WorldWideScience

Sample records for secrecy protection

  1. Protecting knowledge : How legal requirements to reveal information affect the importance of secrecy

    NARCIS (Netherlands)

    Sofka, Wolfgang; de Faria, Pedro; Shehu, Edlira

    2018-01-01

    Most firms use secrecy to protect their knowledge from potential imitators. However, the theoretical foundations for secrecy have not been well explored. We extend knowledge protection literature and propose theoretical mechanisms explaining how information visibility influences the importance of

  2. Protecting traditional knowledge - Does secrecy offer a solution ...

    African Journals Online (AJOL)

    ... their traditional knowledge. This paper reviews the concerns that may arise when holders of traditional knowledge attempt to rely on claiming unfair competition and contract laws to protect their traditional knowledge. Keywords: Traditional knowledge; TRIPS Agreement; unfair competition; confidential information; secrecy.

  3. Secrecy Jurisdictions

    OpenAIRE

    Schjelderup, Guttorm

    2015-01-01

    This paper surveys tax haven legislation and links the literature on tax havens to the literature on asymmetric information. I argue that the core aim of tax haven legislation is to create private information (secrecy) for the users of tax havens. This leads to moral hazard and transaction costs in non-havens. The business model of tax havens is illustrated by using Mauritsius and Jersey as case studies. I also provide several real world examples of how secrecy jurisdictions le...

  4. Atomic secrecy

    International Nuclear Information System (INIS)

    Sweet, W.

    1979-01-01

    An article, The H-Bomb Secret: How We Got It, Why We're Telling It, by Howard Morland was to be published in The Progressive magazine in February, 1979. The government, after learning of the author's and the editors' intention to publish the article and failing to persuade them to voluntarily delete about 20% of the text and all of the diagrams showing how an H-bomb works, requested a court injunction against publication. Acting under the Atomic Energy Act of 1954, US District Court Judge Robert W. Warren granted the government's request on March 26. Events dealing with the case are discussed in this publication. Section 1, Progressive Hydrogen Bomb Case, is discussed under the following: Court Order Blocking Magazine Report; Origins of the Howard Morland Article; Author's Motives, Defense of Publication; and Government Arguments Against Disclosure. Section 2, Access to Atomic Data Since 1939, contains information on need for secrecy during World War II; 1946 Atomic Energy Act and its effects; Soviet A-Bomb and the US H-Bomb; and consequences of 1954 Atomic Energy Act. Section 3, Disputed Need for Atomic Secrecy, contains papers entitled: Lack of Studies on H-Bomb Proliferation; Administration's Position on H-Bombs; and National Security Needs vs Free Press

  5. The relation between the secrecy rate of biometric template protection and biometric recognition performance

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    2015-01-01

    A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the

  6. Secrecy and misguided policy

    Energy Technology Data Exchange (ETDEWEB)

    Rossin, A D [Center for International Security and Cooperation, Stanford, California (United States)

    2001-07-01

    The atomic bomb was born in secrecy. After the war, scientists and statesmen committed themselves to develop the promise of nuclear energy without the proliferation of nuclear weapons. The most obvious tool available to them was secrecy. But secrecy was not the sword that could easily be beaten into the plowshare. It proved to be a double-edged sword. It could not stop the spread of basic scientific information, and it turned out to be a weapon for marketing information to promote political aims. It served that purpose in promoting President Carter policy to stop reprocessing of spent fuel. (author)

  7. Secrecy and misguided policy

    International Nuclear Information System (INIS)

    Rossin, A.D.

    2001-01-01

    The atomic bomb was born in secrecy. After the war, scientists and statesmen committed themselves to develop the promise of nuclear energy without the proliferation of nuclear weapons. The most obvious tool available to them was secrecy. But secrecy was not the sword that could easily be beaten into the plowshare. It proved to be a double-edged sword. It could not stop the spread of basic scientific information, and it turned out to be a weapon for marketing information to promote political aims. It served that purpose in promoting President Carter policy to stop reprocessing of spent fuel. (author)

  8. Circular from January 26, 2004, taken for the enforcement of the by-law from January 26, 2004, relative to the national defense secrecy protection in the domain of nuclear materials protection and control; Circulaire du 26 janvier 2004 prise pour l'application de l'arrete du 26 janvier 2004 relatif a la protection du secret de la defense nationale dans le domaine de la protection et du controle des matieres nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-01-15

    The by-law of January 26, 2004 gives a regulatory foundation to the classification of sensible informations relative to the security and physical protection of nuclear materials. This circular recalls, in this framework, the conditions of implementation of the regulation relative to the protection of national defense secrecies in the domain of the protection of nuclear facilities and materials. (J.S.)

  9. THE RIGHT TO SECRECY OF COMMUNICATIONS - SITUATIONS AND CHALLENGES

    OpenAIRE

    Biljana Karovska-Andonovska

    2014-01-01

    In this paper, the basic elements of the right to secrecy of communications are presented. We analyzed the treatment of this fundamental right in international documents on human rights and in the constitutions of modern democracies. Also, we established the scope of protection of the confidentiality of certain types of communication. Moreover, we have identified the parts of the process of speech and written communication whose secrecy is protected in accordance wi...

  10. Authenticated Diffie-Hellman Key Agreement Scheme that Protects Client Anonymity and Achieves Half-Forward Secrecy

    Directory of Open Access Journals (Sweden)

    Hung-Yu Chien

    2015-01-01

    Full Text Available Authenticated Diffie-Hellman key agreement (D-H key is the de facto building block for establishing secure session keys in many security systems. Regarding the computations of authenticated D-H key agreement, the operation of modular exponentiation is the most expensive computation, which incurs a heavy loading on those clients where either their computational capacities or their batteries are limited and precious. As client’s privacy is a big concern in several e-commerce applications, it is desirable to extend authenticated D-H key agreement to protect client’s identity privacy. This paper proposes a new problem: the modified elliptic curves computational Diffie-Hellman problem (MECDHP and proves that the MECDHP is as hard as the conventional elliptic curves computational Diffie-Hellman problem (ECDHP. Based on the MECDHP, we propose an authenticated D-H key agreement scheme which greatly improves client computational efficiency and protects client’s anonymity from outsiders. This new scheme is attractive to those applications where the clients need identity protection and lightweight computation.

  11. Bringing Secrecy into the Open

    DEFF Research Database (Denmark)

    Costas, Jana; Grey, Christopher

    2014-01-01

    This paper brings into focus the concept of organizational secrecy, defined as the ongoing formal and informal social processes of intentional concealment of information from actors by actors in organizations. It is argued that existing literature on the topic is fragmented and predominantly...... focused on informational rather than social aspects of secrecy. The paper distinguishes between formal and informal secrecy and theorizes the social processes of these in terms of identity and control. It is proposed that organizational secrecy be added to the analytical repertoire of organization studies....

  12. Protecting knowledge

    DEFF Research Database (Denmark)

    Sofka, Wolfgang; de Faria, Pedro; Shehu, Edlira

    2018-01-01

    Most firms use secrecy to protect their knowledge from potential imitators. However, the theoretical foundations for secrecy have not been well explored. We extend knowledge protection literature and propose theoretical mechanisms explaining how information visibility influences the importance...... of secrecy as a knowledge protection instrument. Building on mechanisms from information economics and signaling theory, we postulate that secrecy is more important for protecting knowledge for firms that have legal requirements to reveal information to shareholders. Furthermore, we argue that this effect...... and a firm's investment in fixed assets. Our findings inform both academics and managers on how firms balance information disclosure requirements with the use of secrecy as a knowledge protection instrument....

  13. Openness versus Secrecy in Scientific Research Abstract.

    Science.gov (United States)

    Resnik, David B

    2006-02-01

    Openness is one of the most important principles in scientific inquiry, but there are many good reasons for maintaining secrecy in research, ranging from the desire to protect priority, credit, and intellectual property, to the need to safeguard the privacy of research participants or minimize threats to national or international security. This article examines the clash between openness and secrecy in science in light of some recent developments in information technology, business, and politics, and makes some practical suggestions for resolving conflicts between openness and secrecy."By academic freedom I understand the right to search for the truth and to publish and teach what one holds to be true. This right also implies a duty; one must not conceal any part of what one has recognized to be true. It is evident that any restriction of academic freedom serves to restrain the dissemination of knowledge, thereby impeding rational judgment and action."Albert Einstein, quotation inscribed on his statute in front of the National Academy of Sciences, Washington, DC.

  14. THE RIGHT TO SECRECY OF COMMUNICATIONS - SITUATIONS AND CHALLENGES

    Directory of Open Access Journals (Sweden)

    Biljana Karovska-Andonovska

    2014-10-01

    Full Text Available In this paper, the basic elements of the right to secrecy of communications are presented. We analyzed the treatment of this fundamental right in international documents on human rights and in the constitutions of modern democracies. Also, we established the scope of protection of the confidentiality of certain types of communication. Moreover, we have identified the parts of the process of speech and written communication whose secrecy is protected in accordance with international standards. Special attention is devoted to the contemporary challenges facing the respect the secrecy of communications. In this regard, we analyzed the impact of the expansion of modern communication technologies on the confidentiality of communication. As a special challenge we analyzed the application of new methods for dealing with security threats on a national and global level, which among other things include interception of communications to collect information and evidence of involvement in criminal activities.

  15. House of shame [nuclear secrecy

    International Nuclear Information System (INIS)

    Smith, Llew.

    1994-01-01

    The nuclear debate in the United Kingdom has been and continues to be shrouded in secrecy. Despite numerous Parliamentary questions, the author, a Member of Parliament and a former Member of the European Parliament, recounts his personal experience in failing to obtain details of nuclear matters. Reasons for keeping nuclear information secret range from claims that revealing it would endanger national security to the disproportionate cost of information exposure. (UK)

  16. The End of Bank Secrecy?

    DEFF Research Database (Denmark)

    Johannesen, Niels; Zucman, Gabriel

    2014-01-01

    the treaties affected bank deposits in tax havens. Rather than repatriating funds, our results suggest that tax evaders shifted deposits to havens not covered by a treaty with their home country. The crackdown thus caused a relocation of deposits at the benefit of the least compliant havens. We discuss......During the financial crisis, G20 countries compelled tax havens to sign bilateral treaties providing for exchange of bank information. Policymakers have celebrated this global initiative as the end of bank secrecy. Exploiting a unique panel dataset, our study is the first attempt to assess how...

  17. Statistical secrecy and multibit commitments

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Pedersen, Torben P.; Pfitzmann, Birgit

    1998-01-01

    nothing about it. One definition is based on the L1-norm distance between probability distributions, the other on information theory. We prove that the two definitions are essentially equivalent. We also show that statistical counterparts of definitions of computational secrecy are essentially equivalent......We present and compare definitions of "statistically hiding" protocols, and we propose a novel statistically hiding commitment scheme. Informally, a protocol statistically hides a secret if a computationally unlimited adversary who conducts the protocol with the owner of the secret learns almost...... to our main definitions. Commitment schemes are an important cryptologic primitive. Their purpose is to commit one party to a certain value, while hiding this value from the other party until some later time. We present a statistically hiding commitment scheme allowing commitment to many bits...

