facility secondary containment and leak detection

    International Nuclear Information System (INIS)

    Bendixsen, R.B.

    1995-01-01

    This document presents a preliminary safety evaluation for the 340 Facility Secondary Containment and Leak Containment system, Project W-302. Project W-302 will construct Building 340-C which has been designed to replace the current 340 Building and vault tank system for collection of liquid wastes from the Pacific Northwest Laboratory buildings in the 300 Area. This new nuclear facility is Hazard Category 3. The vault tank and related monitoring and control equipment are Safety Class 2 with the remainder of the structure, systems and components as Safety Class 3 or 4

  12. Optimal attacks on qubit-based Quantum Key Recycling

    Science.gov (United States)

    Leermakers, Daan; Škorić, Boris

    2018-03-01

    Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.

  13. Detection of steam generator tube leaks in pressurized water reactors

    International Nuclear Information System (INIS)

    Roach, W.H.

    1984-11-01

    This report addresses the early detection of small steam generator tube leaks in pressurized water reactors. It identifies physical parameters, establishes instrumentation performance goals, and specifies sensor types and locations. It presents a simple algorithm that yields the leak rate as a function of known or measurable quantities. Leak rates of less than one-tenth gram per second should be detectable with existing instrumentation

  14. Design of a Novel In-Pipe Reliable Leak Detector

    OpenAIRE

    Chatzigeorgiou, Dimitrios; Youcef-Toumi, Kamal; Ben-Mansour, Rached

    2013-01-01

    Leakage is the major factor for unaccounted losses in every pipe network around the world (oil, gas, or water). In most cases, the deleterious effects associated with the occurrence of leaks may present serious economical and health problems. Therefore, leaks must be quickly detected, located, and repaired. Unfortunately, most state-of-the-art leak detection systems have limited applicability, are neither reliable nor robust, while others depend on the user experience. In this paper, we prese...

  15. Telescope sipping the optimum fuel leak detection system

    International Nuclear Information System (INIS)

    Deleryd, R.

    1998-01-01

    The TELESCOPE Sipping technology is an evolutionary development from previous ABB fuel leak systems used in LWR reactors. The system utilizes the existing dynamics that cause numerous fission products to leak from a failed fuel rod when the fuel assembly is raised from a reactor core during core fuel alterations. The system can also be used by repair work in pool side inspection in order to detect leaking rods or to verify reconstituted assemblies as non leakers. (author)

  16. Detection of Leaks in Water Mains Using Ground Penetrating Radar

    OpenAIRE

    Alaa Al Hawari; Mohammad Khader; Tarek Zayed; Osama Moselhi

    2016-01-01

    Ground Penetrating Radar (GPR) is one of the most effective electromagnetic techniques for non-destructive non-invasive subsurface features investigation. Water leak from pipelines is the most common undesirable reason of potable water losses. Rapid detection of such losses is going to enhance the use of the Water Distribution Networks (WDN) and decrease threatens associated with water mains leaks. In this study, GPR approach was developed to detect leaks by implementing an appropriate imagin...

  17. Locating leaks in water mains using noise loggers

    OpenAIRE

    El-Abbasy, Mohammed S.; Mosleh, Fadi; Senouci, Ahmed; Zayed, Tarek; Al-Derham, Hassan

    2016-01-01

    Because of their potential danger to public health, economic loss, environmental damage, and energy waste, underground water pipelines leaks have received more attention globally. Researchers have proposed active leakage control approaches to localize, locate, and pinpoint leaks. Noise loggers have usually been used only for localizing leaks while other tools were used for locating and pinpointing. These approaches have resulted in additional cost and time. Thus, regression and artificial neu...

  18. Margins in high temperature leak-before-break assessments

    International Nuclear Information System (INIS)

    Budden, P.J.; Hooton, D.G.

    1997-01-01

    Developments in the defect assessment procedure R6 to include high-temperature mechanisms in Leak-before-Break arguments are described. In particular, the effect of creep on the time available to detect a leak and on the crack opening area, and hence leak rate, is discussed. The competing influence of these two effects is emphasized by an example. The application to Leak-before-Break of the time-dependent failure assessment diagram approach for high temperature defect assessment is then outlined. The approach is shown to be of use in assessing the erosion of margins by creep

  19. Margins in high temperature leak-before-break assessments

    Energy Technology Data Exchange (ETDEWEB)

    Budden, P.J.; Hooton, D.G.

    1997-04-01

    Developments in the defect assessment procedure R6 to include high-temperature mechanisms in Leak-before-Break arguments are described. In particular, the effect of creep on the time available to detect a leak and on the crack opening area, and hence leak rate, is discussed. The competing influence of these two effects is emphasized by an example. The application to Leak-before-Break of the time-dependent failure assessment diagram approach for high temperature defect assessment is then outlined. The approach is shown to be of use in assessing the erosion of margins by creep.

  20. Software-aided operation of modern industrial leak detectors

    Energy Technology Data Exchange (ETDEWEB)

    Grosse Bley, W. [INFICON GmbH, Koeln (Germany)

    2006-07-01

    When leak-testing parts with the tracer gas method, the ''no-indication'' response of the leak detector leaves the operator with the question whether there is really no leak present or the test instrument may be in a faulty (= insensitive) condition. Moreover, an operator being absent-minded or distracted may easily move the sniffer tip to the wrong spot on the test object or at least not to all required test areas. To make sure that the uncertainty about sensitivity is avoided specific artificial leaks (''test leaks'') are routinely used for frequent verification of the correct function and calibration of the leak detector. However, absent-minded, distracted or even lazy operators are not detected in this way. Recent software features implemented into INFICON leak detectors can help prevent mistakes of the above kind. Such features include intelligent filtering of the signal (preventing spurious noise), suppression of interfering gas effects, dynamic zeroing of the signal, simple on-site function tests with a built-in test leak, a complete spectrum of indications (optical, acoustical, tactile,..) if the trigger for leaky objects is exceeded and more. As an example of the latest achievements in this field the operator-controlling features of the new ECOTEC E3000 refrigerant leak detector from INFICON are described in some detail. It will become quite clear that product quality (in this case of refrigerators and air conditioners) is greatly enhanced by such supervising functions. (orig.)

  1. New helium sniffing device for locating very fine leaks

    International Nuclear Information System (INIS)

    Murakami, Y.; Shimomura, Y.; Abe, T.; Obara, K.

    1984-01-01

    A new helium sniffing method for leak checking large vacuum vessels is described. The low sensitivity problem of the conventional helium sniffing method has been overcome by increasing the gas draw rate from around leaks into the detector up to about 0.1 Pa m 3 /s. The devised system consists of a flexible stainless steel capillary tube 0.6 mm i.d. and 10 m long, a sorption pump using molecular sieve, and a helium leak detector in series. This method is particularly useful for locating very fine leaks down to 10 -11 Pa m 3 /s. Relevant theoretical considerations and experimental results are presented

  2. Acoustic leak detection and ultrasonic crack detection

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Claytor, T.N.; Groenwald, R.

    1983-10-01

    A program is under way to assess the effectiveness of current and proposed techniques for acoustic leak detection (ALD) in reactor coolant systems. An ALD facility has been constructed and tests have begun on five laboratory-grown cracks (three fatigue and two thermal-fatigue and two field-induced IGSCC specimens. After ultrasonic testing revealed cracks in the Georgia Power Co. HATCH-1 BWR recirculation header, the utility installed an ALD system. Data from HATCH-1 have given an indication of the background noise level at a BWR recirculation header sweepolet weld. The HATCH leak detection system was tested to determine the sensitivity and dynamic range. Other background data have been acquired at the Watts Bar Nuclear Reactor in Tennessee. An ANL waveguide system, including transducer and electronics, was installed and tested on an accumulator safety injection pipe. The possibility of using ultrasonic wave scattering patterns to discriminate between IGSCCs and geometric reflectors has been explored. Thirteen reflectors (field IGSCCs, graphite wool IGSCCs, weld roots, and slits) were examined. Work with cast stainless steel (SS) included sound velocity and attenuation in isotropic and anisotropic cast SS. Reducing anisotropy does not help reduce attenuation in large-grained material. Large artificial flaws (e.g., a 1-cm-deep notch with a 4-cm path) could not be detected in isotropic centrifugally cast SS (1 to 2-mm grains) by longitudinal or shear waves at frequencies of 1 MHz or greater, but could be detected with 0.5-MHz shear waves. 13 figures

  3. Numerical Study on POSRV Leak Detection

    International Nuclear Information System (INIS)

    Ko, Yong Sang; Baik, Se Jin; Cho, Yoon Jae; Yune, Seok Jeong; Kim, Eun Kee

    2015-01-01

    This study shows that the selected temperature measuring locations on the discharge lines of MV, MOPV, SLPV0 and SLPV1 are adequate for POSRV leakage detection. The analyzed temperature can be used as an alarm setpoint for leakage detection. Spring-Loaded Pilot Valve (SLPV) acts as a Reactor Coolant Pressure Boundary (RCPB) isolator in the closed position during the normal operation, but it opens automatically when the system pressure increases to its set pressure. The POSRVs shall be closed tightly to maintain the integrity of RCPB during the normal operation. Leakage through the RCPB is limited extremely. Each POSRV has several discharge lines for MV and auxiliary valves. Temperature instruments are installed on each discharge lines for leakage detection. In this study, Computational Fluid Dynamics (CFD) analyses using FLUENT are conducted to evaluate the temperature measurement for POSRV leakage detection. The followings are concluded from this study: 1) The determined temperature measuring points are adequate for effective leak detection, which are at the downstream of the first bend of each discharge line as close as to the discharge nozzle. 2) The alarm set point for detecting a leak is adequate and can be determined with considering the analysis results. 3) The temperature rise is sufficiently high to detect a small leakage. 4) The temperature sensing method is appropriate for finding a valve leakage

  4. Pipeline leak detection and location by on-line-correlation with a process computer

    International Nuclear Information System (INIS)

    Siebert, H.; Isermann, R.

    1977-01-01

    A method for leak detection using a correlation technique in pipelines is described. For leak detection and also for leak localisation and estimation of the leak flow recursive estimation algorithms are used. The efficiency of the methods is demonstrated with a process computer and a pipeline model operating on-line. It is shown that very small leaks can be detected. (orig.) [de

  5. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  6. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  7. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  8. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  9. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  10. Risk Factors for Gastrointestinal Leak after Bariatric Surgery: MBASQIP Analysis.

    Science.gov (United States)

    Alizadeh, Reza Fazl; Li, Shiri; Inaba, Colette; Penalosa, Patrick; Hinojosa, Marcelo W; Smith, Brian R; Stamos, Michael J; Nguyen, Ninh T

    2018-03-30

    Gastrointestinal leak remains one of the most dreaded complications in bariatric surgery. We aimed to evaluate risk factors and the impact of common perioperative interventions on the development of leak in patients who underwent laparoscopic bariatric surgery. Using the 2015 database of accredited centers, data were analyzed for patients who underwent laparoscopic sleeve gastrectomy or Roux-en-Y gastric bypass (LRYGB). Emergent, revisional, and converted cases were excluded. Multivariate logistic regression was used to analyze risk factors for leak, including provocative testing of anastomosis, surgical drain placement, and use of postoperative swallow study. Data from 133,478 patients who underwent laparoscopic sleeve gastrectomy (n = 92,495 [69.3%]) and LRYGB (n = 40,983 [30.7%]) were analyzed. Overall leak rate was 0.7% (938 of 133,478). Factors associated with increased risk for leak were oxygen dependency (adjusted odds ratio [AOR] 1.97), hypoalbuminemia (AOR 1.66), sleep apnea (AOR 1.52), hypertension (AOR 1.36), and diabetes (AOR 1.18). Compared with LRYGB, laparoscopic sleeve gastrectomy was associated with a lower risk of leak (AOR 0.52; 95% CI 0.44 to 0.61; p leak rate was higher in patients with vs without a provocative test (0.8% vs 0.4%, respectively; p leak rate was higher in patients with vs without a surgical drain placed (1.6% vs 0.4%, respectively; p leak rate was similar between patients with vs without swallow study (0.7% vs 0.7%; p = 0.50). The overall rate of gastrointestinal leak in bariatric surgery is low. Certain preoperative factors, procedural type (LRYGB), and interventions (intraoperative provocative test and surgical drain placement) were associated with a higher risk for leaks. Copyright © 2018 American College of Surgeons. Published by Elsevier Inc. All rights reserved.

  11. Crow Ressurection: The Future of Airborne Electronic Attack

    Science.gov (United States)

    2013-06-01

    strike assets by attempting to gain and maintain control of the electromagnetic spectrum. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...receiving his commission through Officer Training School in 2000, Major Howard served as an RC-135V/W RIVET JOINT EWO at Offutt AFB, Nebraska...significant Airborne Electronic Attack challenges in protecting strike assets by attempting to gain and maintain control of the electromagnetic spectrum

  12. Prospective Vigilance: Assessing Complex Coordinated Attack Preparedness Programs

    Science.gov (United States)

    2017-12-01

    INTENTIONALLY LEFT BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CCA complex coordinate attack EMS emergency medical services FBI Federal Bureau...the Bombings in London on 7th July 2005, vol. HC 1087 (London: The Stationery Office, 2006), https://www.gov.uk/government/uploads/system/uploads...School Center for Homeland Defense and Security Mobile Education Team, DHS Office of Bombing Prevention, and DHS Active Shooter training. 55 NCTC, DHS

  13. Retrospective review of previous minor leak before major subarachnoid hemorrhage diagnosed by MRI as a predictor of occurrence of symptomatic delayed cerebral ischemia.

    Science.gov (United States)

    Oda, Shinri; Shimoda, Masami; Hirayama, Akihiro; Imai, Masaaki; Komatsu, Fuminari; Shigematsu, Hideaki; Nishiyama, Jun; Hotta, Kazuko; Matsumae, Mitsunori

    2018-02-01

    OBJECTIVE This study attempted to determine whether a previous minor leak correlated with the occurrence of symptomatic delayed cerebral ischemia (sDCI). METHODS The authors retrospectively evaluated sDCI-related clinical features and findings from MRI, including T1-weighted imaging (T1WI)-FLAIR mismatch at the time of admission, in 151 patients admitted with subarachnoid hemorrhage (SAH) within 48 hours of ictus. RESULTS The overall incidence of sDCI was 23% (35 of 151 patients). In all subjects, multivariate analysis revealed that World Federation of Neurosurgical Societies Grades II-V, age 70 years or older, presence of rebleeding after admission, a previous minor leak before the major SAH attack as diagnosed by T1WI-FLAIR mismatch, acute infarction on diffusion-weighted imaging, and CT SAH score were significantly associated with occurrence of sDCI. In patients with no previous minor leak before major SAH as diagnosed by T1WI-FLAIR mismatch, the incidence of sDCI was only 7% (7 of 97 patients). CONCLUSIONS A previous minor leak before major SAH as diagnosed by T1WI-FLAIR mismatch represents an important sDCI-related factor. When the analysis was restricted to patients with true acute SAH without a previous minor leak diagnosed by T1WI-FLAIR mismatch, the incidence of sDCI was extremely low.