  18. Mental illness stigma, secrecy and suicidal ideation.

    Science.gov (United States)

    Oexle, N; Ajdacic-Gross, V; Kilian, R; Müller, M; Rodgers, S; Xu, Z; Rössler, W; Rüsch, N

    2017-02-01

    Whether the public stigma associated with mental illness negatively affects an individual, largely depends on whether the person has been labelled 'mentally ill'. For labelled individuals concealing mental illness is a common strategy to cope with mental illness stigma, despite secrecy's potential negative consequences. In addition, initial evidence points to a link between stigma and suicidality, but quantitative data from community samples are lacking. Based on previous literature about mental illness stigma and suicidality, as well as about the potential influence of labelling processes and secrecy, a theory-driven model linking perceived mental illness stigma and suicidal ideation by a mediation of secrecy and hopelessness was established. This model was tested separately among labelled and unlabelled persons using data derived from a Swiss cross-sectional population-based study. A large community sample of people with elevated psychiatric symptoms was examined by interviews and self-report, collecting information on perceived stigma, secrecy, hopelessness and suicidal ideation. Participants who had ever used mental health services were considered as labelled 'mentally ill'. A descriptive analysis, stratified logistic regression models and a path analysis testing a three-path mediation effect were conducted. While no significant differences between labelled and unlabelled participants were observed regarding perceived stigma and secrecy, labelled individuals reported significantly higher frequencies of suicidal ideation and feelings of hopelessness. More perceived stigma was associated with suicidal ideation among labelled, but not among unlabelled individuals. In the path analysis, this link was mediated by increased secrecy and hopelessness. Results from this study indicate that among persons labelled 'mentally ill', mental illness stigma is a contributor to suicidal ideation. One explanation for this association is the relation perceived stigma has with

  19. Multipartite classical and quantum secrecy monotones

    International Nuclear Information System (INIS)

    Cerf, N.J.; Massar, S.; Schneider, S.

    2002-01-01

    In order to study multipartite quantum cryptography, we introduce quantities which vanish on product probability distributions, and which can only decrease if the parties carry out local operations or public classical communication. These 'secrecy monotones' therefore measure how much secret correlation is shared by the parties. In the bipartite case we show that the mutual information is a secrecy monotone. In the multipartite case we describe two different generalizations of the mutual information, both of which are secrecy monotones. The existence of two distinct secrecy monotones allows us to show that in multipartite quantum cryptography the parties must make irreversible choices about which multipartite correlations they want to obtain. Secrecy monotones can be extended to the quantum domain and are then defined on density matrices. We illustrate this generalization by considering tripartite quantum cryptography based on the Greenberger-Horne-Zeilinger state. We show that before carrying out measurements on the state, the parties must make an irreversible decision about what probability distribution they want to obtain

  20. Glasnost and Secrecy in the Soviet Military

    Science.gov (United States)

    1990-12-21

    the most vicious and xenophobic brand of Russian chauvinism, complete with witch-hunts and spymania. Secrecy was also important for enhancing the...the Soviet Armed Forces, a significant factor tor a military establishment historically used to ’ie position of the underdog because of the Soviet

  1. Secrecy in Mobile Ad-hoc Networks

    DEFF Research Database (Denmark)

    Hüttel, Hans; Rafnsson, Willard

    2008-01-01

    We propose a framework for automated verification of secrecy properties of MANET protocols, consisting of a formal language and a proven sound verifi- cation technique which can be automated. We start off by presenting the dis- tributed applied pi calculus with broadcast (DAπβ ), whereafter we summ...

  2. New public management and policies of secrecy

    Directory of Open Access Journals (Sweden)

    Lise DEMAILLY

    2013-12-01

    Full Text Available Crossing a survey of literature in sociology of health and her own inquiries in the field of mental health, the author studies the historical change in policies of secrecy in health domains and specifically, in modern democracies, practical aporias opposing rights and duties to and towards secrecy, rights and duty to and towards transparency. The paper describes weakening of medical secret regarding legitimization of standards of transparency, coordination and evaluation supported by the New Public Management (NPM. Two forms of resistance against technocratic enforcement to publicizing are suggested. The first of these forms is the historical exception, nowadays vilified as out of date, of psychoanalysis bound to strict secret of the singular interview and building there a space for emancipation, preventing any governance of behavior by healthiness. The second one: some intentional and paradoxical break of secret can result in symbolic reversal against domination and shame.

  3. Secrecy extraction from no-signaling correlations

    International Nuclear Information System (INIS)

    Scarani, Valerio; Gisin, Nicolas; Brunner, Nicolas; Masanes, Lluis; Pino, Sergi; Acin, Antonio

    2006-01-01

    Quantum cryptography shows that one can guarantee the secrecy of correlation on the sole basis of the laws of physics, that is, without limiting the computational power of the eavesdropper. The usual security proofs suppose that the authorized partners, Alice and Bob, have a perfect knowledge and control of their quantum systems and devices; for instance, they must be sure that the logical bits have been encoded in true qubits and not in higher dimensional systems. In this paper, we present an approach that circumvents this strong assumption. We define protocols, both for the case of bits and for generic d-dimensional outcomes, in which the security is guaranteed by the very structure of the Alice-Bob correlations, under the no-signaling condition. The idea is that if the correlations cannot be produced by shared randomness, then Eve has poor knowledge of Alice's and Bob's symbols. The present study assumes on the one hand that the eavesdropper Eve performs only individual attacks (this is a limitation to be removed in further work), and on the other hand that Eve can distribute any correlation compatible with the no-signaling condition (in this sense her power is greater than what quantum physics allows). Under these assumptions, we prove that the protocols defined here allow extracting secrecy from noisy correlations, when these correlations violate a Bell-type inequality by a sufficiently large amount. The region in which secrecy extraction is possible extends within the region of correlations achievable by measurements on entangled quantum states

  4. [Healthcare Provider Professional Secrecy: an Issue for Public Health Democracy somewhere between Immanence and Alienation.

    Science.gov (United States)

    Pautier, Silvère

    2017-09-01

    For a long time considered as total and absolute, healthcare professional secrecy is today difficult to reconcile with care practices. Lots of paradoxes question its preservation in favour of general interest and public order against the protection of private interest within an individualistic normative society. Exploring this interrogation, the article's objective is to initiate an ethical discussion from a professional caregiver secrecy's historical and sociological evolution perspective. Thus, with the help of theoretical understandings, especially those by Michel Foucault, medical secrecy is considered a defense of rationality specific to populations' government. This conceptualization finds arguments through social collective norms attached to an alienating biopower at the expense of secrecy integrated as an individualistic and immanent social norm. However, beyond the well-known debate on the absolute necessity for change, evolution… the distance from the Socratic and Hippocratic principles engage people and society in real democratic decisions about Health. Also, health professionals, patients, usgers and society must consider the limits that would lead to medical confidentiality.

  5. [Legal secrecy: abortion in Puerto Rico from 1937 to 1970].

    Science.gov (United States)

    Marchand-Arias, R E

    1998-03-01

    The essay discusses abortion in Puerto Rico from 1937 to 1970, concentrating in its legal status as well as its social practice. The research documents the contradictions between the legality of the procedure and a social practice characterized by secrecy. The essay discusses the role of the Clergy Consultation Service on Abortion in promoting the legal practice of absortion in Puerto Rico. It also discusses the ambivalent role of medical doctors who, despite being legally authorized to perform abortions to protect the life and health of women, refused to perform the procedure arguing abortion was illegal. The essay concludes with a brief discussion on perceptions of illegality regarding abortion, emphasizing the contradictions between the practice of abortion and that of sterilization in Puerto Rico.

  6. Blueprints for Disaster: Balancing Secrecy and Transparency of Government Continuity Plans

    Science.gov (United States)

    2016-09-01

    ISO/IEC 31010:2009; COSO 2004; and OCEG “Red Book” 2.0: 2009. Institute of Risk Management , “ Risk Management Standards,” accessed June 26, 2015...Information Act (FOIA), protective security, risk management , Presidential Policy Directive 21 (PPD-21), National Security Presidential Directive 51 (NSPD...BLUEPRINTS FOR DISASTER: BALANCING SECRECY AND TRANSPARENCY OF GOVERNMENT CONTINUITY PLANS Stephen Scott Vollbrecht State Risk Manager for

  7. Keeping secrets from parents: Longitudinal associations of secrecy in adolescence

    NARCIS (Netherlands)

    Frijns, T.; Finkenauer, C.; Vermulst, A.A.; Engels, R.C.M.E.

    2005-01-01

    A 2-wave survey study among 1173 10-14-year-olds tested the longitudinal contribution of secrecy from parents to psychosocial and behavioral problems in adolescence. Additionally, it investigated a hypothesized contribution of secrecy from parents to adolescent development by examining its relation

  8. A Metric for Secrecy-Energy Efficiency Tradeoff Evaluation in 3GPP Cellular Networks

    Directory of Open Access Journals (Sweden)

    Fabio Ciabini

    2016-10-01

    Full Text Available Physical-layer security is now being considered for information protection in future wireless communications. However, a better understanding of the inherent secrecy of wireless systems under more realistic conditions, with a specific attention to the relative energy consumption costs, has to be pursued. This paper aims at proposing new analysis tools and investigating the relation between secrecy capacity and energy consumption in a 3rd Generation Partnership Project (3GPP cellular network , by focusing on secure and energy efficient communications. New metrics that bind together the secure area in the Base Station (BS sectors, the afforded date-rate and the power spent by the BS to obtain it, are proposed that permit evaluation of the tradeoff between these aspects. The results show that these metrics are useful in identifying the optimum transmit power level for the BS, so that the maximum secure area can be obtained while minimizing the energy consumption.

  9. Robust Secure Authentication and Data Storage with Perfect Secrecy

    Directory of Open Access Journals (Sweden)

    Sebastian Baur

    2018-04-01

    Full Text Available We consider an authentication process that makes use of biometric data or the output of a physical unclonable function (PUF, respectively, from an information theoretical point of view. We analyse different definitions of achievability for the authentication model. For the secrecy of the key generated for authentication, these definitions differ in their requirements. In the first work on PUF based authentication, weak secrecy has been used and the corresponding capacity regions have been characterized. The disadvantages of weak secrecy are well known. The ultimate performance criteria for the key are perfect secrecy together with uniform distribution of the key. We derive the corresponding capacity region. We show that, for perfect secrecy and uniform distribution of the key, we can achieve the same rates as for weak secrecy together with a weaker requirement on the distribution of the key. In the classical works on PUF based authentication, it is assumed that the source statistics are known perfectly. This requirement is rarely met in applications. That is why the model is generalized to a compound model, taking into account source uncertainty. We also derive the capacity region for the compound model requiring perfect secrecy. Additionally, we consider results for secure storage using a biometric or PUF source that follow directly from the results for authentication. We also generalize known results for this problem by weakening the assumption concerning the distribution of the data that shall be stored. This allows us to combine source compression and secure storage.

  10. On the Secrecy Capacity of MISO Visible Light Communication Channels

    KAUST Repository

    Arfaoui, Mohamed Amine; Rezki, Zouheir; Ghrayeb, Ali; Alouini, Mohamed-Slim

    2017-01-01

    We study the secrecy capacity of the multiple- input single-output (MISO) Gaussian wiretap visible light communication (VLC) channel. We study a typical VLC scenario with one transmitter, one legitimate receiver, and one eavesdropper. Specifically

  11. On the Secrecy Capacity of MISO Visible Light Communication Channels

    KAUST Repository

    Arfaoui, Mohamed Amine

    2017-02-07

    We study the secrecy capacity of the multiple- input single-output (MISO) Gaussian wiretap visible light communication (VLC) channel. We study a typical VLC scenario with one transmitter, one legitimate receiver, and one eavesdropper. Specifically, we compute the achievable secrecy rate for various input signaling distributions, including the truncated generalized normal (TGN) and uniform distributions. The transmitter is equipped with multiple light sources, while the legitimate and unauthorized receivers are each equipped with a single photodetector. We analyze the achievable secrecy rates via transmit beamforming and artificial noise. In addition, both zero-forcing beamforming and robust beamforming are considered. In the former case, the location of the eavesdropper is assumed to be known, whereas in the latter case, the location of the eavesdropper is unknown. Our numerical results show that the secrecy rate achieved by the TGN distribution is significantly improved as compared to those achieved by the truncated Gaussian and uniform distributions, for both zero-forcing beamforming and robust beamforming. We also derive an upper bound on the achievable secrecy capacity that we used to assess the closeness of the achievable secrecy rates to the derived bound.