  14. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  15. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  16. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  17. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  18. Leak detection system for a high temperature fluid pipe

    International Nuclear Information System (INIS)

    Puyal, C.; Meuwisse, C.

    1989-01-01

    The leak detection system is made by a cable with at least two isolated electrical conductors, close to the wall of the pipe. The material of the cable is chosen so as to change its electrical characteristics if a leak causes heating of the cable. A detector at one end of the cable can measure the modifications of the electrical characteristics [fr

  19. Cook Strait cable leak investigation, March-June 1985

    International Nuclear Information System (INIS)

    Barry, B.J.; Fitzgerald, G.J.

    1985-09-01

    An investigation was made to locate a gas leak in an under-sea electric power cable. Krypton-85 was used as the tracer. Despite problems with the investigation there was strong evidence to suggest that the leak was in the joint between the land and sea portions of the cable. (auths)

  20. 241-AY-102 Leak Detection Pit Drain Line Inspection Report

    International Nuclear Information System (INIS)

    Boomer, Kayle D.; Engeman, Jason K.; Gunter, Jason R.; Joslyn, Cameron C.; Vazquez, Brandon J.; Venetz, Theodore J.; Garfield, John S.

    2014-01-01

    This document provides a description of the design components, operational approach, and results from the Tank AY-102 leak detection pit drain piping visual inspection. To perform this inspection a custom robotic crawler with a deployment device was designed, built, and operated by IHI Southwest Technologies, Inc. for WRPS to inspect the 6-inch leak detection pit drain line

  1. Leak detection in LMFBR steam generators during operation

    Energy Technology Data Exchange (ETDEWEB)

    Dumm, K [INTERATOM, Bergisch Gladbach (Germany)

    1978-10-01

    This paper deals with the following four main aspects: requirement on the leak detection of the SNR-300 steam generators; the hydrogen detector of SNR-300; remarks on the disadvantage of impurity detectors; and the first approach to acoustic leak detection systems.

  2. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    International Nuclear Information System (INIS)

    KOCH, M.R.; JOHNS, B.R.

    1999-01-01

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping and Instrumentation Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis

  3. Leak detection in LMFBR steam generators during operation

    International Nuclear Information System (INIS)

    Dumm, K.

    1978-01-01

    This paper deals with the following four main aspects: requirement on the leak detection of the SNR-300 steam generators; the hydrogen detector of SNR-300; remarks on the disadvantage of impurity detectors; and the first approach to acoustic leak detection systems

  4. Reliability evaluation of the Savannah River reactor leak detection system

    International Nuclear Information System (INIS)

    Daugherty, W.L.; Sindelar, R.L.; Wallace, I.T.

    1991-01-01

    The Savannah River Reactors have been in operation since the mid-1950's. The primary degradation mode for the primary coolant loop piping is intergranular stress corrosion cracking. The leak-before-break (LBB) capability of the primary system piping has been demonstrated as part of an overall structural integrity evaluation. One element of the LBB analyses is a reliability evaluation of the leak detection system. The most sensitive element of the leak detection system is the airborne tritium monitors. The presence of small amounts of tritium in the heavy water coolant provide the basis for a very sensitive system of leak detection. The reliability of the tritium monitors to properly identify a crack leaking at a rate of either 50 or 300 lb/day (0.004 or 0.023 gpm, respectively) has been characterized. These leak rates correspond to action points for which specific operator actions are required. High reliability has been demonstrated using standard fault tree techniques. The probability of not detecting a leak within an assumed mission time of 24 hours is estimated to be approximately 5 x 10 -5 per demand. This result is obtained for both leak rates considered. The methodology and assumptions used to obtain this result are described in this paper. 3 refs., 1 fig., 1 tab

  5. Prediction of Gas Leak Tightness of Superplastically Formed Products

    NARCIS (Netherlands)

    Snippe, Q.H.C.; Meinders, Vincent T.; Barlat, F; Moon, Y.H.; Lee, M.G.

    2010-01-01

    In some applications, in this case an aluminium box in a subatomic particle detector containing highly sensitive detecting devices, it is important that a formed sheet should show no gas leak from one side to the other. In order to prevent a trial-and-error procedure to make this leak tight box, a

  6. Coil embolization of an anastomotic leak after ascending aorta replacement

    DEFF Research Database (Denmark)

    Nørgaard, Anders; Andersen, Lars Ib; Haahr, P.E.

    2008-01-01

    treated aneurysm in the ascending thoracic aorta complicated with an anastomotic leak. If a short prosthesis (6 cm) had been available, the anastomotic leak would have been treated with endovascular repair. In lack of this prosthesis, we were forced to treat the patient with a method not generally...

  7. Air leak after lung resection: pathophysiology and patients' implications.

    Science.gov (United States)

    Pompili, Cecilia; Miserocchi, Giuseppe

    2016-02-01

    Protocols for the management of air leaks are critical aspects in the postoperative course of patients following lung resections. Many investigations in the last decade are focusing on the chest tube modalities or preventative measures, however, little is known about the pathophysiology of air leak and the patient perception of this common complication. This review concentrates on understanding the reasons why a pulmonary parenchyma may start to leak or an air leak may be longer than others. Experimental works support the notion that lung overdistension may favor air leak. These studies may represent the basis of future investigations. Furthermore, the standardization of nomenclature in the field of pleural space management and the creation of novel air leak scoring systems have contributed to improve the knowledge among thoracic surgeons and facilitate the organization of trials on this matter. We tried to summarize available evidences about the patient perception of a prolonged air leak and about what would be useful for them in order to prevent worsening of their quality of life. Future investigations are warranted to better understand the pathophysiologic mechanisms responsible of prolonged air leak in order to define tailored treatments and protocols. Improving the care at home with web-based telemonitoring or real time connected chest drainage may in a future improve the quality of life of the patients experience this complication and also enhance hospital finances.

  8. Measurement error in pressure-decay leak testing

    International Nuclear Information System (INIS)

    Robinson, J.N.

    1979-04-01

    The effect of measurement error in presssure-decay leak testing is considered, and examples are presented to demonstrate how it can be properly accomodated in analyzing data from such tests. Suggestions for more effective specification and conduct of leak tests are presented

  9. Cooling device for leaking fluid from a centrifugal pump

    International Nuclear Information System (INIS)

    Raymond, J.R.; Thomson, C.I.

    1978-01-01

    The patented device consists of an integrated heat exchanger in a centrifugal primary cooling circuit pump whose purpose is to cool the coolant medium which leaks along the pump shaft so that the shaft seals are not damaged. The cooling water passes through spirally arranged banks of tubes round the shaft, with baffle plates to direct the leaking coolant. (JIW)

  10. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  11. Leaking tankers: how much oil was spilled?

    International Nuclear Information System (INIS)

    Simecek-Beatty, D. A.; Lehr, W. J.; Lankford, J. F.

    1997-01-01

    A model to estimate leak rates from tankers has been developed for use in emergency situations when more direct oil-loss estimation methods are not available. The model includes algorithms for gravity outflow and air and water ingestion. Three laboratory tests were conducted using fresh water and canola oil to evaluate the model output. Comparison with results from the laboratory experiments indicate good correlation of model results with measured data. However, it is not yet possible in the case of very large crude carriers to answer the question 'how much oil was spilled?' Sensitivity analysis and further laboratory testing were suggested to determine the effect of factors such as: pressure vacuum relief valves that prevent cavitation in the event of tank puncture; changing outside water levels due to wave and tidal action; tank and hole dimensions; and the amount and density of the product.10 refs., 4 figs

  12. Applicability of the leak before break concept

    International Nuclear Information System (INIS)

    1993-06-01

    Within the framework of the IAEA Extrabudgetary Programme on the Safety of WWER-440 Model 230 NPPs, a list of safety issues requiring broad studies of general interest have been agreed upon by an Advisory Group which met in Vienna in September 1990. The information on the status of the issues, and on amount of work already completed and under way in various countries, needs to be compiled. Moreover, an evaluation of what further work is required to resolve each of the issues is also necessary. In view of this, the IAEA has started the preparation of a series of status reports on the various issues. This report on the generic safety issue ''Applicability of the Leak Before Break Concept'' presents a comprehensive survey of technical information available in the field and identifies those which require further investigation. 50 refs, 15 figs, 2 tabs

  13. Fully automatic AI-based leak detection system

    Energy Technology Data Exchange (ETDEWEB)

    Tylman, Wojciech; Kolczynski, Jakub [Dept. of Microelectronics and Computer Science, Technical University of Lodz in Poland, ul. Wolczanska 221/223, Lodz (Poland); Anders, George J. [Kinectrics Inc., 800 Kipling Ave., Toronto, Ontario M8Z 6C4 (Canada)

    2010-09-15

    This paper presents a fully automatic system intended to detect leaks of dielectric fluid in underground high-pressure, fluid-filled (HPFF) cables. The system combines a number of artificial intelligence (AI) and data processing techniques to achieve high detection capabilities for various rates of leaks, including leaks as small as 15 l per hour. The system achieves this level of precision mainly thanks to a novel auto-tuning procedure, enabling learning of the Bayesian network - the decision-making component of the system - using simulated leaks of various rates. Significant new developments extending the capabilities of the original leak detection system described in and form the basis of this paper. Tests conducted on the real-life HPFF cable system in New York City are also discussed. (author)

  14. Steam leak detection method in pipeline using histogram analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Se Oh; Jeon, Hyeong Seop; Son, Ki Sung; Chae, Gyung Sun [Saean Engineering Corp, Seoul (Korea, Republic of); Park, Jong Won [Dept. of Information Communications Engineering, Chungnam NationalUnversity, Daejeon (Korea, Republic of)

    2015-10-15

    Leak detection in a pipeline usually involves acoustic emission sensors such as contact type sensors. These contact type sensors pose difficulties for installation and cannot operate in areas having high temperature and radiation. Therefore, recently, many researchers have studied the leak detection phenomenon by using a camera. Leak detection by using a camera has the advantages of long distance monitoring and wide area surveillance. However, the conventional leak detection method by using difference images often mistakes the vibration of a structure for a leak. In this paper, we propose a method for steam leakage detection by using the moving average of difference images and histogram analysis. The proposed method can separate the leakage and the vibration of a structure. The working performance of the proposed method is verified by comparing with experimental results.

  15. The benefits of SCADA integrated pipeline leak detection

    Energy Technology Data Exchange (ETDEWEB)

    Pichler, Ruprecht M.J. [Pichler Engineering GmbH, Munich (Germany)

    2003-07-01

    Software based leak detection and locating for pipelines based upon evaluation of hydraulic parameters is a widely used approach to online pipeline integrity monitoring. Typically, these software packages are installed in a stand-alone configuration with a narrow bandwidth interface to the pipeline SCADA system. However, the performance characteristics of the SCADA system and interface do have a substantial impact on the performance of the leak detection system. By a tight integration of leak detection software into the SCADA system, a source of false alarms typically experienced with leak detection systems can be eliminated, the overall performance of the leak detection system can be improved, and the project costs can be reduced. (author)

  16. Reliability of leak detection systems in light water reactors

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1987-01-01

    US Nuclear Regulatory Commission Guide 1.45 recommends the use of at least three different detection methods in reactors to detect leakage. Monitoring of both sump-flow and airborne particulate radioactivity is recommended. A third method can involve either monitoring of condensate flow rate from air coolers or monitoring of airborne gaseous radioactivity. Although the methods currently used for leak detection reflect the state of the art, other techniques may be developed and used. Since the recommendations of Regulatory Guide 1.45 are not mandatory, the technical specifications for 74 operating plants have been reviewed to determine the types of leak detection methods employed. In addition, Licensee Event Report (LER) Compilations from June 1985 to June 1986 have been reviewed to help establish actual capabilities for detecting leaks and determining their source. Work at Argonne National Laboratory has demonstrated that improvements in leak detection, location, and sizing are possible with advanced acoustic leak detection technology

  17. Evaluation of methodologies for the calculation of leak rates for pressure retaining components with crack-like leaks

    International Nuclear Information System (INIS)

    Sievers, Juergen; Heckmann, Klaus; Blaesius, Christoph

    2015-06-01

    For the demonstration of break preclusion for pressure retaining components in nuclear power plants, the nuclear safety standard KTA 3206 determines also the requirements for the leak-before-break verification. For this procedure, it has to be ensured that a wall-penetrating crack is subcritical with respect to instable growth, and that the resulting leakage under stationary operation conditions can be detected by a leak detection system. Within the scope of the project 3613R01332 analyses with respect to conservative estimates of the leak rates in case of detections regarding break preclusion were performed by means of leak rate models being available at GRS. For this purpose, conservative assumptions in the procedure were quantified by comparative calculations concerning selected leak rate experiments and the requirements regarding the determination of leak rates indicated in the KTA 3206 were verified and specified. Moreover, the models were extended and relevant recommendations for the calculation procedure were developed. During the investigations of leak rate tests the calculation methods were validated, qualified by means of both examples indicated in KTA 3206 and applied to a postulated leak accident in the cooling circuit of a PWR. For the calculation of leak rates several simplified solution methods which are included in the GRS program WinLeck were applied, and for the simulation of a leak accident the large-scale programs ANSYS Mechanical and ATHLET (thermohydraulics program developed by GRS) were used. When applying simplified methods for the calculation of leak rates using the limiting curve for the friction factor which has been derived during the project and which is included in the KTA 3206 attention has to be paid to the fact that in case of small flow lengths the entrance loss can dominate compared to the friction loss. However, the available data do not suffice in order to make a quantitative statement with respect to limits of applicability

  18. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  19. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  20. Transcatheter closure of paravalvular leaks using a paravalvular leak device – a prospective Polish registry

    Directory of Open Access Journals (Sweden)

    Grzegorz Smolka

    2016-05-01

    Full Text Available Introduction : Transcatheter paravalvular leak closure (TPVLC has become an established treatment option but is mostly performed with off-label use of different non-dedicated occluders. The first one specifically designed for TPVLC is the paravalvular leak device (PLD – Occlutech. Aim : We present initial short-term results of a prospective registry intended to assess the safety and efficacy of TPVLC with PLD. Material and methods : We screened patients with paravalvular leak (PVL after surgical valve replacement (SVR. Heart failure symptoms and/or hemolytic anemia were indications for TPVLC. Patients were selected according to PVL anatomy by RT 3D TEE. Only those considered appropriate for closure with a single PLD were enrolled. The procedures were performed via transvascular or transapical access using type W (waist PLDs only. Results : Thirty patients with 34 PVLs (18 aortic, 16 mitral were included. We implanted 35 PLDs with a total device success rate of 94.3% (100% for aortic, 88.2% for mitral. The procedural success rate, encompassing device success without in-hospital complications, was 94.1% (100% for aortic, 93.8% for mitral. During the follow-up period we recorded an increase of hemoglobin concentration (3.9 to 4.1 g/dl, red blood count (11.6 to 12.2 M/mm3 and functional improvement by NYHA class. Conclusions : Paravalvular leak device type W is a promising TPVLC device, but meticulous preselection of patients based on imaging of PVL anatomy is a prerequisite. A PLD should only be chosen for channels shorter than 5 mm. Size of the device should match the PVL cross-sectional area without any oversizing. Such an approach facilitates high device and procedural success rates.

  1. Steam leak detection in advance reactors via acoustics method

    International Nuclear Information System (INIS)

    Singh, Raj Kumar; Rao, A. Rama

    2011-01-01

    Highlights: → Steam leak detection system is developed to detect any leak inside the reactor vault. → The technique uses leak noise frequency spectrum for leak detection. → Testing of system and method to locate the leak is also developed and discussed in present paper. - Abstract: Prediction of LOCA (loss of coolant activity) plays very important role in safety of nuclear reactor. Coolant is responsible for heat transfer from fuel bundles. Loss of coolant is an accidental situation which requires immediate shut down of reactor. Fall in system pressure during LOCA is the trip parameter used for initiating automatic reactor shut down. However, in primary heat transport system operating in two phase regimes, detection of small break LOCA is not simple. Due to very slow leak rates, time for the fall of pressure is significantly slow. From reactor safety point of view, it is extremely important to find reliable and effective alternative for detecting slow pressure drop in case of small break LOCA. One such technique is the acoustic signal caused by LOCA in small breaks. In boiling water reactors whose primary heat transport is to be driven by natural circulation, small break LOCA detection is important. For prompt action on post small break LOCA, steam leak detection system is developed to detect any leak inside the reactor vault. The detection technique is reliable and plays a very important role in ensuring safety of the reactor. Methodology developed for steam leak detection is discussed in present paper. The methods to locate the leak is also developed and discussed in present paper which is based on analysis of the signal.

  2. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  3. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  4. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  5. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  6. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  7. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  8. Study on Leak Detection of the Pipeline System by Acoustic Emission

    International Nuclear Information System (INIS)

    Yoon, D. J.; Kim, C. J.

    1987-01-01

    Leak detection testing for the pipeline system was performed by the acoustic emission method. It was found that the detected signal spectrum was influenced by the frequency response of sensors and pressure changes. AE parameters and frequency spectrum distributions were used to analyze the leak signals. The slope rise time of AE parameters were the important factors for distinguishing leak signals. The amplitude of leak signal was more affected by the changes of leak, rate and pressure than those of leak type

  9. ISS Ammonia Leak Detection Through X-Ray Fluorescence

    Science.gov (United States)

    Camp, Jordan; Barthelmy, Scott; Skinner, Gerry

    2013-01-01

    Ammonia leaks are a significant concern for the International Space Station (ISS). The ISS has external transport lines that direct liquid ammonia to radiator panels where the ammonia is cooled and then brought back to thermal control units. These transport lines and radiator panels are subject to stress from micrometeorites and temperature variations, and have developed small leaks. The ISS can accommodate these leaks at their present rate, but if the rate increased by a factor of ten, it could potentially deplete the ammonia supply and impact the proper functioning of the ISS thermal control system, causing a serious safety risk. A proposed ISS astrophysics instrument, the Lobster X-Ray Monitor, can be used to detect and localize ISS ammonia leaks. Based on the optical design of the eye of its namesake crustacean, the Lobster detector gives simultaneously large field of view and good position resolution. The leak detection principle is that the nitrogen in the leaking ammonia will be ionized by X-rays from the Sun, and then emit its own characteristic Xray signal. The Lobster instrument, nominally facing zenith for its astrophysics observations, can be periodically pointed towards the ISS radiator panels and some sections of the transport lines to detect and localize the characteristic X-rays from the ammonia leaks. Another possibility is to use the ISS robot arm to grab the Lobster instrument and scan it across the transport lines and radiator panels. In this case the leak detection can be made more sensitive by including a focused 100-microampere electron beam to stimulate X-ray emission from the leaking nitrogen. Laboratory studies have shown that either approach can be used to locate ammonia leaks at the level of 0.1 kg/day, a threshold rate of concern for the ISS. The Lobster instrument uses two main components: (1) a microchannel plate optic (also known as a Lobster optic) that focuses the X-rays and directs them to the focal plane, and (2) a CCD (charge

  10. Leak testing of cryogenic components — problems and solutions

    Science.gov (United States)

    Srivastava, S. P.; Pandarkar, S. P.; Unni, T. G.; Sinha, A. K.; Mahajan, K.; Suthar, R. L.

    2008-05-01

    A prototype of Cold Neutron Source (CNS) for Dhruva Reactor is being manufactured at Centre for Design and Manufacture (CDM), BARC, Mumbai for validating the mechanical and thermal engineering design aspects, besides checking the integrity of all joints and components at low temperature, 77K. Task of a Cold Neutron Source is to generate cold neutrons by cooling down the thermal neutrons, which are originally produced in a nuclear research reactor. The complete Cold Neutron Source system comprises a complex arrangement of moderator pot, transfer line (piping), pumps, refrigerators, storage tanks, a heat exchanger and associated controls and instrumentation. The heart of the system is moderator pot in which water (moderator) is cooled down by Liquid Nitrogen (LN2) being circulated through an annular cavity machined on the walls of the pot. Transfer lines for LN2 basically consist of two concentric Stainless Steel flexible pipes, which are joined to the inlet and outlet Aluminium tubes of the moderator pot through transition joints. Leak in any component may result in loss of liquid Nitrogen, degradation of vacuum, which in turn may affect the heat removal efficiency of the source. Hence, leak testing was considered a very important quality control tool and all joints and components were subjected to helium leak test using mass spectrometer leak detector (MSLD) at cryogenic temperature. During one of the earlier experiments, flow of LN2 through inner flexible pipe of the transfer line resulted in rise of pressure in the vacuum annulus and sweating on the outer flexible pipe. After investigations it was found that large thermal stress compounded with mechanical stress resulted in cracks in the inner pipe. Accordingly design was modified to get leak proof transfer line assembly. Further, during leak testing of thin wall moderator pot, gross leak was observed on the outer jacket welded joint. Leak was so large that even a small amount of Helium gas in the vicinity of the

  11. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  12. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  13. Air-Leak Effects on Ear-Canal Acoustic Absorbance

    Science.gov (United States)

    Rasetshwane, Daniel M.; Kopun, Judy G.; Gorga, Michael P.; Neely, Stephen T.

    2015-01-01

    Objective: Accurate ear-canal acoustic measurements, such as wideband acoustic admittance, absorbance, and otoacoustic emissions, require that the measurement probe be tightly sealed in the ear canal. Air leaks can compromise the validity of the measurements, interfere with calibrations, and increase variability. There are no established procedures for determining the presence of air leaks or criteria for what size leak would affect the accuracy of ear-canal acoustic measurements. The purpose of this study was to determine ways to quantify the effects of air leaks and to develop objective criteria to detect their presence. Design: Air leaks were simulated by modifying the foam tips that are used with the measurement probe through insertion of thin plastic tubing. To analyze the effect of air leaks, acoustic measurements were taken with both modified and unmodified foam tips in brass-tube cavities and human ear canals. Measurements were initially made in cavities to determine the range of critical leaks. Subsequently, data were collected in ears of 21 adults with normal hearing and normal middle-ear function. Four acoustic metrics were used for predicting the presence of air leaks and for quantifying these leaks: (1) low-frequency admittance phase (averaged over 0.1–0.2 kHz), (2) low-frequency absorbance, (3) the ratio of compliance volume to physical volume (CV/PV), and (4) the air-leak resonance frequency. The outcome variable in this analysis was the absorbance change (Δabsorbance), which was calculated in eight frequency bands. Results: The trends were similar for both the brass cavities and the ear canals. ΔAbsorbance generally increased with air-leak size and was largest for the lower frequency bands (0.1–0.2 and 0.2–0.5 kHz). Air-leak effects were observed in frequencies up to 10 kHz, but their effects above 1 kHz were unpredictable. These high-frequency air leaks were larger in brass cavities than in ear canals. Each of the four predictor variables

  14. Incidence and risk factors predisposing anastomotic leak after transhiatal esophagectomy

    International Nuclear Information System (INIS)

    Tabatabai, Abbas; Hashemi, Mozaffar; Mohajeri, Gholamreza; Ahmadinejad, Mojtaba; Khan, Ishfaq Abass; Haghdani, Saeid

    2009-01-01

    The objective of our study was to identify the incidence and risk factors of anastomotic leaks following transhiatal esophagectomy (THE). A prospective study was conducted on 61 patients treated for carcinoma of the esophagus between 2006 and 2007. We examined the following variables: age, gender, preoperative cardiovascular function, intraoperative complications such as hypotension, arrhythmia, mediastinal manipulation period, blood loss volume, blood transfusion, duration of surgery, postoperative complications such as anastomotic leak, anastomotic stricture, requiring reoperation, respiratory complications, and total morbidity and mortality. Variables were compared between the patients with and without anastomotic leak. T-test for quantitative variables and Chi-square test for qualitative variables were used to find out any relationship. P value less than 0.05 was considered significant. Out of 61 patients, anastomotic leaks occurred in 13 (21.3%). Weight loss, forced expiratory volume (FEV1) < 2 lit, preoperative albumin, intaoperative blood loss volume, and respiratory complication were associated with the anastomotic leak in patients undergoing THE. Anastomotic leaks were the leading cause of postoperative morbidity, anastomotic stricture, and reoperation. Anastomotic leakage is a life-threatening postoperative complication. Careful attention to the factors contributing to the development of a leak can reduce the incidence of anastomotic complications postoperatively. (author)

  15. Hollow-core fiber sensing technique for pipeline leak detection

    Science.gov (United States)

    Challener, W. A.; Kasten, Matthias A.; Karp, Jason; Choudhury, Niloy

    2018-02-01

    Recently there has been increased interest on the part of federal and state regulators to detect and quantify emissions of methane, an important greenhouse gas, from various parts of the oil and gas infrastructure including well pads and pipelines. Pressure and/or flow anomalies are typically used to detect leaks along natural gas pipelines, but are generally very insensitive and subject to false alarms. We have developed a system to detect and localize methane leaks along gas pipelines that is an order of magnitude more sensitive by combining tunable diode laser spectroscopy (TDLAS) with conventional sensor tube technology. This technique can potentially localize leaks along pipelines up to 100 km lengths with an accuracy of +/-50 m or less. A sensor tube buried along the pipeline with a gas-permeable membrane collects leaking gas during a soak period. The leak plume within the tube is then carried to the nearest sensor node along the tube in a purge cycle. The time-to-detection is used to determine leak location. Multiple sensor nodes are situated along the pipeline to minimize the time to detection, and each node is composed of a short segment of hollow core fiber (HCF) into which leaking gas is transported quickly through a small pressure differential. The HCF sensing node is spliced to standard telecom solid core fiber which transports the laser light for spectroscopy to a remote interrogator. The interrogator is multiplexed across the sensor nodes to minimize equipment cost and complexity.

  16. Detection of steam generator tube leaks in pressurized water reactors

    International Nuclear Information System (INIS)

    Roach, W.H.

    1985-01-01

    This report addresses the early detection of small steam generator tube leaks in pressurized water reactors. It discusses the third, and final, year's work on an NRC-funded project examining diagnostic instrumentation in water reactors. The first two years were broad in coverage, concentrating on anticipatory measurements for detection of potential problems in both pressurized- and boiling-water reactors, with recommendations for areas of further study. One of these areas, the early detection of small steam tube leaks in PWRs, formed the basis of study for the last year of the project. Four tasks are addressed in this study of the detection of steam tube leaks. (1) Determination of which physical parameters indicate the onset of steam generator tube leaks. (2) Establishing performance goals for diagnostic instruments which could be used for early detection of steam generator tube leaks. (3) Defining the diagnostic instrumentation and their location which satisfy Items 1 and 2 above. (4) Assessing the need for diagnostic data processing and display. Parameters are identified, performance goals established, and sensor types and locations are specified in the report, with emphasis on the use of existing instrumentation with a minimum of retrofitting. A simple algorithm is developed which yields the leak rate as a function of known or measurable quantities. The conclusion is that leak rates of less than one-tenth gram per second should be detectable with existing instrumentation. (orig./HP)

  17. Study on the leak rate test for HANARO reactor building

    International Nuclear Information System (INIS)

    Choi, Y. S.; Kim, Y. K.; Kim, M. J.; Park, J. M.; Woo, J. S.

    2002-01-01

    The reactor building of HANARO adopts the confinement concept, which allows a certain amount of air leakage. In order to restrict the air leakage through the confinement boundary, negative pressure of at least 2.5 mmWG is maintained in normal operating condition while maintaining 25 mmWG of negative pressure in abnormal condition, the inside air filtered by a train of charcoal filter is released to the atmosphere through the stack. In this situation, if the emergency ventilation system is not operable, the reactor building is isolated from the outside then the trapped air inside will be leaked out through the building by ground release concept. As the leak rate may be affected by an effect of wind velocity outside the reactor building, the air tightness of confinement should be maintained to limit the leak rate below the allowable value. The local leak rate test method was used since the beginning of the commissioning until July 1999. However it has been pointed out as a defect that the method is so susceptible to the change of temperature and atmospheric pressure during testing. For more accurate leak rate testing, we have introduced a new test method. We have periodically carried out the new leak rate testing and the results indicate that the bad effect by the temperature and atmospheric pressure change is considerably reduced, which gives more stable leak rate measurement

  18. Method of judging leak sources in a reactor container

    International Nuclear Information System (INIS)

    Maeda, Katsuji.

    1984-01-01

    Purpose: To enable exact judgement for leak sources upon leak accident in a reactor container of BWR type power plants as to whether the sources are present in the steam system or coolant system. Method: If leak is resulted from the main steam system, the hydrogen density in the reactor container is about 170 times as high as the same amount of leak from the reactor water. Accordingly, it can be judged whether the leak source is present in the steam system or reactor water system based on the change in the indication of hydrogen densitometer within the reactor container, and the indication from the drain amount from the sump in the container or the indication of a drain flow meter in the container dehumidifier. Further, I-131, Na-24 and the like as the radioactive nucleides in sump water of the container are measured to determine the density ratio R = (I-131)/(Na-24), and it is judged that the leak is resulted in nuclear water if the density ratio R is equal to that of reactor water and that the leak is resulted from the main steam or like other steam system if the density ratio R is higher than by about 100 times than that of reactor water. (Horiuchi, T.)