  12. Improved achievable secrecy rate of visible light communication with cooperative jamming

    KAUST Repository

    Zaid, Hajar; Rezki, Zouheir; Chaaban, Anas; Alouini, Mohamed-Slim

    2016-01-01

    constraint on the input distribution which renders Gaussian inputs not admissible. We provide an achievable secrecy rate that improves upon a recently established one in a concurrent work by Mostafa and Lampe. Our scheme follows from both the secrecy capacity

  13. On Secrecy Performance of Mixed RF-FSO Systems

    KAUST Repository

    Lei, Hongjiang; Dai, Zhijun; Ansari, Imran Shafique; Park, Kihong; pan, Gaofeng; Alouini, Mohamed-Slim

    2017-01-01

    In this work, we study the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) transmission systems. All RF links experience Nakagami-m fading and the FSO link experiences the Gamma-Gamma fading. The effect of pointing error and two types of detection techniques (i.e., heterodyne detection and intensity modulation with direct detection) are considered. We derive closed-form expressions for lower bound of the secrecy outage probability (SOP) and exact average secrecy capacity (ASC). Furthermore, by utilizing the expansion of Meijer's G-function, asymptotic results for SOP and ASC are derived when the electrical signal-to-noise ratio of the FSO link tends to infinity. Numerical and Monte-Carlo simulation results are provided to verify the accuracy of our proposed results.

  14. The semantics of secrecy: young children's classification of secret content.

    Science.gov (United States)

    Anagnostaki, Lida; Wright, Michael J; Bourchier-Sutton, Alison J

    2010-01-01

    The authors explored whether young children can distinguish potential secrets from nonsecrets by their content, as can older children, adolescents, and adults. Ninety children, 4, 5, and 6 years old, rated the secrecy of items from an adult-validated list of personal information about an age- and gender-appropriate puppet. Two factors of the children's data corresponded to the adult categories of nonsecrets and secrets, and a third factor corresponded to surprises. All ages rated surprises as significantly more secret than nonsecret items; however, the surprise items contained linguistic cues to secrecy. A tendency to rate nonsecrets as secret decreased with age, but only the 6-year-olds rated secrets other than surprises as significantly more secret than nonsecrets. Thus, children acquire the implicit rules defining secret content from a somewhat later age than that reported for the cognitive or behavioral capacities for secrecy.

  15. On Secrecy Performance of Mixed RF-FSO Systems

    KAUST Repository

    Lei, Hongjiang

    2017-07-05

    In this work, we study the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) transmission systems. All RF links experience Nakagami-m fading and the FSO link experiences the Gamma-Gamma fading. The effect of pointing error and two types of detection techniques (i.e., heterodyne detection and intensity modulation with direct detection) are considered. We derive closed-form expressions for lower bound of the secrecy outage probability (SOP) and exact average secrecy capacity (ASC). Furthermore, by utilizing the expansion of Meijer\\'s G-function, asymptotic results for SOP and ASC are derived when the electrical signal-to-noise ratio of the FSO link tends to infinity. Numerical and Monte-Carlo simulation results are provided to verify the accuracy of our proposed results.

  16. 75 FR 19463 - Procedures for Monitoring Bank Secrecy Act Compliance

    Science.gov (United States)

    2010-04-14

    ... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Procedures for Monitoring Bank Secrecy Act Compliance AGENCY: Office of Thrift Supervision (OTS), Treasury. ACTION: Notice and request for comment...; and Information Collection Comments, Chief Counsel's Office, Office of Thrift Supervision, 1700 G...

  17. Information Secrecy And Public-Key Cryptography | Mekuria | Zede ...

    African Journals Online (AJOL)

    The subject and need of information secrecy with emphasis to the choice of fully using an already established public channel is to be discussed. Related histories and current achievements made in the area of information hiding, notable persons who changed the course of its progress from ancient times to this last ...

  18. Keeping Government Secrecy Safe: Beyond Whack-a-Mole

    NARCIS (Netherlands)

    Curtin, D.M.

    2011-01-01

    The concept of secrecy as a mechanism for not providing government information, on the one hand, and the commitment to openness of government, on the other, reflect certain historical understandings of the relationship between a government, citizens, officials and information. Within democratic

  19. 78 FR 23916 - Secrecy and License To Export

    Science.gov (United States)

    2013-04-23

    ... DEPARTMENT OF COMMERCE Patent and Trademark Office Secrecy and License To Export ACTION: Proposed collection; comment request. SUMMARY: The United States Patent and Trademark Office (USPTO), as part of its continuing effort to reduce paperwork and respondent burden, invites the general public and other Federal...

  20. Protecting traditional knowledge - Does secrecy offer a solution ...

    African Journals Online (AJOL)

    Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 13, No 4 (2010) >. Log in or Register to get access to full text downloads.

  1. Does secrecy provide ample protection for traditional knowledge

    African Journals Online (AJOL)

    Administrator

    combined with the economic imperative to acquire exclusive rights over .... through independent development such as reverse engineering. Where ..... commercial activity with their traditional knowledge in the ordinary course of events,.

  2. A critical examination of factors that might encourage secrecy

    Science.gov (United States)

    Tough, Allen

    If a signal is detected someday from extraterrestrial intelligence, several factors might encourage complete and immediate secrecy. As a result, all data might be restricted to the receiving facility or nation instead of being shared promptly with SETI scientists around the world. Seven factors seem particularly like to encourage secrecy: (1) the belief that people may panic; (2) the fear of a negative impact on religion, science, and culture; (3) embarrassment; (4) the individual and national competitive urge; (5) avoiding a harmful premature reply; (6) a national trade or military advantage; and (7) the fear of a Trojan Horse. Three steps might alleviate the particularly difficult factors (numbers 4, 5, 6): an international treaty for immediate sharing of possible signals with SETI scientists in several other countries; implementation and frequent use of an actual network of scientists for such sharing; and further study of the possible need for partial restriction of data about the location and channel of a suspected signal.

  3. RFID Ownership Transfer with Positive Secrecy Capacity Channels

    Directory of Open Access Journals (Sweden)

    Jorge Munilla

    2016-12-01

    Full Text Available RFID ownership transfer protocols (OTPs transfer tag ownership rights. Recently, there has been considerable interest in such protocols; however, guaranteeing privacy for symmetric-key settings without trusted third parties (TTPs is a challenge still unresolved. In this paper, we address this issue and show that it can be solved by using channels with positive secrecy capacity. We implement these channels with noisy tags and provide practical values, thus proving that perfect secrecy is theoretically possible. We then define a communication model that captures spatiotemporal events and describe a first example of symmetric-key based OTP that: (i is formally secure in the proposed communication model and (ii achieves privacy with a noisy tag wiretap channel without TTPs.

  4. Secrecy Capacity of a Class of Orthogonal Relay Eavesdropper Channels

    Directory of Open Access Journals (Sweden)

    Aggarwal Vaneet

    2009-01-01

    Full Text Available The secrecy capacity of relay channels with orthogonal components is studied in the presence of an additional passive eavesdropper node. The relay and destination receive signals from the source on two orthogonal channels such that the destination also receives transmissions from the relay on its channel. The eavesdropper can overhear either one or both of the orthogonal channels. Inner and outer bounds on the secrecy capacity are developed for both the discrete memoryless and the Gaussian channel models. For the discrete memoryless case, the secrecy capacity is shown to be achieved by a partial decode-and-forward (PDF scheme when the eavesdropper can overhear only one of the two orthogonal channels. Two new outer bounds are presented for the Gaussian model using recent capacity results for a Gaussian multiantenna point-to-point channel with a multiantenna eavesdropper. The outer bounds are shown to be tight for two subclasses of channels. The first subclass is one in which the source and relay are clustered, and the eavesdropper receives signals only on the channel from the source and the relay to the destination, for which the PDF strategy is optimal. The second is a subclass in which the source does not transmit to the relay, for which a noise-forwarding strategy is optimal.

  5. Joint Secrecy for D2D Communications Underlying Cellular Networks

    KAUST Repository

    Hyadi, Amal

    2018-01-15

    In this work, we investigate the ergodic secrecy rate region of a block-fading spectrum-sharing system, where a D2D communication is underlying a cellular channel. We consider that both the primary and the secondary transmissions require their respective transmitted messages to be kept secret from a common eavesdropper under a joint secrecy constraint. The presented results are for three different scenarios, each corresponding to a particular requirement of the cellular system. First, we consider the case of a fair cellular system, and we show that the impact of jointly securing the transmissions can be balanced between the primary and the secondary systems. The second scenario examines the case when the primary network is demanding and requires the secondary transmission to be at a rate that is decodable by the primary receiver, while the last scenario assumes a joint transmission of artificial noise by the primary and the secondary transmitters. For each scenario, we present an achievable ergodic secrecy rate region that can be used as an indicator for the cellular and the D2D systems to agree under which terms the spectrum will be shared.

  6. Secrecy Capacity Analysis over α−μ Fading Channels

    KAUST Repository

    Lei, Hongjiang

    2017-02-15

    In this work, we study the secrecy capacity of the classic Wyner’s model over the α − μ fading channels, where α and μ specify the nonlinearity and clustering of fading channels, respectively. The average secrecy capacity (ASC) is derived in closed-form by using the extended generalized bivariate Fox’s Hfunction (EGBFHF). Moreover, the asymptotic analysis of ASC in high signal-to-noise ratio (SNR) regime is conducted. The asymptotic results unveil that the ASC follows the scaling law of Θ(ln p), where p stands for the ratio between the average powers of main channels and eavesdropping channels. Moreover, the ASC can be enhanced by increasing the transmit SNR, while there exists a ceiling of ASC as the SNRs at both sides are improved simultaneously. The accuracy of the analytical results is validated by Monte-Carlo simulations. The numerical results show that rigorous fading channels are beneficial to the secrecy performance, that is, serious nonlinearity (small α) and sparse clustering (small μ) will lead to the improvement of ASC.

  7. Secrecy Capacity Analysis over α−μ Fading Channels

    KAUST Repository

    Lei, Hongjiang; Ansari, Imran Shafique; Pan, Gaofeng; Alomair, Basel; Alouini, Mohamed-Slim

    2017-01-01

    In this work, we study the secrecy capacity of the classic Wyner’s model over the α − μ fading channels, where α and μ specify the nonlinearity and clustering of fading channels, respectively. The average secrecy capacity (ASC) is derived in closed-form by using the extended generalized bivariate Fox’s Hfunction (EGBFHF). Moreover, the asymptotic analysis of ASC in high signal-to-noise ratio (SNR) regime is conducted. The asymptotic results unveil that the ASC follows the scaling law of Θ(ln p), where p stands for the ratio between the average powers of main channels and eavesdropping channels. Moreover, the ASC can be enhanced by increasing the transmit SNR, while there exists a ceiling of ASC as the SNRs at both sides are improved simultaneously. The accuracy of the analytical results is validated by Monte-Carlo simulations. The numerical results show that rigorous fading channels are beneficial to the secrecy performance, that is, serious nonlinearity (small α) and sparse clustering (small μ) will lead to the improvement of ASC.