  19. Autogenous Metallic Pipe Leak Repair in Potable Water Systems.

    Science.gov (United States)

    Tang, Min; Triantafyllidou, Simoni; Edwards, Marc A

    2015-07-21

    Copper and iron pipes have a remarkable capability for autogenous repair (self-repair) of leaks in potable water systems. Field studies revealed exemplars that metallic pipe leaks caused by nails, rocks, and erosion corrosion autogenously repaired, as confirmed in the laboratory experiments. This work demonstrated that 100% (N = 26) of 150 μm leaks contacting representative bulk potable water in copper pipes sealed autogenously via formation of corrosion precipitates at 20-40 psi, pH 3.0-11.0, and with upward and downward leak orientations. Similar leaks in carbon steel pipes at 20 psi self-repaired at pH 5.5 and 8.5, but two leaks did not self-repair permanently at pH 11.0 suggesting that water chemistry may control the durability of materials that seal the leaks and therefore the permanence of repair. Larger 400 μm holes in copper pipes had much lower (0-33%) success of self-repair at pH 3.0-11.0, whereas all 400 μm holes in carbon steel pipes at 20 psi self-repaired at pH 4.0-11.0. Pressure tests indicated that some of the repairs created at 20-40 psi ambient pressure could withstand more than 100 psi without failure. Autogenous repair has implications for understanding patterns of pipe failures, extending the lifetime of decaying infrastructure, and developing new plumbing materials.

  20. An algorithm for leak point detection of underground pipelines

    International Nuclear Information System (INIS)

    Lee, Young Sup; Yoon, Dong Jin

    2004-01-01

    Leak noise is a good source to identify the exact location of a leak point of underground water pipelines. Water leak generates broadband noise from a leak location and can be propagated to both directions of water pipes. However, the necessity of long-range detection of this leak location makes to identify low-frequency acoustic waves rather than high frequency ones. Acoustic wave propagation coupled with surrounding boundaries including cast iron pipes is theoretically analyzed and the wave velocity was confirmed with experiment. The leak locations were identified both by the acoustic emission (AE) method and the cross-correlation method. In a short-range distance, both the AE method and cross-correlation method are effective to detect leak position. However, the detection for a long-range distance required a lower frequency range accelerometers only because higher frequency waves were attenuated very quickly with the increase of propagation paths. Two algorithms for the cross-correlation function were suggested, and a long-range detection has been achieved at real underground water pipelines longer than 300 m.

  1. Signs of an asthma attack

    Science.gov (United States)

    ... resources Asthma - children Patient Instructions Asthma and school Asthma - child - discharge Asthma - control drugs Asthma - quick-relief drugs Asthma - what to ask the doctor - adult Asthma - what to ask your doctor - child Exercise-induced asthma Exercising and asthma at school ...

  2. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  3. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  4. An integrated leak detection system for the ALMR steam generator

    International Nuclear Information System (INIS)

    Dayal, Y.; Gaubatz, D.C.; Wong, K.K.; Greene, D.A.

    1995-01-01

    The steam generator (SG) of the Advanced Liquid Metal Reactor (ALMR) system serves as a heat exchanger between the shell side secondary loop hot liquid sodium and the tube side water/steam mixture. A leak in the tube will result in the injection of the higher pressure water/steam into the sodium and cause an exothermic sodium-water reaction. An initial small leak (less than 1 gm/sec) can escalate into an intermediate size leak in a relatively short time by self enlargement of the original flaw and by initiating leaks in neighboring tubes. If not stopped, complete rupture of one or more tubes can cause injection rates of thousands of gm/sec and result in the over pressurization of the secondary loop rupture disk and dumping of the sodium to relieve pressure. The down time associated with severe sodium-water reaction damage has great adverse economic consequence. An integrated leak detection system (ILDS) has been developed which utilizes both chemical and acoustic sensors for improved leak detection. The system provides SG leak status to the reactor operator and is reliable enough to trigger automatic control action to protect the SG. The ILDS chemical subsystem uses conventional in-sodium and cover gas hydrogen detectors and incorporates knowledge based effects due to process parameters for improved reliability. The ILDS acoustic subsystem uses an array of acoustic sensors and incorporates acoustic beamforming technology for highly reliable and accurate leak identification and location. The new ILDS combines the small leak detection capability of the chemical system with the reliability and rapid detection/location capability of the acoustic system to provide a significantly improved level of protection for the SG over a wide range of operation conditions. (author)

  5. Autologous Blood Pleurodesis In Patients With Persistent Air Leaks

    Directory of Open Access Journals (Sweden)

    Agkajanzadeh M

    2003-10-01

    Full Text Available Persistent air leaks occur after Spontaneous pneumothorax both primary and secondary, and after lungs trauma and lung surgeries are sever problems encountered chest surgeons with. Persistent air leak causes longer patients hospitalization."nMaterials and Methods: We used autologous blood pleurodesis in patients with persistent air leak for 30patients with more than 8 days air leaks, during a three years period 1377-1380 (1999-2002."nResults: The patients had 19 years up to 70 years old. Eight patients had thoracotomy and lobectomy and /or segmentectomies 6 with primary pneumothorax, 10 with secondary pneumothorax, and four with penetrated or blunt thoracic traumas. Blood was obtained from femoral or brachial veins and 70-150 mis. Injected in chest tubes. Chest bottle was first lied 80cm higher than body levels. After 24 hours repositioned in normal levels, and patients were supervised. Via chest tube we injected blood 70-100ml.for young patients, and 100-150 ml for older patients into intra pleural space. There were no clamped chest tubes. There were no pain, respiratory distress, fever, or cough in pleurodesized patients. The only patient's complaint was local pain in femoral vein or brachial vein because blood sampling and blood obtaining, although there was no local visible complication as hematoma or bleeding. After 48 hours in 24 patients air leak ceased. In six patients because persistent air leak autologous blood pleurodesis repeated, two patients after 48hours"nair leak ceased, remaining four patients underwent for thoracotomies, success rate"nwas 86.6%."nConclusion: According above success rate we suggest autologous blood pleurodesis in patients with persistent air leak is a reliable, effective, and no complicated procedure for persistent air leaks.

  6. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  7. Pumping and leak detection system of the HL-2A

    International Nuclear Information System (INIS)

    Cao Zeng; Xu Yunxian; Fu Weidong

    2001-01-01

    The pumping system is a combination of 8 turbomolecular pumps with three stages pumping for HL-2A vacuum vessel, a total effective pumping speed at the vessel of 12 m 3 ·s -1 for nitrogen. The leak detection of element and vessel is performed with inspiration, case of leak detection and two mass spectrometry. The total leak rate of vessel is bellow 1 x 10 -5 Pa ·m 3 ·s -1 . The base pressure is 1 x 10 -5 Pa

  8. Timing tests: automatic valve closure for tritium leaks

    International Nuclear Information System (INIS)

    Hanel, S.

    1976-01-01

    How fast can an automotive valve be closed after a tritium leak occurs in a system. Tests described found that a valve can be closed within fifteen seconds of leakage. In one practical example considered, this delay would limit loss of tritium from a plumbing leak in a tritium system to 1 1 / 4 g. The tests were made in a typical LLL air-flush hood in which a tritium handling system had been installed. Incidental observations suggest that further study be made of a possible leak-actuated recovery system for an entire tritium facility

  9. The pressure and leak tests in Atucha II

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    This work deals with the pressure and leak tests of the containment sphere in the Atucha II Nuclear Power Plant's reactor building. This sphere is a metallic container, made in highly resistant steel plate, that is, built for providing the plant with a biological and structural barrier, which -in turn- provides safety and environmental protection. The applicable rules for these tests establish that the containment erection must be complete and in equivalent conditions to those that will prevail during the NPP operation. Particularly, pressure tests were carried out for assessing the structural condition of the sphere, while the leak test is aimed at the detection of tentative leaks [es

  10. Evaluation of primary coolant leaks and assessment of detection methods

    International Nuclear Information System (INIS)

    Cassette, P.; Giroux, C.; Roche, H.; Seveon, J.J.

    1984-11-01

    A review of French PWR situation concerning primary coolant leaks is presented, including a description of operating technical specifications, of the collecting system of primary coolant leakage into the containment and of the detection methods. It is mainly based on a compilation over three years, 1981 to 1983, of almost all occurred leaks, their natures, causes, consequences and methods used for their detection. By analysing these data it is possible to evaluate the efficiency of the primary coolant leak detection system and the problems raised by the compliance with the criteria defined in the operating technical specifications

  11. Evaluation of primary coolant leaks and assessment of detection methods

    International Nuclear Information System (INIS)

    Cassette, P.; Giroux, C.; Roche, H.; Seveon, J.J.

    1986-01-01

    A review of the French PWR situation concerning primary coolant leaks is presented, including a description of operating technical specifications, of the collecting system of primary coolant leakage into the containment and of the detection methods. It is mainly based on a compilation over three years, 1981 to 1983, of almost all actual leaks, their natures, causes, consequences and methods used for their detection. By analysing these data it is possible to evaluate the efficiency of the primary coolant leak detection system and the problems raised by compliance with the criteria defined in the operating technical specifications

  12. Evaluation of methods to leak test sealed radiation sources

    International Nuclear Information System (INIS)

    Arbeau, N.D.; Scott, C.K.

    1987-04-01

    The methods for the leak testing of sealed radiation sources were reviewed. One hundred and thirty-one equipment vendors were surveyed to identify commercially available leak test instruments. The equipment is summarized in tabular form by radiation type and detector type for easy reference. The radiation characteristics of the licensed sources were reviewed and summarized in a format that can be used to select the most suitable detection method. A test kit is proposed for use by inspectors when verifying a licensee's test procedures. The general elements of leak test procedures are discussed

  13. Acoustic Leak Detection under Micro and Small Water Steam Leaks into Sodium for a Protection of the SFR Steam Generator

    International Nuclear Information System (INIS)

    Kim, Tae-Joon; Jeong, Ji-Young; Kim, Jong-Man; Kim, Byung-Ho; Hahn, Do-Hee; Yugay, Valeriy S.

    2008-01-01

    The results of an experimental study of water in a sodium leak noise spectrum formation related with a leak noise attenuation and absorption, and at various rates of water into a sodium leak, smaller than 1.0 g/s, are presented. We focused on studying the micro leak dynamics with an increasing rate of water into sodium owing to a self-development from 0.005 till 0.27 g/s. Conditions and ranges for the existence of bubbling and jetting modes in a water steam outflow into circulating sodium through an injector device, for simulating a defect in a wall of a heat-transmitting tube of a sodium water steam generator were determined. On the basis of the experimental leak noise data the simple dependency of an acoustic signal level from the rate of a micro and small leak at different frequency bands is presented to understand the principal analysis for the development of an acoustic leak detection methodology used in a K- 600 steam generator, with the operational experiences for the noise analysis and measurements in BN-600

  14. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  15. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  16. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  17. Leak detection device on flange surface

    International Nuclear Information System (INIS)

    Hanai, Koi.

    1988-01-01

    Purpose: To improve the response to fine leakage thereby enabling to leakage detection at high sensitivity, by detecting the humidity by the use of an inert dry gas. Constitution: Annular grooves are coaxially engraved to a flange and an annular water channel groove is also engraved between each of the annular grooves. Dry nitrogen flown out is blown along the circumferential direction of the water channel grooves, turned there around and then released from the end of the pipeway. If there is any water leakage, the dry nitrogen absorbs leaked water to be wettened and then reach a humidity sensor. The sensor detects the humidity in the nitrogen and delivers an output into a signal processing circuit. The processing circuit judges the absence or presence of the leakage in accordance with the detected humidity to generate an alarm signal. The time required for the blown out dry nitrogen, which turn around the water channel groove and enter the sensor, is about several minutes and the device shows excellent response even for minute leakage. (Yoshino, Y.)

  18. Mold and Indoor Air Quality in Schools

    Science.gov (United States)

    ... schools have been linked to changes in building construction practices during the past twenty to thirty years. ... or when leaks or spills occur Clean and dry any damp or wet building materials and furnishings ...

  19. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  20. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  1. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  2. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  3. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  4. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  5. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  6. Leak in spiral weld in a 16 inches gas pipeline

    Energy Technology Data Exchange (ETDEWEB)

    Fazzini, Pablo G; Bona, Jeremias de [GIE S.A., Mar del Plata (Argentina); Otegui, Jose L [University of Mar del Plata (Argentina)

    2009-07-01

    This paper discusses a failure analysis after a leak in the spiral weld of a 16 inches natural gas pipeline, in service since 1974. The leak was the result of the coalescence of two different defects, on each surface of the pipe wall, located in the center of the inner cord of the helical DSAW weld. Fractographic and metallographic studies revealed that the leak was a combination of three conditions. During fabrication of the pipe, segregation in grain boundary grouped in mid weld. During service, these segregations underwent a process of selective galvanic corrosion. One of these volumetric defects coincided with a tubular pore in the outer weld. Pigging of the pipeline in 2005 for cleaning likely contributed to the increase of the leak flow, when eliminating corrosion product plugs. Although these defects are likely to repeat, fracture mechanics shows that a defect of this type is unlikely to cause a blowout. (author)

  7. Plasmonic leak-free focusing lens under radially polarized illumination

    International Nuclear Information System (INIS)

    Li, Xiaowei; Tan, Qiaofeng; Bai, Benfeng; Jin, Guofan

    2010-01-01

    A plasmonic leak-free focusing lens with two asymmetric concentric ring slits under radially polarized illumination is proposed. Each ring slit in the plasmonic lens is designed to generate surface plasmon polaritons (SPPs) with a relative initial phase controlled by the ring slit parameters. Through mutual interference of the SPPs with different phases excited by the two concentric ring slits at the output metal–dielectric interface, the field intensity towards the center of the focusing lens can be enhanced while that leaking to the counter-focus direction is effectively suppressed. The optimal parameters of the plasmonic leak-free lens are theoretically obtained by satisfying the above condition and its focusing performance is demonstrated by numerical simulation. Furthermore, a plasmonic leak-free lens with multiple double-slit groups is proposed and discussed, which exhibits a higher energy density at the focusing spot of the output interface

  8. Water leak detection in steam generator of SUPER PHENIX

    International Nuclear Information System (INIS)

    Brunet, M.; Garnaud, P.; Ghaleb, D.; Kong, N.