  8. Secrecy and Democracy: The Conflict between American Ideals and American Institutions

    Science.gov (United States)

    2014-05-22

    secrecy begins1 — Hannah Arendt , The Burden of our Time) INTRODUCTION The United States was born in secrecy. In 1787, the Constitutional Convention...Application Programming Interfaces.” American Behavioral Scientist 57, no. 5 (December 2012): 623-642. DOI:10.1177/000276421269363. Arendt , Hannah . The...secrecy and transparency, privacy and publicity, that undermines 1Hannah Arendt , The Burden of our Time (London: Secker and Warburg, 1951), 386

  9. 75 FR 79440 - Financial Crimes Enforcement Network; Bank Secrecy Act Advisory Group; Solicitation of...

    Science.gov (United States)

    2010-12-20

    ... DEPARTMENT OF THE TREASURY Financial Crimes Enforcement Network; Bank Secrecy Act Advisory Group; Solicitation of Application for Membership AGENCY: Financial Crimes Enforcement Network, Department of the... financial institutions and trade groups for membership on the Bank Secrecy Act Advisory Group. New members...

  10. Children's Disclosure and Secrecy: Links to Maternal Parenting Characteristics and Children's Coping Skills

    Science.gov (United States)

    Almas, Alisa N.; Grusec, Joan E.; Tackett, Jennifer L.

    2011-01-01

    The relations between maternal parenting characteristics, child disclosure and secrecy, and child outcomes (positive and negative strategies for coping with distress), were examined in a study of 140 children (10-12-year-olds) and their mothers. Child disclosure and secrecy were shown to be distinct but related constructs with authoritativeness…

  11. Is it bad to have secrets? Cognitive preoccupation as a toxic element of secrecy

    NARCIS (Netherlands)

    Maas, J.; Wismeijer, A.A.J.; Assen, M.A.L.M. van; Aquarius, A.E.A.M.

    2012-01-01

    This ex post facto study examined the effect of secrecy on well-being in a sample of 287 HIV-positive individuals, using both self-report data and objective immune parameters. The effects on well-being of three components of secrecy were studied; self-concealment, possession of a secret, and

  12. Secrecy as embodied practice: beyond the confessional imperative.

    Science.gov (United States)

    Hardon, Anita; Posel, Deborah

    2012-01-01

    This introduction to this special issue of Culture, Health & Sexuality aims to intervene critically in debates in public health about sexual rights and ways of de-stigmatising HIV/AIDS, in which silence and secrets are seen to undermine well-being and perpetuate stigma. It presents key insights from collaborative studies on HIV/AIDS and youth sexual health, arguing that advocates of disclosure and sexual rights need to think more contextually and tactically in promoting truth-telling. The authors aim to enhance current thinking on secrecy, which examines it primarily as a social practice, by emphasising the centrality of the body and the experience of embodiment in the making and unmaking of secrets. To understand secrecy as embodied practice requires understanding how it simultaneously involves the body as subject - as the basis from which we experience the world - and the body as object - that can be actively manipulated, silenced and 'done'. The authors show how tensions emerge when bodies reveal reproductive mishaps and describe how the dissonances are resolved through a variety of silencing practices. The paper ends by discussing the implications of these insights for sexual-health programmes.

  13. Disclosure of Professional Secrecy – A Criminal Law Analysis and Dilemmas (Dileme kaznivega dejanja neupravičene izdaje poklicne skrivnosti

    Directory of Open Access Journals (Sweden)

    Miha Šepec

    2017-12-01

    Full Text Available Disclosure of professional secrecy is incriminated in Article 142 of the Slovenian Penal Code (KZ-1. The offence protects the privacy of individuals in order to protect them from abuse when personal information and secrets are communicated to persons of certain professions (doctors, lawyers, priests, etc.. The issue is analyzed briefly; however, the context raises extremely complex dogmatic issues, particularly in the direction when unlawfulness of the crime shall be excluded, whether it is reasonable that such a complex offence is not prosecuted ex officio or upon request by the injured person, and the nature of relationship between the offence of disclosure of professional secrecy according to Article 142 and offences under Articles 280 (Failure to Inform Authorities of Preparations for Crime and 281 (Failure to Provide Information of Crime or Perpetrator of the Slovenian Penal Code. The aim of this paper is to highlight some legal dogmatic issues that have not yet been discussed in legal practice. On the other hand, the authors would also like to urge the legislature to amend the current criminal offence of disclosure of professional secrecy.

  14. Secrecy From Parents and Type 1 Diabetes Management in Late Adolescence.

    Science.gov (United States)

    Main, Alexandra; Wiebe, Deborah J; Van Bogart, Karina; Turner, Sara L; Tucker, Christy; Butner, Jonathan E; Berg, Cynthia A

    2015-01-01

    This study examined (a) associations of parent-adolescent relationship characteristics and adolescent problem behavior with late adolescents' secrecy from parents about type 1 diabetes management, and (b) whether secrecy was associated with diabetes and psychological outcomes independently of these factors. Adolescents (N = 247, Mage = 17.76 years) completed survey measures of diabetes-related secrecy from parents, disclosure, parental acceptance, parental knowledge, and conduct problems. Mothers and adolescents reported on adolescent adherence to diabetes regimens and adolescents reported their depressive symptoms. Glycemic control was obtained from HbA1c test kits. Adolescent-reported disclosure to parents was uniquely negatively associated with secrecy from parents. Controlling for relationship variables, conduct problems, and sociodemographic and illness-related variables, secrecy from mothers was uniquely associated with poorer glycemic control and secrecy from both parents was associated with lower adherence. Secrecy about type 1 diabetes management is uniquely associated with diabetes outcomes independent of other relationship characteristics and problem behaviors. © The Author 2015. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  15. Secrecy, simultaneous discovery, and the theory of nuclear reactors

    International Nuclear Information System (INIS)

    Weart, S.

    1977-01-01

    The history of nuclear reactors gives us a singular opportunity to study what happens when the world's leading physicists, faced with the same problem, find solutions in complete isolation from one another. This paper takes as an example an elementary part of reactor theory, the four-factor formula. It was discovered independently at least six times (in France, Germany, the Soviet Union, and the United States). But the groups, separated by wartime secrecy, used the formula in very different ways. Usually it was simply ignored. In only two cases was the formula integrated with experimental work: by the French and, in an entirely different way, by Fermi's team in Chicago. Thus even though simultaneous discovery occurred, we need not conclude that the physics developed inevitably in a unique pattern

  16. The dilemma of secrecy in the study of three ethnic groups from the South American Gran Chaco

    Directory of Open Access Journals (Sweden)

    Guadalupe BARÚA

    2013-12-01

    Full Text Available From an epistemological perspective, ethics poses a problem that goes beyond the issue of the stakeholders’ rationality or irrationality. Besides, it refers to the conceptual framework of knowledge, practices, and emotions allowed and forbidden within the group, as well as to their possible revelation to the researcher. This compels us to reconsider group secrets and their disclosure to the anthropologist. Undoubtedly, the resolution of this problem attempts to introduce a novel topic both concerning ethnographic fieldwork and anthropological reflection. Our examples are provided by the Wichi and Chorote Indians of the Argentine Chaco and by the Nivaclé of the Paraguayan Chaco. Secrets usually fall within the private sphere, whose meaning differs among these cultures: it may be based on a reasonable respect for intimacy, but also on the attribution of cosmological disorder that manifests the disintegration of the world. According to our experience, rubbish, body waste, corpses, or the violation of modesty as required by sexual relations attest to such disorder. Hence, all those topics associated either with Life or Death should occur not only in private but in a protected environment. We bring forward these issues by classifying secrecy into the following fields: 1 cognitive; 2 gender differences; 3 emotions; 4 offense; 5 guilt; 6 new forms of secrecy and disclosure. In this paper, the relevance of secrets is shown in unexpected situations arising from an interaction that takes place on the boundaries of standardised knowledge, and may contribute to the enhancement of anthropological knowledge while revealing unforeseen topics.

  17. Cooperative jamming power control to enhance secrecy communications of AF Relaying systems for Rayleigh fading channel

    KAUST Repository

    Park, Kihong; Alouini, Mohamed-Slim

    2012-01-01

    allocation; (i) rate-optimal power allocation and (ii) outage-optimal power allocation. More specifically, without the instantaneous channel knowledge for the eavesdropper side, the outage probability of the secrecy rate is minimized with respect

  18. Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.

    Science.gov (United States)

    Jandl, T

    1998-01-01

    This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.

  19. On the Secrecy Capacity of 5G New Radio Networks

    Directory of Open Access Journals (Sweden)

    Ke Xiao

    2018-01-01

    Full Text Available The new radio technology for the fifth-generation wireless system has been extensively studied all over the world. Specifically, the air interface protocols for 5G radio access network will be standardized by the 3GPP in the coming years. In the next-generation 5G new radio (NR networks, millimeter wave (mmWave communications will definitely play a critical role, as new NR air interface (AI is up to 100 GHz just like mmWave. The rapid growth of mmWave systems poses a variety of challenges in physical layer (PHY security. This paper investigates those challenges in the context of several 5G new radio communication technologies, including multiple-input multiple-output (MIMO and nonorthogonal multiple access (NOMA. In particular, we introduce a ray-tracing (RT based 5G NR network channel model and reveal that the secrecy capacity in mmWave band widely depends on the richness of radio frequency (RF environment through numerical experiments.

  20. On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation

    KAUST Repository

    Rezki, Zouheir

    2011-11-01

    The ergodic secrecy capacity of the wiretap channel is known when the main channel (between the transmitter and the legitimate receiver) state information (CSI) is perfect at the transmitter and the coherence period is sufficiently large to enable random coding arguments in each block. In a fast fading scenario, when the codeword length spans many coherence periods, the secrecy capacity is still not known. In this paper, we present a framework that characterizes this secrecy capacity under imperfect main channel estimation at the transmitter. Inner and outer bounds on the ergodic secrecy capacity are derived for a class of independent identically distributed (i.i.d.) fading channels. The achievable rate is a simple on-off scheme using a Gaussian input. The upper bound is obtained using an appropriate correlation scheme of the main and the eavesdropper channels. The upper and the lower bounds coincide with recently derived ones in the perfect main CSI extreme. Furthermore, the lower bound matches the upper bound in no main CSI extreme, where the secrecy capacity is equal to zero. Numerical results are provided for independent identically distributed (i.i.d.) Rayleigh fading channels. © 2011 IEEE.

  1. On the secrecy capacity of the wiretap channel with imperfect main channel estimation

    KAUST Repository

    Rezki, Zouheir

    2014-10-01

    We study the secrecy capacity of fast fading channels under imperfect main channel (between the transmitter and the legitimate receiver) estimation at the transmitter. Lower and upper bounds on the ergodic secrecy capacity are derived for a class of independent identically distributed (i.i.d.) fading channels. The achievable rate follows from a standard wiretap code in which a simple on-off power control is employed along with a Gaussian input. The upper bound is obtained using an appropriate correlation scheme of the main and eavesdropper channels and is the best known upper bound so far. The upper and lower bounds coincide with recently derived ones in case of perfect main CSI. Furthermore, the upper bound is tight in case of no main CSI, where the secrecy capacity is equal to zero. Asymptotic analysis at high and low signal-to-noise ratio (SNR) is also given. At high SNR, we show that the capacity is bounded by providing upper and lower bounds that depend on the channel estimation error. At low SNR, however, we prove that the secrecy capacity is asymptotically equal to the capacity of the main channel as if there were no secrecy constraint. Numerical results are provided for i.i.d. Rayleigh fading channels.

  2. On the Secrecy Capacity Region of the Block-Fading BCC with Limited CSI Feedback

    KAUST Repository

    Hyadi, Amal

    2017-02-07

    In this work, we examine the secrecy capacity region of the block-fading broadcast channel with confidential messages (BCC) when the transmitter has limited knowledge of the channel. In particular, we consider a two-user communication system where the transmitter has one common message to be transmitted to both users and one confidential message intended to only one of them. The confidential message has to be kept secret from the other user to whom the information is not intended. The transmitter is not aware of the channel state information (CSI) of neither channel and is only provided by limited CSI feedback sent at the beginning of each fading block. Assuming an error-free feedback link, we characterize the secrecy capacity region of this channel and show that even with a 1-bit CSI feedback, a positive secrecy rate can still be achieved. Then, we look at the case where the feedback link is not error- free and is rather a binary erasure channel (BEC). In the latter case, we provide an achievable secrecy rate region and show that as long as the erasure event is not a probability 1 event, the transmitter can still transmit the confidential information with a positive secrecy rate.

  3. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal

    2016-10-27

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  4. Secrecy performance analysis of SIMO underlay cognitive radio systems with outdated CSI

    KAUST Repository

    Lei, Hongjiang; Zhang, Jianming; Park, Kihong; Ansari, Imran Shafique; Pan, Gaofeng; Alouini, Mohamed-Slim

    2017-01-01

    This study investigates the secrecy outage performance of a single-input multiple-output underlay cognitive radio network (CRN) with outdated channel state information (CSI). The confidential messages are transmitted from transmitter to the destination, while a multi-antenna eavesdropper exists. The maximal ratio combining and selection combining schemes are utilised at the receivers to improve the quality of the received signal-to-noise ratio. The exact and asymptotic closed-form expressions of secrecy outage probability are derived, and simulation results are provided to verify the authors' proposed analytical results. The results reveal that imperfect CSI of main channels deteriorates the secrecy outage performance while that of eavesdropping and interfering channels has contrary effect, and only a unity diversity order can be obtained in underlay CRNs with imperfect CSI.

  5. On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2015-01-01

    We study the ergodic secrecy capacity of a block fading wiretap channel when there are multiple antennas at the transmitter, the legitimate receiver and the eavesdropper. We consider that the receivers are aware of their respective channel matrices while the transmitter is only provided by a B-bits feedback of the main channel state information. The feedback bits are sent by the legitimate receiver, at the beginning of each fading block, over an error free public link with limited capacity. Assuming an average transmit power constraint, we provide an upper and a lower bounds on the ergodic secrecy capacity. Then, we present a framework to design the optimal codebooks for feedback and transmission. In addition, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback link becomes large; hence, fully characterizing the secrecy capacity in this case.

  6. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information

    KAUST Repository

    Hyadi, Amal

    2014-12-01

    In this paper, we consider secure broadcasting over fast fading channels. Assuming imperfect main channel state information (CSI) at the transmitter, we first provide an upper and a lower bounds on the ergodic secrecy capacity when a common message is broadcasted to multiple legitimate receivers in the presence of one eavesdropper. For this case, we show that the secrecy rate is limited by the legitimate receiver having, on average, the worst main channel link. Then, we present an expression for the achievable secrecy sum-rate when each legitimate receiver is interested in an independent message. The special cases of high SNR, perfect and no-main CSI are also analyzed. Numerical results are presented to illustrate the obtained results for the case of independent but not necessarily identically distributed Rayleigh fading channels.

  7. Secrecy performance analysis of SIMO underlay cognitive radio systems with outdated CSI

    KAUST Repository

    Lei, Hongjiang

    2017-06-13

    This study investigates the secrecy outage performance of a single-input multiple-output underlay cognitive radio network (CRN) with outdated channel state information (CSI). The confidential messages are transmitted from transmitter to the destination, while a multi-antenna eavesdropper exists. The maximal ratio combining and selection combining schemes are utilised at the receivers to improve the quality of the received signal-to-noise ratio. The exact and asymptotic closed-form expressions of secrecy outage probability are derived, and simulation results are provided to verify the authors\\' proposed analytical results. The results reveal that imperfect CSI of main channels deteriorates the secrecy outage performance while that of eavesdropping and interfering channels has contrary effect, and only a unity diversity order can be obtained in underlay CRNs with imperfect CSI.

  8. Improved achievable secrecy rate of visible light communication with cooperative jamming

    KAUST Repository

    Zaid, Hajar

    2016-02-25

    In this paper we study the problem of securing a visible light communication (VLC) link against passive eavesdropping, with the help of a (friendly) jammer. Differently from radio frequency (RF) communications, VLC imposes a peak amplitude constraint on the input distribution which renders Gaussian inputs not admissible. We provide an achievable secrecy rate that improves upon a recently established one in a concurrent work by Mostafa and Lampe. Our scheme follows from both the secrecy capacity result by Wyner and the artificial noise scheme by Goel and Negi, but using truncated Gaussian input distributions instead of uniform ones. Via numerical results, we show that our secrecy rate outperforms the concurrent rate in different settings. © 2015 IEEE.

  9. On the Secrecy Capacity of the Multiple-Antenna Wiretap Channel with Limited CSI Feedback

    KAUST Repository

    Hyadi, Amal

    2015-12-01

    We study the ergodic secrecy capacity of a block fading wiretap channel when there are multiple antennas at the transmitter, the legitimate receiver and the eavesdropper. We consider that the receivers are aware of their respective channel matrices while the transmitter is only provided by a B-bits feedback of the main channel state information. The feedback bits are sent by the legitimate receiver, at the beginning of each fading block, over an error free public link with limited capacity. Assuming an average transmit power constraint, we provide an upper and a lower bounds on the ergodic secrecy capacity. Then, we present a framework to design the optimal codebooks for feedback and transmission. In addition, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback link becomes large; hence, fully characterizing the secrecy capacity in this case.

  10. On the secrecy capacity of the broadcast wiretap channel with limited CSI feedback

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we investigate the problem of secure broadcasting over block-fading channels with limited channel knowledge at the transmitter. More particularly, we analyze the effect of having imperfect channel state information (CSI) via a finite rate feedback on the throughput of a broadcast channel where the transmission is intended for multiple legitimate receivers in the presence of an eavesdropper. First, we partially characterize the ergodic secrecy capacity of the system when the source broadcasts the same information to all the receivers, i.e., common message transmission. Then, we look at the independent messages case, where the transmitter broadcasts multiple independent messages to the legitimate receivers. For this case, we present lower and upper bounds on the ergodic secrecy sum-capacity. In both scenarios, we show that the proposed lower and upper bounds coincide asymptotically as the capacity of the feedback links becomes large, hence, fully characterizing the secrecy capacity in this case.

  11. Recurring tensions between secrecy and democracy : Arguments on the Security Service in Dutch parliament, 1975-1995

    NARCIS (Netherlands)

    Braat, E.C.

    2016-01-01

    There is a recurring tension between secrecy and democracy. This article analyzes the continually ambiguous relations between intelligence and security agencies and their parliamentary principals. I present a novel conceptual framework to analyze political relations influenced by secrecy. I draw on

  12. A Sketch of Modern Cryptology - The Art and Science of Secrecy

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 5; Issue 9. A Sketch of Modern Cryptology - The Art and Science of Secrecy Systems. Palash Sarkar. General Article Volume 5 Issue 9 September 2000 pp 22-40. Fulltext. Click here to view fulltext PDF. Permanent link:

  13. The End of Bank Secrecy? An Evaluation of the G20 Tax Haven Crackdown

    DEFF Research Database (Denmark)

    Johannesen, Niels; Zucman, Gabriel

    During the ¿nancial crisis, G20 countries compelled tax havens to sign bilateral treaties providing for exchange of bank information. Policymakers have celebrated this global initiative as the end of bank secrecy. Exploiting a unique panel dataset, we study how the treaties a¿ected bank deposits ...

  14. 76 FR 18365 - Fair Credit Reporting Act and Bank Secrecy Act Compliance

    Science.gov (United States)

    2011-04-04

    ... Procedure Act (APA), an agency may, for good cause, find (and incorporate the finding and a brief statement... and comment procedures prescribed by the APA are unnecessary because the final rule makes technical... Asked Questions, and the FFIEC Bank Secrecy Act/Anti-Money Laundering Examination Manual. (iii...

  15. 37 CFR 5.5 - Permit to disclose or modification of secrecy order.

    Science.gov (United States)

    2010-07-01

    ... to file must be made known, as well as all attorneys, agents and others to whom the material will be....C. 182, shall be made by a “permit” or “modification” of the secrecy order. (b) Petitions for a... explanation of such clearance should be made in the petition including the name of the agency or department...

  16. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  17. 76 FR 10234 - Amendment to the Bank Secrecy Act Regulations-Reports of Foreign Financial Accounts

    Science.gov (United States)

    2011-02-24

    ... reporting requirement accounts located in jurisdictions that are not considered to be ``tax havens'' or that... report titled, Tax Haven Abuses: the Enablers, the Tools and Secrecy, Senate Hearing 109-797, 109th Cong... determined to have a high degree of usefulness in criminal, tax, regulatory, and counter-terrorism matters...

  18. On the ergodic secrecy capacity of the wiretap channel under imperfect main channel estimation

    KAUST Repository

    Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2011-01-01

    imperfect main channel estimation at the transmitter. Inner and outer bounds on the ergodic secrecy capacity are derived for a class of independent identically distributed (i.i.d.) fading channels. The achievable rate is a simple on-off scheme using a

  19. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  20. On the secrecy capacity of the broadcast wiretap channel with imperfect channel state information

    KAUST Repository

    Hyadi, Amal; Rezki, Zouheir; Khisti, Ashish J.; Alouini, Mohamed-Slim

    2014-01-01

    for the achievable secrecy sum-rate when each legitimate receiver is interested in an independent message. The special cases of high SNR, perfect and no-main CSI are also analyzed. Numerical results are presented to illustrate the obtained results for the case

  1. Public knowledge and common secrets. Secrecy and its limits in the early modern Netherlands

    NARCIS (Netherlands)

    Davids, C.A.

    2005-01-01

    Openness of knowledge was in the Dutch Republic no more a natural state of affairs than in other parts of Europe at the time, but it became dominant there at an earlier date than elsewhere. This puzzling phenomenon is the subject of this essay. The article shows that tendencies to secrecy in crafts

  2. Silence and Memories of War: An Autoethnographic Exploration of Family Secrecy.

    Science.gov (United States)

    Rober, Peter; Rosenblatt, Paul C

    2017-03-01

    A personal journey and a scientific challenge, this is an autoethnographic study about my own family's secrecy. I knew my grandfather had been a German prisoner of war during World War II. We all knew. But nobody talked about it. Then one day I decided I wanted to do systematic research on the issue of family secrecy around my grandfather's war experiences. Researching one's own family can be called autoethnography. It could be said that autoethnography is an approach to research that aims to describe and systemically analyze (graphy) personal experience (auto) to understand social and cultural phenomena (ethno). This scientific approach is quite new in the field of family therapy. This study has been an important personal quest, but it also led to important reflections on silences in families, on my own professional development, and on methodological issues concerning autoethnographical research. For one thing, it highlights some of the positive aspects of family secrecy and silences, and invites us-when confronted with family secrecy in clinical practice-to carefully consider the potential destructive and life-giving aspects of the silence. © 2015 Family Process Institute.