    1988-01-01

    With the intent of detecting water leaks inside steam generators, we developed a third system, called acoustic detector, to complement hydrogen detectors and rupture disks (burst disks). The role of the acoustic system is to enable rapid intervention in the event of a leak growing rapidly which could rupture neighbouring tubes. In such a case, the detectable flow rate of the leak varies from a few tens of g/s to a few hundred g/s. At the SUPER PHENIX, three teams work in [20-100 kHz] and CEA/STA* [50-300 kHz]. The simulation of water leaks in the steam generator by the argon injections performed to date at 50% of the rated power has shown promising results. An anomaly in the evolution of the background noise at more than 50% loading of one of the two instrumented steam generators would make difficult any extrapolation to full power behaviour. (author)

  9. The world is polluted with leaked cyber data

    CSIR Research Space (South Africa)

    Burke, Ivan D

    2017-10-01

    Full Text Available Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal...

  10. Analysis of Bracket Assembly for Portable Leak Detector Station

    International Nuclear Information System (INIS)

    ZIADA, H.H.

    1999-01-01

    This Supporting Document Presents Structural and Stress Analysis of a Portable Leak Detector Station for Tank Farms. The results show that the bracket assembly meets the requirements for dead load and natural phenomena hazards loads (seismic and wind)

  11. Leaking Underground Tanks in Rhode Island; LUSTs12

    Data.gov (United States)

    University of Rhode Island Geospatial Extension Program — This dataset shows the location of storage tanks and associated piping used for petroleum and certain hazardous substances that have experienced leaks as determined...

  12. Helium leak testing of large pressure vessels or subassemblies

    International Nuclear Information System (INIS)

    Hopkins, J.S.; Valania, J.J.

    1977-01-01

    Specifications for pressure-vessel components [such as the intermediate heat exchangers (IHX)] for service in the liquid metal fast breeder reactor facilities require helium leak testing of pressure boundaries to very exacting standards. The experience of Foster Wheeler Energy Corporation (FWEC) in successfully leak-testing the IHX shells and bundle assemblies now installed in the Fast Flux Test Facility at Richland, WA is described. Vessels of a somewhat smaller size for the closed loop heat exchanger system in the Fast Flux Test Facility have also been fabricated and helium leak tested for integrity of the pressure boundary by FWEC. Specifications on future components call for helium leak testing of the tube to tubesheet welds of the intermediate heat exchangers

  13. Anastomotic leak after oesophagectomy and stent implantation: a systematic review

    Directory of Open Access Journals (Sweden)

    A.N. Kanatas

    2011-12-01

    Full Text Available Anastomotic leaks following oesophageal cancer resection have a high mortality. Stents have an established position in the palliation of dysphagia due to malignancy and in treating malignant perforation or fistula. They are increasingly used for benign conditions such as spontaneous oesophageal perforation with encouraging results. In this systematic review we examine the available evidence and attempt to define the role of stents in the management of oesophageal anastomotic leaks after resection for cancer. It is evident from the review that plastic- and metal-covered stents are an effective strategy for the treatment of anastomotic leaks. Vigilance is required as complications such as stent migration and incomplete sealing are not uncommon. Further clinical studies with greater methodological rigor in terms of sample size and study design may confirm that stents have an important contribution to make in the management of oesophageal anastomotic leak.

  14. Rio Vista gas leak study: Belleaire Gas Field, California

    International Nuclear Information System (INIS)

    Wilkey, P.L.

    1992-08-01

    The Rio Vista gas leak study evaluated methods for remotely sensing gas leaks from buried pipelines and developed methods to elucidate methane transport and microbial oxidation in soils. Remote-sensing methods were evaluated by singing gas leaks along an abandoned Pacific Gas and Electric (PG ampersand E) gas field collection line in northern California and applying surface-based and airborne remote-sensing techniques in the field, including thermal imaging, laser imaging, and multispectral imagery. The remote-sensing techniques exhibited limitations in range and in their ability to correlate with ground truth data. To elucidate methane transport and microbial oxidation in soils, a study of a controlled leak permitted field testing of methods so that such processes could be monitored and evaluated. Monitoring and evaluation techniques included (1) field measurement of soil-gas concentrations, temperatures, and pressures; (2) laboratory measurement of soil physical/chemical properties and activity of methane-oxidizing microorganisms by means of field samples; and (3) development of a preliminary numerical analysis technique for combined soil-gas transport/methane oxidation. Soil-gas concentrations at various depths responded rapidly to the high rate of gas leakage. The number of methane-oxidizing microorganisms in site soils rapidly increased when the gas leak was initiated and decreased after the leak was terminated. The preliminary field, laboratory, and numerical analysis techniques tested for this study of a controlled gas leak could be successfully applied to future studies of gas leaks. Because soil-gas movement is rapid and temporally variable, the use of several complementary techniques that permit generalization of site-specific results is favored

  15. Space Shuttle RCS Oxidizer Leak Repair for STS-26

    Science.gov (United States)

    Delventhal, R. A.; Faget, N. M.

    1989-01-01

    Following propellant loading of the Space Shuttle's reaction control system (RCS) for mission STS 26, an oxidizer leak was detected in the left orbital maneuvering system (OMS) pod, where the RCS is located. Subsequent investigation determined that the leak was isolated at a mechanical Dynatube fitting near the RCS nitrogen tetroxide tank. An intense effort was initiated to design, fabricate, and qualify a sealing device to stop the oxidizer leak externally so that the Space Shuttle launch could proceed. It was discovered that sealing devices called clamshells were widely used throughout the petrochemical and power generation industries to stop leaks developed in large diameter pipes which carry steam or other hazardous fluids. These clamshells are available in different diameters and strengths and are placed around the pipe at the location of the leak. A sealing compound is then injected under high pressure into the clamshell to stop the leak. This technology was scaled down and applied to the problem of stopping the leak on the Orbiter, which was on a half-inch diameter line in a nearly inaccessible location. Many obstacles had to be overcome such as determining that the sealing material would be compatible with the nitrogen tetroxide and ensuring that the clamshell would actually fit around the Dynatube fitting without interfering with other lines which were in close proximity. The effort at the NASA Johnson Space Center included materials compatibility testing of several sealants, design of a clamshell to fit in the confined compartment, and manufacture and qualification of the flight hardware. A clamshell was successfully placed around the Dynatube fitting on the Orbiter and the oxidizer leak was terminated. Then it was decided to apply this technology further and design clamshells for other mechanical fittings onboard the Orbiter and develop sealing compounds which will be compatible with fuels such as monomethyl hydrazine (MMH). The potential exists for

  16. Tig welding produces leak-proof joints for nuclear application

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    A pulsed welding apparatus using a Hobart Cyber-tig power source with programmed pulsed current has been developed to produce leak-free welds required for a new hermetically sealed leak-free valve for use in nuclear power plants. Advantages of the technique are precise control over travel speed and filler metal addition allowing the weld to be repeated with precision. (R.A.)

  17. Method for fuel element leak detection in pressurized water reactors

    International Nuclear Information System (INIS)

    Kunze, U.

    1983-01-01

    The method is aimed at detecting fuel element leaks during reactor operation. It is based on neutron flux measurements at many points in the core, using at least two detectors at a time. The detectors must be arranged in the direction of the coolant flow. Values obtained from periodic measurements are compared with threshold values. The location of fuel element leaks is determined from those values exceeding the threshold of individual detectors

  18. EBR-II water-to-sodium leak detection system

    International Nuclear Information System (INIS)

    Wrightson, M.M.; McKinley, K.; Ruther, W.E.; Holmes, J.T.

    1976-01-01

    The water-to-sodium leak detection system installed at EBR-II in April, 1975, is described in detail. Topics covered include operational characteristics, maintenance problems, alarm functions, background hydrogen level data, and future plans for refinements to the system. Particular emphasis is given to the failures of eight of the ten leak detectors due to sodium-to-vacuum leakage, and the program anticipated for complete recovery of the system

  19. Identification of sewage leaks by active remote-sensing methods

    Science.gov (United States)

    Goldshleger, Naftaly; Basson, Uri

    2016-04-01

    The increasing length of sewage pipelines, and concomitant risk of leaks due to urban and industrial growth and development is exposing the surrounding land to contamination risk and environmental harm. It is therefore important to locate such leaks in a timely manner, to minimize the damage. Advances in active remote sensing Ground Penetrating Radar (GPR) and Frequency Domain Electromagnetic (FDEM) technologies was used to identify leaking potentially responsible for pollution and to identify minor spills before they cause widespread damage. This study focused on the development of these electromagnetic methods to replace conventional acoustic methods for the identification of leaks along sewage pipes. Electromagnetic methods provide an additional advantage in that they allow mapping of the fluid-transport system in the subsurface. Leak-detection systems using GPR and FDEM are not limited to large amounts of water, but enable detecting leaks of tens of liters per hour, because they can locate increases in environmental moisture content of only a few percentage along the pipes. The importance and uniqueness of this research lies in the development of practical tools to provide a snapshot and monitoring of the spatial changes in soil moisture content up to depths of about 3-4 m, in open and paved areas, at relatively low cost, in real time or close to real time. Spatial measurements performed using GPR and FDEM systems allow monitoring many tens of thousands of measurement points per hectare, thus providing a picture of the spatial situation along pipelines and the surrounding. The main purpose of this study was to develop a method for detecting sewage leaks using the above-proposed geophysical methods, since their contaminants can severely affect public health. We focused on identifying, locating and characterizing such leaks in sewage pipes in residential and industrial areas.

  20. FUZZY INFERENCE BASED LEAK ESTIMATION IN WATER PIPELINES SYSTEM

    OpenAIRE

    N. Lavanya; G. Anand; S. Srinivasan

    2015-01-01

    Pipeline networks are the most widely used mode for transporting fluids and gases around the world. Leakage in this pipeline causes harmful effects when the flowing fluid/gas is hazardous. Hence the detection of leak becomes essential to avoid/minimize such undesirable effects. This paper presents the leak detection by spectral analysis methods in a laboratory pipeline system. Transient in the pressure signal in the pipeline is created by opening and closing the exit valve. These pressure var...

  1. Isotopic method of leaks detection in oil pipelines

    International Nuclear Information System (INIS)

    Listwam, W.; Mottl, J.

    1974-01-01

    Isotopic method of leaks detection in oil pipelines of diameter 200-800 mm is described. Tracer is injected into pipeline in the form of CH 3 Br 82 . After few hours one or two detectors are passed through pipeline to detect leaks. Detector set consists of scintillation radiometer with Na I/Tl crystal, electronic blecks with one-channel analyzer, recorder and storage batteries. Detector set is built on integrated circuits. (Z.M.)

  2. Analysis of an Attenuator Artifact in an Experimental Attack by Gunn-Allison-Abbott Against the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System

    Science.gov (United States)

    Kish, Laszlo B.; Gingl, Zoltan; Mingesz, Robert; Vadai, Gergely; Smulko, Janusz; Granqvist, Claes-Göran

    2015-12-01

    A recent paper by Gunn-Allison-Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an incorrect operation since the single loop is essential for the security in the KLJN system, and hence GAA's asserted information leak is trivial. Another consequence is that a fully defended KLJN system would not be able to function due to its built-in current-comparison defense against active (invasive) attacks. In this paper we crack GAA's scheme via an elementary current-comparison attack which yields negligible error probability for Eve even without averaging over the correlation time of the noise.

  3. Operational tank leak detection and minimization during retrieval

    International Nuclear Information System (INIS)

    Hertzel, J.S.

    1996-03-01

    This report evaluates the activities associated with the retrieval of wastes from the single-shell tanks proposed under the initial Single-Shell Tank Retrieval System. This report focuses on minimizing leakage during retrieval by using effective leak detection and mitigating actions. After reviewing the historical data available on single-shell leakage, and evaluating current leak detection technology, this report concludes that the only currently available leak detection method which can function within the most probable leakage range is the mass balance system. If utilized after each sluicing campaign, this method should allow detection at a leakage value well below the leakage value where significant health effects occur which is calculated for each tank. Furthermore, this report concludes that the planned sequence or sluicing activities will serve to further minimize the probability and volume of leaks by keeping liquid away from areas with the greatest potential for leaking. Finally, this report identifies a series of operational responses which when used in conjunction with the recommended sluicing sequence and leak detection methods will minimize worker exposure and environmental safety health risks

  4. Leak test fixture and method for using same

    Science.gov (United States)

    Hawk, Lawrence S.

    1976-01-01

    A method and apparatus are provided which are especially useful for leak testing seams such as an end closure or joint in an article. The test does not require an enclosed pressurized volume within the article or joint section to be leak checked. A flexible impervious membrane is disposed over an area of the seamed surfaces to be leak checked and sealed around the outer edges. A preselected vacuum is applied through an opening in the membrane to evacuate the area between the membrane and the surface being leak checked to essentially collapse the membrane to conform to the article surface or joined adjacent surfaces. A pressure differential is concentrated at the seam bounded by the membrane and only the seam experiences a pressure differential as air or helium molecules are drawn into the vacuum system through a leak in the seam. A helium detector may be placed in a vacuum exhaust line from the membrane to detect the helium. Alternatively, the vacuum system may be isolated at a preselected pressure and leaks may be detected by a subsequent pressure increase in the vacuum system.

  5. Gas Leak Detection by Dilution of Atmospheric Oxygen

    Directory of Open Access Journals (Sweden)

    Armin Lambrecht

    2017-12-01

    Full Text Available Gas leak detection is an important issue in infrastructure monitoring and industrial production. In this context, infrared (IR absorption spectroscopy is a major measurement method. It can be applied in an extractive or remote detection scheme. Tunable laser spectroscopy (TLS instruments are able to detect CH4 leaks with column densities below 10 ppm·m from a distance of 30 m in less than a second. However, leak detection of non-IR absorbing gases such as N2 is not possible in this manner. Due to the fact that any leaking gas displaces or dilutes the surrounding background gas, an indirect detection is still possible. It is shown by sensitive TLS measurements of the ambient background concentration of O2 that N2 leaks can be localized with extractive and standoff methods for distances below 1 m. Minimum leak rates of 0.1 mbar·L/s were determined. Flow simulations confirm that the leakage gas typically effuses in a narrow jet. The sensitivity is mainly determined by ambient flow conditions. Compared to TLS detection of CH4 at 1651 nm, the indirect method using O2 at 761 nm is experimentally found to be less sensitive by a factor of 100. However, the well-established TLS of O2 may become a universal tool for rapid leakage screening of vessels that contain unknown or inexpensive gases, such as N2.

  6. Depressurization as a means of leak checking large vacuum vessels

    International Nuclear Information System (INIS)

    Callis, R.W.; Langhorn, A.; Petersen, P.I.; Ward, C.; Wesley, J.