  3. Understanding Research Strategies to Improve ERA Performance in Australian Universities: Circumventing Secrecy to Achieve Success

    Science.gov (United States)

    Diezmann, Carmel M.

    2018-01-01

    Many Australian universities have prioritised improving discipline performance on the national research assessment--Excellence for Research in Australia. However, a "culture of secrecy" pervades "Excellence in Research for Australia" (ERA). There are no specified criteria for the assignment of ratings on a 5-point scale ranging…

  4. Estudios de secreción de IL-12 en macrófagos J774A.1

    OpenAIRE

    Rojas Rojas, Angela Patricia

    2012-01-01

    El tráfico de membranas en macrófagos activados es requerido para dos eventos críticos en la inmunidad innata, como son fagocitosis y secreción de citoquinas proinflamatorias. Sin embargo, no existe evidencia significativa a cerca de las rutas de secreción en macrófagos, excepto para IL-1 β (Andrei et al., 2004) y TNF-a, en infección por Cándida albicans (Murray et al., 2005) y Leishmania amazonensis (Montoya, 2010), a diferencia de la secreción en células endocrinas y neuroendocrinas d...

  5. Secrecy in the collection and mediation practices of two World Wars objects: lessons from a shared survey

    Directory of Open Access Journals (Sweden)

    Emilie DA LAGE

    2013-12-01

    Full Text Available This paper focuses on secrecy, observed through the collection and mediation practices of two World Wars objects. The first part of this article examines secrecy through the prism of a survey conducted, on the one hand, by the collector to uncover the secret of the object, and, on the other hand, by us to uncover the secret of its collection. The second part of this contribution focuses on secrecy in the mediation practices of collectors and on the process of revelation and concealment of certain aspects of the exhibits, characterizing those practices. Some reflections on the communication of the results of our personal research are also presented.

  6. On the Secrecy Degrees of Freedom with Full-Duplex Communication

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Mogensen, Preben Elgaard

    2017-01-01

    of such an application. The potential of full duplex nodes in improving the physical layer security of a communication link is investigated in this contribution. We specifically derive the information theoretic secrecy degrees of freedom measure for a pair of nodes communicating in full duplex mode. Moreover, closed...... and the delay reduction of full duplex communication are somewhat limited in realistic network settings, leading researchers to study other possible applications of full duplex communication which can provide significantly higher gains over half duplex communication. Physical layer security is an example...... form expressions for the instantaneous and ergodic throughput gain of full duplex communication over conventional half duplex is derived. The secrecy degrees of freedom with full duplex is shown to be two as opposed to that of zero in half duplex mode....

  7. Secrecy Dimming Capacity in Multi-LED PAM-Based Visible Light Communications

    Directory of Open Access Journals (Sweden)

    Byung Wook Kim

    2017-01-01

    Full Text Available Recently, mobile cloud computing (MCC has gained a lot of interest for researchers building the next-generation mobile applications. Because unauthorized access may cause serious problems, security and privacy with MCC have become significant issues. This paper addresses the secrecy dimming capacity of secure transmission in MCC over visible light communication (VLC channels. By obtaining the entropy-maximizing symbol probability of multiple light emitting diode- (LED- based pulse amplitude modulation (PAM, mathematical analysis of the secrecy dimming capacity of VLC was derived. Simulation results show that the secure transmission ability of multi-LED-based VLC is determined according to the number of activated LEDs and target dimming level. This can be a guideline for practical VLC-based mobile network designers intending to secure wireless transmission and to decide on the number of activated LEDs at target dimming level to operate.

  8. ETHIC AND SECRECY ON THE CORPORATE ENVIRONMENT AND THE SECRETARIAT PROFESSIONALS

    Directory of Open Access Journals (Sweden)

    Maria do Carmo Whitaker

    2010-09-01

    Full Text Available This paper, based on theoretical and field research, aims at showing the importance of preserving confidentiality on a daily basis in the context of an "ethical company”. It reports how this practice besides solidifying the image of the organization can also guarantee the existence of a high level of trust and respect between the participants emphasizing the importance of secretarial professionals in that mission. Besides being a regulated profession, which has a code of ethics with explicit determinations about the importance of confidentiality, secrecy is one of the attributes required for the job. The secretaries are aware and convinced of the necessity of secrecy not only in the exercise of their profession, but in their private lives, considering that private interests should not outweigh the public interest.

  9. Cooperative jamming power control to enhance secrecy communications of AF Relaying systems for Rayleigh fading channel

    KAUST Repository

    Park, Kihong

    2012-09-01

    In this paper, we investigate secrecy communications in two-hop wireless relaying networks which consist of one source, one amplify-and-forward (AF) relay, one legitimate destination, and one eavesdropper. To prevent the eavesdropper from intercepting the source message, we make the destination send the intended noise to the AF relay during the first phase. This is referred to as cooperative jamming. According to the channel information at the destination, we address two types of jamming power allocation; (i) rate-optimal power allocation and (ii) outage-optimal power allocation. More specifically, without the instantaneous channel knowledge for the eavesdropper side, the outage probability of the secrecy rate is minimized with respect to the intended noise power level. We show that the outage-optimal allocation gives almost the same outage probability as the rateoptimal one. In addition, the jamming power consumption can be significantly reduced compared to the fixed and rate-optimal power allocation methods. © 2012 IEEE.

  10. Interference Neutralization vs Clean Relaying in Cognitive Radio Networks with Secrecy

    Directory of Open Access Journals (Sweden)

    Pin-Hsun Lin

    2015-08-01

    Full Text Available In this paper we study cognitive radio networks with secrecy constraints on the primary transmission. In particular we consider several transmission schemes for the secondary transmitter, namely interference neutralization (IN and cooperative jamming with and without clean relaying (CR. We derive and analyze the achievable secondary rate performance of the schemes. Furthermore we thoroughly investigate the advantages and shortcomings of these schemes through numerical simulations in a geometric model where we highlight the impact of the users’ locations and show the important difference in all schemes depending on the topology. Our results show that the secondary transmitter can successfully adapt its transmission scheme (and parameters, i.e., either IN or CR, depending on its location to maximize its rate while insuring perfect secrecy of the primary transmission.

  11. University Deals with Drug Companies Raise Concerns over Autonomy, Secrecy.

    Science.gov (United States)

    Nicklin, Julie L.

    1993-01-01

    The large, exclusive research deal the Scripps Research Institute (California) made with one drug company has drawn criticism for conflict of interest. Critics fear researchers will focus more on marketing than on pure science and will protect corporate interests. Much of the deal-making is with foreign companies, sending profits overseas. (MSE)

  12. An Optimal Joint User Association and Power Allocation Algorithm for Secrecy Information Transmission in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Rong Chai

    2017-01-01

    Full Text Available In recent years, heterogeneous radio access technologies have experienced rapid development and gradually achieved effective coordination and integration, resulting in heterogeneous networks (HetNets. In this paper, we consider the downlink secure transmission of HetNets where the information transmission from base stations (BSs to legitimate users is subject to the interception of eavesdroppers. In particular, we stress the problem of joint user association and power allocation of the BSs. To achieve data transmission in a secure and energy efficient manner, we introduce the concept of secrecy energy efficiency which is defined as the ratio of the secrecy transmission rate and power consumption of the BSs and formulate the problem of joint user association and power allocation as an optimization problem which maximizes the joint secrecy energy efficiency of all the BSs under the power constraint of the BSs and the minimum data rate constraint of user equipment (UE. By equivalently transforming the optimization problem into two subproblems, that is, power allocation subproblem and user association subproblem of the BSs, and applying iterative method and Kuhn-Munkres (K-M algorithm to solve the two subproblems, respectively, the optimal user association and power allocation strategies can be obtained. Numerical results demonstrate that the proposed algorithm outperforms previously proposed algorithms.

  13. Secrecy in Educational Practices: Enacting Nested Black Boxes in Cheating and Deception Detection Systems

    Directory of Open Access Journals (Sweden)

    Jo An Oravec

    2018-02-01

    Full Text Available This paper covers secrecy from the vantage point of recent technological initiatives designed to detect cheating and deception in educational contexts as well as to monitor off-campus social media speech code violations. Many of these systems are developed and implemented by third-party corporate entities who claim practices to be proprietary and secret. The outsourcers involved in these efforts have provided one level of secrecy and educational administrators involved yet another level, thus constructing "nested black boxes." Also discussed in this paper is the “paranoid style” of administration, often supported by the surveillance and construction of rosters of potential non-conformists, such as alleged cheaters and speech code violators. The educational technologies described in this article are increasingly applied to workplace practices, with young people being trained in what is deemed acceptable conduct. Secrecy can serve to alter the character of relationships within the educational institutions involved as well as inside the workplaces in which the approaches are increasingly being integrated.

  14. Secrecy Outage of Max-Min TAS Scheme in MIMO-NOMA Systems

    KAUST Repository

    Lei, Hongjiang

    2018-04-09

    This paper considers a secure non-orthogonal multiple access system, where confidential messages are transmitted from a base station to multiple legitimate destinations and wiretapped by multiple illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model and all the nodes are equipped with multiple antennas, respectively. Both non-colluding and colluding eavesdroppers are respectively considered. Max-min (MM) transmit antenna selection (TAS) strategy is adopted to improve the secrecy performance of the target system, in which both users in user paring are considered simultaneously. In particular, closed-form expressions for the cumulative distribution function of the signal-to-interference-noise ratio at the legitimate user are derived firstly. Then we obtain the exact and asymptotic analytical results in a closed form for the secrecy outage probability of MM TAS scheme. Monte-Carlo simulation results are presented to corroborate the correctness of the analysis. The results show that the secrecy diversity order is zero and non-zero for fixed and dynamic power allocations, respectively.

  15. Secrecy Outage of Max-Min TAS Scheme in MIMO-NOMA Systems

    KAUST Repository

    Lei, Hongjiang; Zhang, Jianming; Park, Kihong; Xu, Peng; Zhang, Zufan; Pan, Gaofeng; Alouini, Mohamed-Slim

    2018-01-01

    This paper considers a secure non-orthogonal multiple access system, where confidential messages are transmitted from a base station to multiple legitimate destinations and wiretapped by multiple illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model and all the nodes are equipped with multiple antennas, respectively. Both non-colluding and colluding eavesdroppers are respectively considered. Max-min (MM) transmit antenna selection (TAS) strategy is adopted to improve the secrecy performance of the target system, in which both users in user paring are considered simultaneously. In particular, closed-form expressions for the cumulative distribution function of the signal-to-interference-noise ratio at the legitimate user are derived firstly. Then we obtain the exact and asymptotic analytical results in a closed form for the secrecy outage probability of MM TAS scheme. Monte-Carlo simulation results are presented to corroborate the correctness of the analysis. The results show that the secrecy diversity order is zero and non-zero for fixed and dynamic power allocations, respectively.

  16. Performance Analysis of Secrecy Outage Probability for AF-Based Partial Relay Selection with Outdated Channel Estimates

    Directory of Open Access Journals (Sweden)

    Kyu-Sung Hwang

    2017-01-01

    Full Text Available We study the secrecy outage probability of the amplify-and-forward (AF relaying protocol, which consists of one source, one destination, multiple relays, and multiple eavesdroppers. In this system, the aim is to transmit the confidential messages from a source to a destination via the selected relay in presence of eavesdroppers. Moreover, partial relay selection scheme is utilized for relay selection based on outdated channel state information where only neighboring channel information (source-relays is available and passive eavesdroppers are considered where a transmitter does not have any knowledge of eavesdroppers’ channels. Specifically, we offer the exact secrecy outage probability of the proposed system in a one-integral form as well as providing the asymptotic secrecy outage probability in a closed-form. Numerical examples are given to verify our provided analytical results for different system conditions.

  17. Decree of 17 June 1971, Stb. 420, concerning the implementation of Section 68 of the Nuclear Energy Act (Nuclear Energy Act (Secrecy) Decree)

    International Nuclear Information System (INIS)

    1971-01-01

    This Decree lays down that rules may be made to secure the secrecy of a number of nuclear matters. An obligation to observe secrecy may be imposed upon persons engaged in the nuclear activities listed in the Decree if the interest of the State so requires. The competent Minister for the activity concerned is empowered to impose this obligation. (NEA) [fr

  18. On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation

    KAUST Repository

    Rezki, Zouheir; Alomair, Basel; Alouini, Mohamed-Slim

    2014-01-01

    We consider a wiretap channel consisting of a source with multiple antennas, a legitimate receiver and an eavesdropper with a single antenna each. The channels between the source and the receivers undergo fast fading. We assume that the transmitter, in addition to the statistics of both channels, is only aware of a noisy version of the CSI to the legitimate receiver referred to as main channel. The legitimate receiver is aware of both its instantaneous channel gain and the transmitter's estimate of the main channel. On the other hand, the eavesdropper's receiver, in addition to its instantaneous channel realization, is aware of the actual main CSI and the transmitter's estimate as well. While the capacity of this channel is still open even with perfect CSI at the transmitter, we provide in this paper upper and lower bounds on the secrecy capacity. The upper bound is tighter than the one corresponding to perfect main CSI and the gap between the two upper bounds is characterized in function of the channel estimation error variance, at high-SNR. Furthermore, we show that our upper and lower bounds coincide in the case of no main CSI providing a trivial secrecy capacity.

  19. On the secrecy capacity of the MISO wiretap channel under imperfect channel estimation

    KAUST Repository

    Rezki, Zouheir

    2014-12-01

    We consider a wiretap channel consisting of a source with multiple antennas, a legitimate receiver and an eavesdropper with a single antenna each. The channels between the source and the receivers undergo fast fading. We assume that the transmitter, in addition to the statistics of both channels, is only aware of a noisy version of the CSI to the legitimate receiver referred to as main channel. The legitimate receiver is aware of both its instantaneous channel gain and the transmitter\\'s estimate of the main channel. On the other hand, the eavesdropper\\'s receiver, in addition to its instantaneous channel realization, is aware of the actual main CSI and the transmitter\\'s estimate as well. While the capacity of this channel is still open even with perfect CSI at the transmitter, we provide in this paper upper and lower bounds on the secrecy capacity. The upper bound is tighter than the one corresponding to perfect main CSI and the gap between the two upper bounds is characterized in function of the channel estimation error variance, at high-SNR. Furthermore, we show that our upper and lower bounds coincide in the case of no main CSI providing a trivial secrecy capacity.

  20. Don't ask or tell: Pay secrecy policies in U.S. workplaces.

    Science.gov (United States)

    Rosenfeld, Jake

    2017-07-01

    How widespread are workplace rules against discussing wages and salaries in the U.S.? And what are the core correlates of whether or not an employer prohibits or discourages this type of speech? Using a unique dataset that includes a measure of whether workers are prohibited or discouraged from discussing pay, this article investigates the prevalence of pay secrecy policies, and what worker- and workplace-level characteristics are associated with these rules. Key findings reveal that these policies are commonplace, despite being illegal, and that they are concentrated in more "coercive" rather than "enabling" organizations. These more coercive workplaces are disproportionately in the private sector, lack union representation, and have managers that are generally punitive in their approach and unaccommodating of employees. Findings also indicate that the greater discretion pay secrecy provides managers does not result in discriminatory application of these rules to women, racial/ethnic minorities, or immigrants. The article concludes with a call for data collection efforts that would allow researchers to analyze the consequences of this widespread managerial practice. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. 77 FR 33635 - Amendment to the Bank Secrecy Act Regulations-Requirement That Clerks of Court Report Certain...

    Science.gov (United States)

    2012-06-07

    ... business rule reflects that the definition of currency used therein is slightly different from the... Amendment to the Bank Secrecy Act Regulations--Requirement That Clerks of Court Report Certain Currency...: FinCEN is amending the rules relating to the reporting of certain currency transactions consistent...

  2. 76 FR 72878 - Financial Crimes Enforcement Network; Amendment to the Bank Secrecy Act Regulations-Imposition of...

    Science.gov (United States)

    2011-11-28

    ... Iran as a Jurisdiction of Primary Money Laundering Concern AGENCY: Financial Crimes Enforcement Network... Republic of Iran (``Iran'') is a jurisdiction of primary money laundering concern pursuant to 31 U.S.C... Act amends the anti- money laundering provisions of the Bank Secrecy Act (``BSA''), codified at 12 U.S...

  3. On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks over Nakagami-m Fading Channels

    KAUST Repository

    Lei, Hongjiang; Zhang, Huan; Ansari, Imran Shafique; Ren, Zhi; Pan, Gaofeng; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the secrecy outage performance of an underlay cognitive decode-and-forward relay network over independent but not necessarily identical distributed (i.n.i.d) Nakagami-m fading channels is investigated, in which the secondary user transmitter communicates with the secondary destination via relays, and an eavesdropper attempts to overhear the information. Based on whether the channel state information (CSI) of the wiretap links is available or not, we analyze the secrecy outage performance with optimal relay selection (ORS) and suboptimal relay selection (SRS) schemes, and multiple relays combining scheme (MRC) scheme is considered for comparison purpose. The exact and asymptotic closed-form expressions for the secrecy outage probability with three different relay selection schemes are derived and verified by Monte-Carlo simulations. The numerical results illustrate that ORS scheme always outperforms SRS and MRC schemes, and SRS scheme is better than MRC scheme in the lower fading parameters scenario. Furthermore, through asymptotic analysis, we find that these three different schemes achieve the same secrecy diversity order, which is determined by the number of the relays, and the fading parameters of the links among the relays and the destination.

  4. On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks over Nakagami-m Fading Channels

    KAUST Repository

    Lei, Hongjiang

    2017-10-02

    In this paper, the secrecy outage performance of an underlay cognitive decode-and-forward relay network over independent but not necessarily identical distributed (i.n.i.d) Nakagami-m fading channels is investigated, in which the secondary user transmitter communicates with the secondary destination via relays, and an eavesdropper attempts to overhear the information. Based on whether the channel state information (CSI) of the wiretap links is available or not, we analyze the secrecy outage performance with optimal relay selection (ORS) and suboptimal relay selection (SRS) schemes, and multiple relays combining scheme (MRC) scheme is considered for comparison purpose. The exact and asymptotic closed-form expressions for the secrecy outage probability with three different relay selection schemes are derived and verified by Monte-Carlo simulations. The numerical results illustrate that ORS scheme always outperforms SRS and MRC schemes, and SRS scheme is better than MRC scheme in the lower fading parameters scenario. Furthermore, through asymptotic analysis, we find that these three different schemes achieve the same secrecy diversity order, which is determined by the number of the relays, and the fading parameters of the links among the relays and the destination.

  5. Care and secrecy: being a mother of children living with HIV in Burkina Faso.

    Science.gov (United States)

    Hejoaka, Fabienne

    2009-09-01

    Home care has become a central component of the response to the HIV/AIDS epidemic, displacing caregiving work onto women. While increasing interest has been paid to HIV/AIDS care with a focus on ailing adults and orphan foster care, the issue of caring for children living with HIV has received little attention in the social sciences. Based on ethnographic material gathered in Burkina Faso between November 2005 and December 2006, the aim of this paper was to gain understanding of women who mother and care for children living with HIV in resource-limited countries. The study involved participant observation in community-based organizations in Burkina Faso and semi-structured interviews with 20 women mothering HIV-positive children as well as 15 children infected with HIV, aged between 8 and 18 years. In daily care mothers face many great challenges, ranging from the routine of pill-taking to disturbing discussions with children asking questions about their health or treatment. The results also show how HIV/AIDS-related stigma adds an additional layer to the burden of care, compelling mothers to deal with the tension between secrecy surrounding the disease and the openness required in providing care and receiving social support. As mothers live in fear of disclosure, they have to develop concealment strategies around children's treatment and the nature of the disease. Conversely, some mothers may share their secret with kin members, close relatives or their children to gain social support. As HIV/AIDS care is shaped by secrecy, these findings shed light on mothers' isolation in child care within a context of changing patterns of family bonds and lack of formal psychosocial support addressing child-related issues. Finally, women's engagement in child care invites us to look beyond the essentialist approach of women's vulnerability conveyed by international discourse to characterise the situation of women facing the HIV/AIDS impact.

  6. Protective

    Directory of Open Access Journals (Sweden)

    Wessam M. Abdel-Wahab

    2013-10-01

    Full Text Available Many active ingredients extracted from herbal and medicinal plants are extensively studied for their beneficial effects. Antioxidant activity and free radical scavenging properties of thymoquinone (TQ have been reported. The present study evaluated the possible protective effects of TQ against the toxicity and oxidative stress of sodium fluoride (NaF in the liver of rats. Rats were divided into four groups, the first group served as the control group and was administered distilled water whereas the NaF group received NaF orally at a dose of 10 mg/kg for 4 weeks, TQ group was administered TQ orally at a dose of 10 mg/kg for 5 weeks, and the NaF-TQ group was first given TQ for 1 week and was secondly administered 10 mg/kg/day NaF in association with 10 mg/kg TQ for 4 weeks. Rats intoxicated with NaF showed a significant increase in lipid peroxidation whereas the level of reduced glutathione (GSH and the activity of superoxide dismutase (SOD, catalase (CAT, glutathione S-transferase (GST and glutathione peroxidase (GPx were reduced in hepatic tissues. The proper functioning of the liver was also disrupted as indicated by alterations in the measured liver function indices and biochemical parameters. TQ supplementation counteracted the NaF-induced hepatotoxicity probably due to its strong antioxidant activity. In conclusion, the results obtained clearly indicated the role of oxidative stress in the induction of NaF toxicity and suggested hepatoprotective effects of TQ against the toxicity of fluoride compounds.