    1985-01-01

    A common problem associated with large vacuum vessels used in magnetic confinement fusion experiments is that leak checking is hampered by the inaccessibility to most of the vacuum vessel surface. This inaccessibility is caused by the close proximity of magnetic coils, diagnostics and, for those vessels that are baked, the need to completely surround the vessel with a thermal insulation blanket. These obstructions reduce the effectiveness of the standard leak checking method of using a mass spectrometer and spraying a search gas such as helium on the vessel exterior. Even when the presence of helium is detected, its entry point into the vessel cannot always be pinpointed. This paper will describe a method of overcoming this problem. By slightly depressurizing the vessel, an influx of helium through the leak is created. The leak site can then be identified by personnel within the vessel using standard sniffing procedures. There are two conditions which make this method of leak checking practical. First, the vessel need only be depressurized 2 psi, thus allowing personnel inside to perform the sniffing operation. Second, the sniffing probe used (Leybold--Heraus ''Quick Test'') could detect a change in helium concentration as small as 100 ppb, which allows for faster scanning of the vessel inferior. Use of this technique to find an elusive 10 -3 Torrxl/s leak in the Doublet III tokamak vacuum vessel will be presented

  7. Measurement of Submerged Oil/Gas Leaks using ROV Video

    Science.gov (United States)

    Shaffer, Franklin; de Vera, Giorgio; Lee, Kenneth; Savas, Ömer

    2013-11-01

    Drilling for oil or gas in the Gulf of Mexico is increasing rapidly at depths up to three miles. The National Commission on the Deepwater Horizon Oil Leak concluded that inaccurate estimates of the leak rate from the Deepwater Horizon caused an inadequate response and attempts to cap the leak to fail. The first response to a submerged oil/gas leak will be to send a Remotely Operated Vehicle (ROV) down to view the leak. During the response to the Deepwater Horizon crisis, the authors Savas and Shaffer were members of the Flow Rate Technical Group's Plume Team who used ROV video to develop the FRTG's first official estimates of the oil leak rate. Savas and Shaffer developed an approach using the larger, faster jet features (e.g., turbulent eddies, vortices, entrained particles) in the near-field developing zone to measure discharge rates. The authors have since used the Berkeley Tow Tank to test this approach on submerged dye-colored water jets and compressed air jets. Image Correlation Velocimetry has been applied to measure the velocity of visible features. Results from tests in the Berkeley Tow Tank and submerged oil jets in the OHMSETT facility will be presented.

  8. Occurrence of occult CSF leaks during standard FESS procedures.

    Science.gov (United States)

    Bucher, S; Kugler, A; Probst, E; Epprecht, L; Stadler, R S; Holzmann, D; Soyka, M B

    2018-03-18

    To determine the incidence of occult cerebrospinal fluid leaks (CSF) after functional endoscopic sinus surgery (FESS) and to evaluate the diagnostic performance of beta2-transferrin in blood-contaminated conditions. Prospective cohort study. An analysis of 57 intraoperative samples using hydrogel 6 beta2-transferrin assay after FESS was undertaken. In case of CSF positive samples and continuing rhinorrhea, reanalysis after more than 1 year was conducted. In-vivo analysis of a primary spontaneous CSF leak sample took place to verify difficulties in detecting beta2-transferrin in blood-contaminated settings. Own titrations were performed to evaluate detection limits of CSF by beta2-transferrin and beta-trace protein assays in these settings. An incidence of 13% for occult CSF leaks after FESS was found. In blood-contaminated conditions, routine beta2-transferrin assays showed low sensitivity. In over 1 year follow-up, all samples were negative for CSF and none of them developed clinical relevant CSF leaks or meningitis. Occult and clinically irrelevant CSF leaks do occur in a significant proportion of patients during and shortly after FESS. Intra- and postoperatively, routine beta2-transferrin assays show low sensitivity. They should not be used in these settings. The clinical course of patients with occult CSF leaks indicated possibility of an uneventful follow-up.

  9. Detection of pressure tube leaks relying on moisture beetles only

    International Nuclear Information System (INIS)

    Kenchington, J.M.; Choi, A.; Jin, Y.

    2004-01-01

    A major decision was made for Pickering NGS A Annulus Gas System (ACS) that detection of a pressure tube (PT) leak should be achieved by using only moisture beetles and that dew point monitors would provide 'early warning' without status to shut down the reactor. Experience with Unit 3 has shown that dew point monitoring of pressure tube leaks was particularly subject to gas leaks and surface adsorption effects. Unit 4 was the first one to be converted during the full scale pressure tube replacement programme. Because of the fundamental change in design philosophy, moisture injection tests were carried out during commissioning to demonstrate that performance matched design. In particular it was necessary to show that leak before break (LBB) would be achieved if a leak occurred in the limiting string. Units 1 and 3 have since been converted. No decision has been taken to convert Pickering B units as gas leaks are small and no significant adsorption effects are anticipated. Hence dew point monitoring will not be impaired. (author)

  10. Influence of Crack Morphology on Leak Before Break Margins

    International Nuclear Information System (INIS)

    Weilin Zang

    2007-11-01

    The purpose of the project is to evaluate the deterministic LBB-margins for different pipe systems in a Swedish PWR-plant and using different crack morphology parameters. Results: - The influence of crack morphology on Leak Before Break (LBB) margins is studied. The subject of the report is a number of LBB-submittals to SKI where deterministic LBB-margins are reported. These submittals typically uses a surface roughness of 0.0762 mm (300 microinch) and number of turns equal to zero and an in-house code for the leak rate evaluations. The present report has shown that these conditions give the largest LBB-margins both in terms of the quotient between the critical crack length and the leakage crack size and for the leak rate margin. - Crack morphology parameters have a strong influence on the leak rate evaluations. Using the SQUIRT code and more recent recommendations for crack morphology parameters, it is shown that in many cases the evaluated margins, using 1 gpm as the reference leak rate detection limit, are below the safety factor of 2 on crack size and 10 on leak rate, which is generally required for LBB approval. - The effect of including weld residual stresses on the LBB margins is also investigated. It is shown that for the two examples studied, weld residual stresses were important for the small diameter thin wall pipe whereas it was negligible for the large diameter thick wall pipe which had a self-balanced weld residual stress distribution

  11. FUZZY INFERENCE BASED LEAK ESTIMATION IN WATER PIPELINES SYSTEM

    Directory of Open Access Journals (Sweden)

    N. Lavanya

    2015-01-01

    Full Text Available Pipeline networks are the most widely used mode for transporting fluids and gases around the world. Leakage in this pipeline causes harmful effects when the flowing fluid/gas is hazardous. Hence the detection of leak becomes essential to avoid/minimize such undesirable effects. This paper presents the leak detection by spectral analysis methods in a laboratory pipeline system. Transient in the pressure signal in the pipeline is created by opening and closing the exit valve. These pressure variations are captured and power spectrum is obtained by using Fast Fourier Transform (FFT method and Filter Diagonalization Method (FDM. The leaks at various positions are simulated and located using these methods and the results are compared. In order to determine the quantity of leak a 2 × 1 fuzzy inference system is created using the upstream and downstream pressure as input and the leak size as the output. Thus a complete leak detection, localization and quantification are done by using only the pressure variations in the pipeline.

  12. Local Leak Detection and Health Monitoring of Pressurized Tanks

    Science.gov (United States)

    Polzin, Kurt; Witherow, William; Korman, Valentin; Sinko, John; Hendrickson, Adam

    2011-01-01

    An optical gas-detection sensor safely monitors pressurized systems (such as cryogenic tanks) and distribution systems for leaks. This sensor system is a fiber-coupled, solid optical body interferometer that allows for the miniaturized sensing element of the device to be placed in the smallest of recesses, and measures a wide range of gas species and densities (leaks). The deflection of the fringe pattern is detected and recorded to yield the time-varying gas density in the gap. This technology can be used by manufacturers or storage facilities with toxic, hazardous, or explosive gases. The approach is to monitor the change in the index of refraction associated with low-level gas leaks into a vacuum environment. The completion of this work will provide NASA with an enabling capability to detect gas system leaks in space, and to verify that pressurized systems are in a safe (i.e. non-leaking) condition during manned docking and transit operations. By recording the output of the sensor, a time-history of the leak can be constructed to indicate its severity. Project risk is mitigated by having several interferometric geometries and detection techniques available, each potentially leveraging hardware and lessons learned to enhance detectability.

  13. 40 CFR 63.1086 - How must I monitor for leaks to cooling water?

    Science.gov (United States)

    2010-07-01

    ... monitor for leaks to cooling water? You must monitor for leaks to cooling water by monitoring each heat... system so that the cooling water flow rate is 51,031 liters per minute or less so that a leak of 3.06 kg... detected a leak. (b) Individual heat exchangers. Monitor the cooling water at the entrance and exit of each...

  14. 40 CFR 63.1087 - What actions must I take if a leak is detected?

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false What actions must I take if a leak is... leak is detected? If a leak is detected, you must comply with the requirements in paragraphs (a) and (b) of this section unless repair is delayed according to § 63.1088. (a) Repair the leak as soon as...

  15. The pump and leak steady-state concept with a variety of regulated leak pathways

    DEFF Research Database (Denmark)

    Hoffmann, E K

    2001-01-01

    . This had a major influence on my later description of a swelling-activated Cl- conductance. (ii) The pump-leak steady-state concept for cell volume control was introduced by Krogh in 1946, but it was developed in detail by Leaf and Ussing in 1959. This concept was the basis for me and others, when we later...... found that the passive ion leaks play an active role in cell volume control. (iii) The use of isotopes and Ussing's famous flux ratio equation provided an ingenious instrument for distinguishing the various transport routes. We used this to identify the Na,K,2Cl cotransport system as accounting...... for maintaining a [Cl-]i in the EATC far above thermodynamic equilibrium, as well as accounting for the ion uptake during a regulatory volume increase (RVI) in EATC, similar to what Ussing had found in frog skin. (iv) Short-circuit current setup in the Ussing chamber is still used in laboratories around the world...

  16. Active acoustic leak detection for LMFBR steam generators. Pt. 7. Potential for small leak detection

    International Nuclear Information System (INIS)

    Kumagai, Hiromichi; Yoshida, Kazuo

    1998-01-01

    In order to prevent the expansion of tube damage and to maintain structural integrity in the steam generators (SGs) of fast breeder reactors (FBR), it is necessary to detect precisely and immediately the leakage of water from heat transfer tubes. Therefore, an active acoustic method, which detects the sound attenuation due to bubbles generated in the sodium-water reactions, is being developed. Previous studies have revealed that the active acoustic method can detect bubbles of 10 l/s (equivalence water leak rate about 10 g/s) within 10 seconds in practical steam generators. In order to prevent the expansion of damage to neighboring tubes, however, it is necessary to detect smaller leakage of water from heat transfer tubes. In this study, in order to evaluate the detection sensitivity of the active method, the signal processing methods for emitter and receiver sound and the detection method for leakage within 1 g/s are investigated experimentally, using an SG full-sector model that simulates the actual SGs. A typical result shows that detection of 0.4 l/s air bubbles (equivalent water leak rate about 0.4 g/s) takes about 80 seconds, which is shorter than the propagation time of damage to neighboring tubes. (author)

  17. Leak before break piping evaluation diagram

    International Nuclear Information System (INIS)

    Fabi, R.J.; Peck, D.A.

    1994-01-01

    Traditionally Leak Before Break (LBB) has been applied to the evaluation of piping in existing nuclear plants. This paper presents a simple method for evaluating piping systems for LBB during the design process. This method produces a piping evaluation diagram (PED) which defines the LBB requirements to the piping designer for use during the design process. Several sets of LBB analyses are performed for each different pipe size and material considered in the LBB application. The results of this method are independent of the actual pipe routing. Two complete LBB evaluations are performed to determine the maximum allowable stability load, one evaluation for a low normal operating load, and the other evaluation for a high normal operating load. These normal operating loads span the typical loads for the particular system being evaluated. In developing the allowable loads, the appropriate LBB margins are included in the PED preparation. The resulting LBB solutions are plotted as a set of allowable curves for the maximum design basis load, such is the seismic load versus the normal operating load. Since the required margins are already accounted for in the LBB PED, the piping designer can use the diagram directly with the results of the piping analysis and determine immediately if the current piping arrangement passes LBB. Since the LBB PED is independent of pipe routing, changes to the piping system can be evaluated using the existing PED. For a particular application, all that remains is to confirm that the actual materials and pipe sizes assumed in creating the particular design are built into the plant

  18. The ISS 2B PVTCS Ammonia Leak: An Operational History

    Science.gov (United States)

    Vareha, Anthony

    2014-01-01

    In 2006, the Photovoltaic Thermal Control System (PVTCS) for the International Space Station's 2B power channel began leaking ammonia at a rate of approximately 1.5lbm/year (out of a starting approximately 53lbm system ammonia mass). Initially, the operations strategy was "feed the leak," a strategy successfully put into action via Extra Vehicular Activity during the STS-134 mission. During this mission the system was topped off with ammonia piped over from a separate thermal control system. This recharge was to have allowed for continued power channel operation into 2014 or 2015, at which point another EVA would have been required. Without these periodic EVAs to refill the 2B coolant system, the channel would eventually leak enough fluid as to risk pump cavitation and system failure, resulting in the loss of the 2B power channel - the most critical of the Space Station's 8 power channels. In mid-2012, the leak rate increased to approximately 5lbm/year. Once discovered, an EVA was planned and executed within a 5 week timeframe to drastically alter the architecture of the PVTCS via connection to a dormant thermal control system not intended to be utilized as anything other than spare components. The purpose of this rerouting of the TCS was to increase system volume and to isolate the photovoltaic radiator, thought to be the likely leak source. This EVA was successfully executed on November 1st, 2012 and left the 2B PVTCS in a configuration where the system was now being adequately cooled via a totally different radiator than what the system was designed to utilize. Unfortunately, data monitoring over the next several months showed that the isolated radiator was not leaking, and the system itself continued to leak steadily until May 9th, 2013. It was on this day that the ISS crew noticed the visible presence of ammonia crystals escaping from the 2B channel's truss segment, signifying a rapid acceleration of the leak from 5lbm/year to 5lbm/day. Within 48 hours of the

  19. Location estimation method of steam leak in pipeline using leakage area analysis

    International Nuclear Information System (INIS)

    Kim, Se Oh; Jeon, Hyeong Seop; Son, Ki Sung; Park, Jong Won

    2016-01-01

    It is important to have a pipeline leak-detection system that determines the presence of a leak and quickly identifies its location. Current leak detection methods use a acoustic emission sensors, microphone arrays, and camera images. Recently, many researchers have been focusing on using cameras for detecting leaks. The advantage of this method is that it can survey a wide area and monitor a pipeline over a long distance. However, conventional methods using camera monitoring are unable to target an exact leak location. In this paper, we propose a method of detecting leak locations using leak-detection results combined with multi-frame analysis. The proposed method is verified by experiment

  20. Location estimation method of steam leak in pipeline using leakage area analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Se Oh; Jeon, Hyeong Seop; Son, Ki Sung [Sae An Engineering Corp., Seoul (Korea, Republic of); Park, Jong Won [Dept. of Information Communications Engineering, Chungnam National University, Daejeon (Korea, Republic of)

    2016-10-15

    It is important to have a pipeline leak-detection system that determines the presence of a leak and quickly identifies its location. Current leak detection methods use a acoustic emission sensors, microphone arrays, and camera images. Recently, many researchers have been focusing on using cameras for detecting leaks. The advantage of this method is that it can survey a wide area and monitor a pipeline over a long distance. However, conventional methods using camera monitoring are unable to target an exact leak location. In this paper, we propose a method of detecting leak locations using leak-detection results combined with multi-frame analysis. The proposed method is verified by experiment.

  1. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  2. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  3. Engineering study of tank leaks related to hydraulic retrieval of sludge from tank 241-C-106

    International Nuclear Information System (INIS)

    Lowe, S.S.; Carlos, W.C.; Irwin, J.J.; Khaleel, R.; Kline, N.W.; Ludowise, J.D.; Marusich, R.M.; Rittman, P.D.

    1993-01-01

    This study evaluates hydraulic retrieval (sluicing) of the waste in single-shell tank 241-C-106 with respect to the likelihood of tank leaks, gross volumes of potential leaks, and their consequences. A description of hydraulic retrieval is developed to establish a baseline for the study. Leak models are developed based on postulated leak mechanisms to estimate the amount of waste that could potentially leak while sluicing. Transport models describe the movement of the waste constituents in the surrounding soil and groundwater after a leak occurs. Environmental impact and risk associated with tank leaks are evaluated. Transport of leaked material to the groundwater is found to be dependent on the rate of recharge of moisture in the soil for moderate-sized leaks. Providing a cover over the tank and surrounding area would eliminate the recharge. The bulk of any leaked material would remain in the vicinity of the tank for remedial action

  4. Analysis on signal properties due to concurrent leaks at two points in water supply pipelines

    International Nuclear Information System (INIS)

    Lee, Young Sup

    2015-01-01

    Intelligent leak detection is an essential component of a underground water supply pipeline network such as a smart water grid system. In this network, numerous leak detection sensors are needed to cover all of the pipelines in a specific area installed at specific regular distances. It is also necessary to determine the existence of any leaks and estimate its location within a short time after it occurs. In this study, the leak signal properties and feasibility of leak location detection were investigated when concurrent leaks occurred at two points in a pipeline. The straight distance between the two leak sensors in the 100A sized cast-iron pipeline was 315.6 m, and their signals were measured with one leak and two concurrent leaks. Each leak location was described after analyzing the frequency properties and cross-correlation of the measured signals.

  5. Analysis on signal properties due to concurrent leaks at two points in water supply pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Young Sup [Dept. of Embedded Systems Engineering, Incheon National University, Incheon (Korea, Republic of)

    2015-02-15

    Intelligent leak detection is an essential component of a underground water supply pipeline network such as a smart water grid system. In this network, numerous leak detection sensors are needed to cover all of the pipelines in a specific area installed at specific regular distances. It is also necessary to determine the existence of any leaks and estimate its location within a short time after it occurs. In this study, the leak signal properties and feasibility of leak location detection were investigated when concurrent leaks occurred at two points in a pipeline. The straight distance between the two leak sensors in the 100A sized cast-iron pipeline was 315.6 m, and their signals were measured with one leak and two concurrent leaks. Each leak location was described after analyzing the frequency properties and cross-correlation of the measured signals.

  6. A study on the evaluation of internal leak in valve using acoustic emission method(3)

    International Nuclear Information System (INIS)

    Lee, Sang Guk; Lee, Wook Ryun; Park, Jong Hyuck; Kim, Kwang Hong

    2005-01-01

    The objective of this study is to estimate the feasibility of acoustic emission method for the internal leak from the valves. In this study, valve leak tests using various types of specimen simulated seat damage were performed in order to analyzer acoustic emission properties when leaks arise in valve seat. As a result of leak test for specimens simulated valve seat, we conformed that leak sound level increased in proportion to the increase of hole diameter and leak velocity, and decreased in proportion to the increase of leak depth. And also, leak sound level has hysteresis for leak velocity. From the experimental results, it was suggested that the acoustic emission method for monitoring of leak was feasible.

  7. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  8. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  9. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  10. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  11. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  12. Study on the Measurement of Valve Leak Rate Using Acoustic Emission Technology

    International Nuclear Information System (INIS)

    Lee, Sang-Guk; Park, Jong-Hyuck; Yoo, Keun-Bae; Lee, Sun-Ki; Hong, Sung-Yull

    2006-01-01

    This study is to estimate the feasibility of acoustic emission(AE) method for the internal leak from the valves. In this study, 4 inch ball water valve leak tests using three different leak path and various leak rates were performed in order to analyze AE properties when leaks arise in valve seat. As a result of leak test for specimens simulated valve seat, we conformed that leak sound amplitude increased in proportion to the increase of leak rate, and leak rates were plotted versus peak acoustic amplitudes recorded within those two narrow frequency bands on each spectrum plot. The resulting plots of leak rate versus peak AE amplitude were the primary basis for determining the feasibility of quantifying leak acoustically. The large amount of data attained also allowed a favorable investigation of the effects of different leak paths, leak rates, pressure differentials and AE sensors on the AE amplitude spectrum. From the experimental results, it was suggested that the AE method for monitoring of leak was feasible. This paper describes quantitative measurements of fluid valve leak rates by the analysis of AE. Experimental apparatus were fabricated to accept a variety of leaking water valves in order to determine what characteristics of AE signal change with leak rate. The data for each valve were generated by varying the leak rate and recording the time averaged amplitude of AE versus frequency. Leak rates were varied by modifying the valve seating surfaces in ways designed to simulate actual defects observed in service. Most of the data analysis involved plotting the leak rate versus signal amplitude at a specific frequency to determine how well the two variables correlate in terms of accuracy, resolution, and repeatability

  13. Innovative Acoustic Sensor Technologies for Leak Detection in Challenging Pipe Types

    Science.gov (United States)

    2016-12-30

    the level of water leakage within the water distribution system. Table 7-3. Cost Summary for LeakFinderRT LeakFinderRT Leak Detection Cost...and to limit the drawdown of local water supplies. Implementation of improved leak detection technologies and the timely repair of water mains will...6-5. Water -filled Valve Box in Vicinity of Leak Detected by ZoneScan Alpha System

  14. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  15. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  16. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  17. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  18. Sodium fire tests for investigating the sodium leak in Monju

    International Nuclear Information System (INIS)

    Seino, Hiroshi; Miyahara, Shinya; Miyake, Osamu; Tanabe, Hiromi

    1996-01-01

    As a part of the work for investigating the sodium leak accident which occurred in Monju on December 8, 1995, three tests, (1) sodium leak test, (2) sodium fire test-I, and (3) sodium fire test-II, were carried out at OEC/PNC. Main objectives of these tests are to confirm leak and burning behavior of sodium from the damaged thermometer, and effects of the sodium fire on integrity of the surrounding structure, etc. The main conclusions obtained from the tests are shown as below. 1) Average sodium leak rate obtained from the sodium leak test was about 50 g/sec. This was equivalent to the value estimated from level change in the sodium overflow tank in the Monju accident. 2) Observation from video cameras in the sodium fire tests revealed that in early stages of sodium leak, sodium dropped down out of the flexible tube of thermometer in drips. This dripping and burning were expanded in range as sodium splashed on the duct. 3) Though, in the sodium fire test-I, there was a decrease of about 1 mm at a thickness of the burning pan in the vicinity in just under in the leak point, there were completely no crack and failure. In the meantime, in the sodium fire test-II the six open holes were found in the floor liner. By this liner failure, the reaction between sodium and concrete might take place. At present, while the detailed evaluation on the sodium fire test-II has been mainly carried out, the investigation for clarifying the cause of the liner failure has been also carried out. (author)

  19. Study on the Fluid Leak Diagnosis for Steam Valve in Power Plant

    International Nuclear Information System (INIS)

    Lee, Sang-Guk; Park, Jong-Hyuck; Yoo, Keun-Bae; Lee, Sun-Ki; Hong, Sung-Yull

    2006-01-01

    This study aims to estimate the applicability of acoustic emission(AE) method for the internal fluid leak from the valves. In this study, 4 inch gate steam valve leak tests were performed in order to analyze AE properties when leaks arise in valve seat. As a result of leak test for valve seat in a secondary system of power plant, we conformed that leak sound level increased in proportion to the increase of leak rate, and leak rates were compared to simulated tests. The resulting plots of leak rate versus peak frequency and AE signal level were the primary basis for determining the feasibility of quantifying leak acoustically. Previously, the large amount of data attained also allowed a favorable investigation of the effects of different leak paths, leak rates, pressure differentials through simulated test. All results of application tests are compared with results of simulated test. From the application tests, it was suggested that the AE method for diagnosis of steam leak was applicable. This paper presents quantitative measurements of fluid valve leak conditions by the analysis of AE parameter, FFT(fast fourier transform) and RMS(root mean square) level. Test apparatus were fabricated to accept a variety of leaking steam valves in order to determine what characteristics of AE signal change with leak conditions. The data for each valve were generated by varying the leak rate and recording the averaged RMS level versus time and frequency versus amplitude(FFT). Leak rates were varied by the valve differential pressure and valve size and leaking valves were observed in service. Most of the data analysis involved plotting the leak rate versus RMS level at a specific frequency to determine how well the two variables correlate in terms of accuracy, resolution, and repeatability

  20. Full scale leak test of the MEGAPIE containment hull

    Energy Technology Data Exchange (ETDEWEB)

    Samec, K

    2006-07-15

    The Full Scale Leak Test (FSLT) experiment is designed to replicate an accidental leak of Lead-Bismuth Eutectic (LBE) liquid metal from the MEGAPIE neutron spallation source. The neutron source is totally encased in an aluminum containment hull cooled by heavy water. Any liquid metal which would, in a hypothetical accident, leak into the helium-filled insulation gap between the source and the aluminum containment hull, would immediately impact the hull. Furthermore, during irradiation in the PSI SINQ facility, the LBE in the MEGAPIE Lower Liquid Metal Container (LLMC) accumulates radio-active substances which, in the event of a leak, must be cooled and contained under controlled conditions, as they may otherwise contaminate the facility. The FSLT experiment has been devised to fully test the structural integrity of the containment hull against a sudden liquid metal leak, and in addition, to resolve the peak temperature of he coolant, to validate the sensors used in detecting a leak and of proof-test the analytical methods used in predicting the consequences of a leak. The FSLT experiment has been analysed ahead of the test, and both thermal and structural aspects calculated using commercial codes. The predictions applied conservative assumptions to the analysis of the thermal shock so as to preclude the likelihood of an unforeseen failure of the hull. In this document, these initial predictions are compared to the temperature and strain data recorded in the experiment. Further analysis, to be published at a later stage, will focus on applying actual conditions realised in the experiment, as opposed to the envelope case used in the test predictions. The integrity of the containment hull under loads resulting from liquid metal-leak is therefore the focal point of the experiment described in the current document, and serves as a key reference test for the Iicensing of the facility. The data recorded during the SLT experiment shows that the MEGAPIE containment hull is

  1. Full scale leak test of the MEGAPIE containment hull

    International Nuclear Information System (INIS)

    Samec, K.

    2006-07-01

    The Full Scale Leak Test (FSLT) experiment is designed to replicate an accidental leak of Lead-Bismuth Eutectic (LBE) liquid metal from the MEGAPIE neutron spallation source. The neutron source is totally encased in an aluminum containment hull cooled by heavy water. Any liquid metal which would, in a hypothetical accident, leak into the helium-filled insulation gap between the source and the aluminum containment hull, would immediately impact the hull. Furthermore, during irradiation in the PSI SINQ facility, the LBE in the MEGAPIE Lower Liquid Metal Container (LLMC) accumulates radio-active substances which, in the event of a leak, must be cooled and contained under controlled conditions, as they may otherwise contaminate the facility. The FSLT experiment has been devised to fully test the structural integrity of the containment hull against a sudden liquid metal leak, and in addition, to resolve the peak temperature of he coolant, to validate the sensors used in detecting a leak and of proof-test the analytical methods used in predicting the consequences of a leak. The FSLT experiment has been analysed ahead of the test, and both thermal and structural aspects calculated using commercial codes. The predictions applied conservative assumptions to the analysis of the thermal shock so as to preclude the likelihood of an unforeseen failure of the hull. In this document, these initial predictions are compared to the temperature and strain data recorded in the experiment. Further analysis, to be published at a later stage, will focus on applying actual conditions realised in the experiment, as opposed to the envelope case used in the test predictions. The integrity of the containment hull under loads resulting from liquid metal-leak is therefore the focal point of the experiment described in the current document, and serves as a key reference test for the Iicensing of the facility. The data recorded during the SLT experiment shows that the MEGAPIE containment hull is

  2. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  3. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  4. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  5. NOEL: a no-leak fusion blanket concept

    International Nuclear Information System (INIS)

    Powell, J.R.; Yu, W.S.; Fillo, J.A.; Horn, F.L.; Makowitz, H.

    1980-01-01

    Analysis and tests of a no-leak fusion blanket concept (NOEL-NO External Leak) are described. Coolant cannot leak into the plasma chamber even if large through-cracks develop in the first wall. Blanket modules contain a two-phase material, A, that is solid (several cm thick) on the inside of the module shell, and liquid in the interior. The solid layer is maintained by imbedded tubes carrying a coolant, B, below the freezing point of A. Most of the 14-MeV neutron energy is deposited as heat in the module interior. The thermal energy flow from the module interior to the shell keeps the interior liquid. Pressure on the liquid A interior is greater than the pressure on B, so that B cannot leak out if failures occur in coolant tubes. Liquid A cannot leak into the plasma chamber through first wall cracks because of the intervening frozen layer. The thermal hydraulics and neutronics of NOEL blankets have been investigated for various metallic (e.g., Li, Pb 2 , LiPb, Pb) and fused salt choices for material A

  6. Maintaining leak tightness capability of Caorso BWR containment

    International Nuclear Information System (INIS)

    Barsanti, P.; Di Palo, L.; Grimaldi, G.

    1988-01-01

    In 1987 the local leak rate test (LLRT) results of the primary containment were revised, with the following main goals: to highlight recurring problems, leading to lack of leak tightness of the primary containment; to individuate the pertinent degradation mechanisms; to assess the corrective actions already implemented and to plan further improvements, if necessary; and to optimize the preventive maintenance program on the containment, particularly the inspection frequency. All LLRTs in the past operating period, both before (as found) and after (as left) maintenance were analyzed, in terms of leakage rate and equivalent area of leak, for each penetration. Corrective actions already implemented included replacement of some valves with better quality type one, passivation of the carbon steel pipes and improvement of the pertinent surveillance procedures. Long term corrective actions, now under consideration, will include the following: more extensive passivation of pipes, carrying humid air, so that oxidation could be drastically reduced; better chemistry control in fluid systems; extensive replacement of the butterfly valves presently used; implementation of the LLRT practice, such to quantitatively measure the leakage rate, also in presence of large leak; and reduction of the time interval between periodical tests, on the basis of the results of the previous ones. Following these guidelines, future overall leakage tests would be performed in as found condition, aimed to verify the effectiveness of the entire maintenance and testing program of the primary containment and of its capability to maintain leak tightness during the time between two subsequent tests

  7. Leak-before-break behaviour of nuclear piping systems

    International Nuclear Information System (INIS)

    Bartholome, G.; Wellein, R.

    1992-01-01

    The general concept for break preclusion of nuclear piping systems in the FRG consists of two main prerequisites: Basic safety; independent redundancies. The leak-before-break behaviour is open of these redundancies and will be verified by fracture mechanics. The following items have to be evaluated: The growth of detected and postulated defects must be negligible in one life time of the plant; the growth behaviour beyond design (i.e. multiple load collectives are taken into account) leads to a stable leak; This leakage of the piping must be detected by an adequate leak detection system long before the critical defect size is reached. The fracture mechanics calculations concerning growth and instability of the relevant defects and corresponding leakage areas are described in more detail. The leak-before-break behaviour is shown for two examples of nuclear piping systems in pressurized water reactors: main coolant line of SIEMENS-PWR 1300 MW (ferritic material, diameter 800 mm); surge line of Russian WWER 440 (austenitic material, diameter 250 mm). The main results are given taking into account the relevant leak detection possibilities. (author). 9 refs, 9 figs

  8. Helium Leak Test for the PLS Storage Ring Chamber

    International Nuclear Information System (INIS)

    Choi, M. H.; Kim, H. J.; Choi, W. C.

    1993-01-01

    The storage ring vacuum system for the Pohang Light Source (PLS) has been designed to maintain the vacuum pressure of 10 1 0 Torr which requires UHV welding to have helium leak rate less than 1x10 1 0 Torr·L/sec. In order to develop new technique (PLS) welding technique), a prototype vacuum chamber has been welded by using Tungsten Inert Gas welding method and all the welded joints have been tested with a non-destructive method, so called helium leak detection, to investigate the vacuum tightness of the weld joints. The test was performed with a detection limit of 1x10 1 0 Torr·L/sec for helium and no detectable leaks were found for all the welded joints. Thus the performance of welding technique is proven to meet the criteria of helium leak rate required in the PLS Storage Ring. Both the principle and the procedure for the helium leak detection are also discussed

  9. CEGB research on boiler leaks and their detection in service

    International Nuclear Information System (INIS)

    Hayes, D.J.

    1978-01-01

    The penalty in loss of output to an electricity generation organisation as a consequence of failure to deal effectively with small LMFBR boiler leaks would be large. There is therefore a considerable incentive for these organisations to satisfy themselves that proper provisions are made to ensure that both the incidence and the severity of boiler leaks are minimised. In the UK, responsibility for the research, development and design work for this and indeed for most aspects of future nuclear power plant rests with the UKAEA and NPC; nevertheless as a consequence of its 'informed operator' policy the Central Electricity Generating Board has devoted some research effort to this field in recent years. o date, research work has been put in hand with the objective of achieving an understanding of the basic behaviour of boiler leaks. In addition, attention has been given to leak detection by monitoring the sodium for increases in oxygen and hydrogen levels. In both cases leaks into liquid sodium rather than into the gas space have been considered. In the course of the work hydrogen and oxygen meters based on the galvanic cell principle have been constructed and evaluated. The former is a new device which is comparable in performance with hydrogen meters based on the ion pump. The present state of the work is briefly described in this paper

  10. Operational experiences with on line BWR condenser tube leak verification

    International Nuclear Information System (INIS)

    Bryant, R.A.; Duvall, W.E.; Kirkley, W.B.; Zavadoski, R.W.

    1988-01-01

    Verifying condenser tube leaks at a boiling water reactor is, at best, a difficult task carried out in hot steamy water boxes with concurrent radiation exposure. For small apparent leaks with slight chemical changes there is always uncertainty of whether the problem is a condenser tube leak or a feedback from radwaste. Most conventional methods (e.g soap tests, Saran wrap suction, and helium tests) usually involve a load reduction to isolate the water boxes one at a time and hours of drain down on each box. The sensitivity of the most sensitive test (helium) is of the order of 7500 l per day per box. Sulfur hexafluoride has been successfully used at a BWR to identify one leaking water box out of four while the unit was at 100 % power. The actual tubes leakig in the water box were identified by injecting helium during drain down of the box and subsequent manifold testing. Additional tests with sulfur hexafluoride on the second BWR unit indicated tight water boxes to within the sensitivity of the measurement, i.e. less than 19 l per day for all four boxes. Problems encountered in both tests included sulfur hexafluoride carry over from the plume of the cooling towers and off gas considerations. In brief sulfur hexafluoride can be used to quickly identify which particular water box has a condenser tube leak or, just as quickly, establish the integrity of all the water boxes to a level not previously attainable. (author)

  11. CEGB research on boiler leaks and their detection in service

    Energy Technology Data Exchange (ETDEWEB)

    Hayes, D J [Berkeley Nuclear Laboratories, Berkeley, Gloucestershire (United Kingdom)

    1978-10-01

    The penalty in loss of output to an electricity generation organisation as a consequence of failure to deal effectively with small LMFBR boiler leaks would be large. There is therefore a considerable incentive for these organisations to satisfy themselves that proper provisions are made to ensure that both the incidence and the severity of boiler leaks are minimised. In the UK, responsibility for the research, development and design work for this and indeed for most aspects of future nuclear power plant rests with the UKAEA and NPC; nevertheless as a consequence of its 'informed operator' policy the Central Electricity Generating Board has devoted some research effort to this field in recent years. o date, research work has been put in hand with the objective of achieving an understanding of the basic behaviour of boiler leaks. In addition, attention has been given to leak detection by monitoring the sodium for increases in oxygen and hydrogen levels. In both cases leaks into liquid sodium rather than into the gas space have been considered. In the course of the work hydrogen and oxygen meters based on the galvanic cell principle have been constructed and evaluated. The former is a new device which is comparable in performance with hydrogen meters based on the ion pump. The present state of the work is briefly described in this paper.

  12. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  13. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  14. Current practice and developmental efforts for leak detection in U.S. reactor primary systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Claytor, T.N.

    1986-01-01

    Current leak detection practices in 74 operating nuclear reactors have been reviewed. Existing leak detection systems are adequate to ensure a leak-before-break scenario in most situations, but no currently available, single method combines optimal leakage detection sensitivity, leak-locating ability, and leakage measurement accuracy. Simply tightening current leakage limits may produce an unacceptably large number of unnecessary shutdowns. The use of commercially available acoustic monitoring systems or moisture-sensitive tape may improve leak detection capability at specific sites. However, neither of these methods currently provides source discrimination (e.g., to distinguish between leaks from pipe cracks and valves) or leak-rate information (a small leak may saturate the system). A field-implementable acoustic leak detection system is being developed to address these limitations. 5 refs.

  15. Current practice and developmental efforts for leak detection in US reactor primary systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Claytor, T.N.

    1985-07-01

    Current leak detection practices in 74 operating nuclear reactors have been reviewed. Existing leak detection systems are adequate to ensure a leak-before-break scenario in most situations, but no currently available, single method combines optimal leakage detection sensitivity, leak-locating ability, and leakage measurement accuracy. Simply tightening current leakage limits may produce an unacceptably large number of unnecessary shutdowns. The use of commercially available acoustic monitoring systems or moisture-sensitive tape may improve leak detection capability at specific sites. However, neither of these methods currently provides source discrimination (e.g., to distinguish between leaks from pipe cracks and valves) or leak-rate information (a small leak may saturate the system). A field-implementable acoustic leak detection system is being developed to address these limitations. 5 refs., 3 figs

  16. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way

    Science.gov (United States)

    Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki

    As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.

  17. Intravenous Immunoglobulins Improve Survival in Monoclonal Gammopathy-Associated Systemic Capillary-Leak Syndrome.

    Science.gov (United States)

    Pineton de Chambrun, Marc; Gousseff, Marie; Mauhin, Wladimir; Lega, Jean-Christophe; Lambert, Marc; Rivière, Sophie; Dossier, Antoine; Ruivard, Marc; Lhote, François; Blaison, Gilles; Alric, Laurent; Agard, Christian; Saadoun, David; Graveleau, Julie; Soubrier, Martin; Lucchini-Lecomte, Marie-Josée; Christides, Christine; Bosseray, Annick; Levesque, Hervé; Viallard, Jean-François; Tieulie, Nathalie; Lovey, Pierre-Yves; Le Moal, Sylvie; Bibes, Béatrice; Malizia, Giuseppe; Abgueguen, Pierre; Lifermann, François; Ninet, Jacques; Hatron, Pierre-Yves; Amoura, Zahir

    2017-10-01

    Monoclonal gammopathy-associated systemic capillary-leak syndrome, also known as Clarkson disease, is a rare condition characterized by recurrent life-threatening episodes of capillary hyperpermeability in the context of a monoclonal gammopathy. This study was conducted to better describe the clinical characteristics, natural history, and long-term outcome of monoclonal gammopathy-associated systemic capillary-leak syndrome. We conducted a cohort analysis of all patients included in the European Clarkson disease (EurêClark) registry between January 1997 and March 2016. From diagnosis to last follow-up, studied outcomes (eg, the frequency and severity of attacks, death, and evolution toward multiple myeloma) and the type of preventive treatments administered were monitored every 6 months. Sixty-nine patients (M/F sex ratio 1:1; mean ± SD age at disease onset 52 ± 12 years) were included in the study. All patients had monoclonal gammopathy of immunoglobulin G type, with kappa light chains in 47 (68%). Median (interquartile range) follow-up duration was 5.1 (2.5-9.7) years. Twenty-four patients (35%) died after 3.3 (0.9-8) years. Fifty-seven (86%) patients received at least one preventive treatment, including intravenous immunoglobulins (IVIg) n = 48 (73.8%), theophylline n = 22 (33.8%), terbutaline n = 22 (33.8%), and thalidomide n = 5 (7.7%). In the 65 patients with follow-up, 5- and 10-year survival rates were 78% (n = 35) and 69% (n = 17), respectively. Multivariate analysis found preventive treatment with IVIg (hazard ratio 0.27; 95% confidence interval, 0.10-0.70; P = .007) and terbutaline (hazard ratio 0.35; 95% confidence interval, 0.13-0.96; P = .041) to be independent predictors of mortality. We describe the largest cohort to date of patients with well-defined monoclonal gammopathy-associated systemic capillary-leak syndrome. Preventive treatment with IVIg was the strongest factor associated with survival, suggesting the use of IVIg as the first

  18. Sodium leak channel, non-selective contributes to the leak current in human myometrial smooth muscle cells from pregnant women.

    Science.gov (United States)

    Reinl, Erin L; Cabeza, Rafael; Gregory, Ismail A; Cahill, Alison G; England, Sarah K

    2015-10-01

    Uterine contractions are tightly regulated by the electrical activity of myometrial smooth muscle cells (MSMCs). These cells require a depolarizing current to initiate Ca(2+) influx and induce contraction. Cationic leak channels, which permit a steady flow of cations into a cell, are known to cause membrane depolarization in many tissue types. Previously, a Gd(3+)-sensitive, Na(+)-dependent leak current was identified in the rat myometrium, but the presence of such a current in human MSMCs and the specific ion channel conducting this current was unknown. Here, we report the presence of a Na(+)-dependent leak current in human myometrium and demonstrate that the Na(+)-leak channel, NALCN, contributes to this current. We performed whole-cell voltage-clamp on fresh and cultured MSMCs from uterine biopsies of term, non-laboring women and isolated the leak currents by using Ca(2+) and K(+) channel blockers in the bath solution. Ohmic leak currents were identified in freshly isolated and cultured MSMCs with normalized conductances of 14.6 pS/pF and 10.0 pS/pF, respectively. The myometrial leak current was significantly reduced (P < 0.01) by treating cells with 10 μM Gd(3+) or by superfusing the cells with a Na(+)-free extracellular solution. Reverse transcriptase PCR and immunoblot analysis of uterine biopsies from term, non-laboring women revealed NALCN messenger RNA and protein expression in the myometrium. Notably, ∼90% knockdown of NALCN protein expression with lentivirus-delivered shRNA reduced the Gd(3+)-sensitive leak current density by 42% (P < 0.05). Our results reveal that NALCN, in part, generates the leak current in MSMCs and provide the basis for future research assessing NALCN as a potential molecular target for modulating uterine excitability. © The Author 2015. Published by Oxford University Press on behalf of the European Society of Human Reproduction and Embryology. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Gas-leak localization using distributed ultrasonic sensors

    Science.gov (United States)

    Huseynov, Javid; Baliga, Shankar; Dillencourt, Michael; Bic, Lubomir; Bagherzadeh, Nader

    2009-03-01

    We propose an ultrasonic gas leak localization system based on a distributed network of sensors. The system deploys highly sensitive miniature Micro-Electro-Mechanical Systems (MEMS) microphones and uses a suite of energy-decay (ED) and time-delay of arrival (TDOA) algorithms for localizing a source of a gas leak. Statistical tools such as the maximum likelihood (ML) and the least squares (LS) estimators are used for approximating the source location when closed-form solutions fail in the presence of ambient background nuisance and inherent electronic noise. The proposed localization algorithms were implemented and tested using a Java-based simulation platform connected to four or more distributed MEMS microphones observing a broadband nitrogen leak from an orifice. The performance of centralized and decentralized algorithms under ED and TDOA schemes is analyzed and compared in terms of communication overhead and accuracy in presence of additive white Gaussian noise (AWGN).

  20. Small leak damage and protection systems in steam generators

    International Nuclear Information System (INIS)

    Greene, D.A.

    1976-01-01

    A small leak of water into sodium in a liquid metal heated steam generator can cause damage to adjacent tubes, a phenomenon termed wastage. Theories on this phenomenon range from corrosion from sodium water reaction products to erosion by supersonic particles. An alternative approach considers the water injection to form a simple combustion process. Using this approach many aspects of over 250 wastage experiments can be explained both analytically and physically. The U.S. has an extensive technology in the general area of acoustic surveillance. High temperature in-sodium microphones, in-vessel waveguides, and data analysis techniques have been successfully demonstrated in national development programs. This technology has been applied specifically to the development of an acoustic leak detection/location monitor for small leaks in an operating steam generator