  7. Prevalencia de microorganismos asociados a secreción genital femenina, Argentina

    Directory of Open Access Journals (Sweden)

    Di Bartolomeo Susana

    2002-01-01

    Full Text Available OBJETIVO: Hay un aumento significativo de pacientes con Secreción Genital Femenina, en el Sector Público del gran Buenos Aires. Fue necesario actualizar la prevalencia de los microorganismos asociados a los efectos de revisar el apoyo necesario de laboratorio y ajustar las medidas de prevención y control. MÉTODOS: Se incorporan a este estudio, la totalidad de los casos atendidos (1997-1998: 84 adolescentes (15 a 19 años y 784 adultas (20 a 60 años sintomáticas. El protocolo incluye (secreción vaginal y endocervical detección de Neisseria gonorrhoeae, Streptococcus agalactiae, Trichomonas vaginalis, Candida spp y vaginosis bacteriana. Aplicando métodos específicos directos y cultivo, Chlamydia trachomatis (detección de antígeno, Ureaplasma urealitycum y Mycoplasma hominis (cultivos fueron estudiados en parte de la población total. RESULTADOS: El aumento de la demanda de consulta fue continuo desde 1997 y aumentó 2.10 veces del primero al último semestre de 1998. En las mujeres adultas se encontró: vaginosis bacteriana, 23,8%; Candida spp 17,8%; S. agalactiae 5,6%; T. vaginalis 2,4%. En 50,3% no se detecto ninguno. En adolescentes se detectó: vaginosis bacteriana, 17,8%; Candida spp 29,7%; S. agalactiae 3,6%, T. vaginalis 2,4%: En 46,4% de los casos el resultado fue negativo. En el grupo de mujeres adultas sintomáticas, no en la totalidad, se detectó: C. trachomatis (7/400 1,76%, U. urealyticum (209/340 61,4% y M. hominis (45/272 16,5%. CONCLUSIONES: El aumento significativo de consultas se debe a problemas sociales en la población, no al aumento de ninguna patología en especial. Impacta como problema clínico concreto la prevalencia de vaginosis bacteriana y Candida spp. Llama la atención, la nula incidencia de N. gonorrhoeae y la baja circulación de T. Vaginalis y C. trachomatis, en este tipo de población. La prevalencia de U. urealyticum y M. hominis es alta, pero su real participación en la patología genital de

  8. Prevalencia de microorganismos asociados a secreción genital femenina, Argentina

    Directory of Open Access Journals (Sweden)

    Susana Di Bartolomeo

    2002-10-01

    Full Text Available OBJETIVO: Hay un aumento significativo de pacientes con Secreción Genital Femenina, en el Sector Público del gran Buenos Aires. Fue necesario actualizar la prevalencia de los microorganismos asociados a los efectos de revisar el apoyo necesario de laboratorio y ajustar las medidas de prevención y control. MÉTODOS: Se incorporan a este estudio, la totalidad de los casos atendidos (1997-1998: 84 adolescentes (15 a 19 años y 784 adultas (20 a 60 años sintomáticas. El protocolo incluye (secreción vaginal y endocervical detección de Neisseria gonorrhoeae, Streptococcus agalactiae, Trichomonas vaginalis, Candida spp y vaginosis bacteriana. Aplicando métodos específicos directos y cultivo, Chlamydia trachomatis (detección de antígeno, Ureaplasma urealitycum y Mycoplasma hominis (cultivos fueron estudiados en parte de la población total. RESULTADOS: El aumento de la demanda de consulta fue continuo desde 1997 y aumentó 2.10 veces del primero al último semestre de 1998. En las mujeres adultas se encontró: vaginosis bacteriana, 23,8%; Candida spp 17,8%; S. agalactiae 5,6%; T. vaginalis 2,4%. En 50,3% no se detecto ninguno. En adolescentes se detectó: vaginosis bacteriana, 17,8%; Candida spp 29,7%; S. agalactiae 3,6%, T. vaginalis 2,4%: En 46,4% de los casos el resultado fue negativo. En el grupo de mujeres adultas sintomáticas, no en la totalidad, se detectó: C. trachomatis (7/400 1,76%, U. urealyticum (209/340 61,4% y M. hominis (45/272 16,5%. CONCLUSIONES: El aumento significativo de consultas se debe a problemas sociales en la población, no al aumento de ninguna patología en especial. Impacta como problema clínico concreto la prevalencia de vaginosis bacteriana y Candida spp. Llama la atención, la nula incidencia de N. gonorrhoeae y la baja circulación de T. Vaginalis y C. trachomatis, en este tipo de población. La prevalencia de U. urealyticum y M. hominis es alta, pero su real participación en la patología genital de

  9. Keeping secrets from friends: Exploring the effects of friendship quality, loneliness and self-esteem on secrecy.

    Science.gov (United States)

    Corsano, Paola; Musetti, Alessandro; Caricati, Luca; Magnani, Barbara

    2017-07-01

    The tendency to keep secrets in adolescents has been studied in particular in their relationships with their parents and associated with psychosocial disadvantages. The current study focused on peer relationships and investigated the effects of friendship quality, loneliness in a multidimensional perspective, and self-esteem on secrecy from friends. Italian adolescents (N = 457; 47% male; 100% white) aged between 13 and 19 years (M = 16.11; SD = 1.53) reported their secrecy from friends, peer and parent-related loneliness, aversion and affinity for aloneness, their self-esteem and the quality of their relationships with their friends. The results showed that peer-related loneliness, affinity for aloneness and self-esteem in particular affect keeping secrets from friends, independent of the participant's gender. Moreover, peer-related loneliness and affinity for aloneness mediated the relationship between self-esteem and secrecy. The data were discussed in the light of adolescence developmental tasks. Copyright © 2017 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  10. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  11. A new jamming technique for secrecy in multi-antenna wireless networks

    KAUST Repository

    Bakr, Omar

    2010-06-01

    We consider the problem of secure wireless communication in the presence of an eavesdropper when the transmitter has multiple antennas, using a variation of the recently proposed artificial noise technique. Under this technique, the transmitter sends a pseudo-noise jamming signal to selectively degrade the link to the eavesdropper without affecting the desired receiver. The previous work in the literature focuses on ideal Gaussian signaling for both the desired signal and the noise signal. The main contribution of this paper is to show that the Gaussian signaling model has important limitations and propose an alternative "induced fading" jamming technique that takes some of these limitations into account. Specifically we show that under the Gaussian noise scheme, the eavesdropper is able to recover the desired signal with very low bit error rates when the transmitter is constrained to use constant envelope signaling. Furthermore, we show that an eavesdropper with multiple antennas is able to use simple, blind constant-envelope algorithms to completely remove the Gaussian artificial noise signal and thus defeat the secrecy scheme. We propose an alternative scheme that induces artificial fading in the channel to the eavesdropper, and show that it outperforms the Gaussian noise scheme in the sense of causing higher bit error rates at the eavesdropper and is also more resistant to constant modulus-type algorithms. © 2010 IEEE.

  12. Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems

    KAUST Repository

    Eltayeb, Mohammed E.; Choi, Junil; Al-Naffouri, Tareq Y.; Heath, Robert W.

    2017-01-01

    Millimeter wave (mmWave) vehicular communication systems will provide an abundance of bandwidth for the exchange of raw sensor data and support driver-assisted and safety-related functionalities. Lack of secure communication links, however, may lead to abuses and attacks that jeopardize the efficiency of transportation systems and the physical safety of drivers. In this paper, we propose two physical layer (PHY) security techniques for vehicular mmWave communication systems. The first technique uses multiple antennas with a single radio-frequency (RF) chain to transmit information symbols to a target receiver and noise-like signals in nonreceiver directions. The second technique uses multiple antennas with a few RF chains to transmit information symbols to a target receiver and opportunistically inject artificial noise in controlled directions, thereby reducing interference in vehicular environments. Theoretical and numerical results show that the proposed techniques provide higher secrecy rate when compared to traditional PHY security techniques that require digital or more complex antenna architectures.

  13. Enhancing Secrecy With Multiantenna Transmission in Millimeter Wave Vehicular Communication Systems

    KAUST Repository

    Eltayeb, Mohammed E.

    2017-03-14

    Millimeter wave (mmWave) vehicular communication systems will provide an abundance of bandwidth for the exchange of raw sensor data and support driver-assisted and safety-related functionalities. Lack of secure communication links, however, may lead to abuses and attacks that jeopardize the efficiency of transportation systems and the physical safety of drivers. In this paper, we propose two physical layer (PHY) security techniques for vehicular mmWave communication systems. The first technique uses multiple antennas with a single radio-frequency (RF) chain to transmit information symbols to a target receiver and noise-like signals in nonreceiver directions. The second technique uses multiple antennas with a few RF chains to transmit information symbols to a target receiver and opportunistically inject artificial noise in controlled directions, thereby reducing interference in vehicular environments. Theoretical and numerical results show that the proposed techniques provide higher secrecy rate when compared to traditional PHY security techniques that require digital or more complex antenna architectures.

  14. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  15. Ice parties among young men who have sex with men in Thailand: Pleasures, secrecy and risks.

    Science.gov (United States)

    Guadamuz, Thomas E; Boonmongkon, Pimpawun

    2018-05-01

    Crystal methamphetamine (ice) has become the substance of choice among young men who have sex with men (YMSM) in urban Thailand. Yet, there is scarce data on this phenomenon, partly due to the difficulty in accessing men who will disclose and openly discuss the social contexts, meanings and risks surrounding ice practice. We present an ethnography of ice parties, critically discussing the in-depth social meanings of ice; the sexual socialities and the secrecy surrounding its use; the transactions between older and younger men; and the role of the Internet and mobile technology. Forty repeated narrative interviews (life stories), ten focus group discussions, as well as systematic online and offline observations were conducted over a three-year period. Purposive sampling was used to recruit study participants in a variety of online and offline spaces and through working closely with local Thai community-based organizations serving MSM. To be eligible, participants had to be between 18 and 29 years, able to converse in Thai, had used ice, and had anal sex with another man in the past 6 months. We also strived for sample variability with respects to socio-demographic characteristics (e.g., age, educational attainment and living situation). Data analysis was conducted in Thai by two researchers using the constant comparative method based on grounded theory. On surface, participants described ice parties as exclusive, in trend, luxurious, fun and pleasurable-a kind of modern camaraderie among beautiful men. In reality, however, this group phenomenon was a social hierarchy containing several important players with relational power to one another, to the ice itself and to the physical space where ice was being consumed. These players included ice suppliers, party hosts, party guests and "icetenders." The paper also discusses the sociality of secrecy that surrounds ice parties as well as the power relations between older relatively rich men who provide ice and the younger

  16. Negotiating Discourses of Shame, Secrecy, and Silence: Migrant and Refugee Women's Experiences of Sexual Embodiment.

    Science.gov (United States)

    Ussher, Jane M; Perz, Janette; Metusela, Christine; Hawkey, Alexandra J; Morrow, Marina; Narchal, Renu; Estoesta, Jane

    2017-10-01

    In Australia and Canada, the sexual health needs of migrant and refugee women have been of increasing concern, because of their underutilization of sexual health services and higher rate of sexual health problems. Previous research on migrant women's sexual health has focused on their higher risk of difficulties, or barriers to service use, rather than their construction or understanding of sexuality and sexual health, which may influence service use and outcomes. Further, few studies of migrant and refugee women pay attention to the overlapping role of culture, gender, class, and ethnicity in women's understanding of sexual health. This qualitative study used an intersectional framework to explore experiences and constructions of sexual embodiment among 169 migrant and refugee women recently resettled in Sydney, Australia and Vancouver, Canada, from Afghanistan, Iraq, Somalia, South Sudan, Sudan, Sri Lanka, India, and South America, utilizing a combination of individual interviews and focus groups. Across all of the cultural groups, participants described a discourse of shame, associated with silence and secrecy, as the dominant cultural and religious construction of women's sexual embodiment. This was evident in constructions of menarche and menstruation, the embodied experience that signifies the transformation of a girl into a sexual woman; constructions of sexuality, including sexual knowledge and communication, premarital virginity, sexual pain, desire, and consent; and absence of agency in fertility control and sexual health. Women were not passive in relation to a discourse of sexual shame; a number demonstrated active resistance and negotiation in order to achieve a degree of sexual agency, yet also maintain cultural and religious identity. Identifying migrant and refugee women's experiences and constructions of sexual embodiment are essential for understanding sexual subjectivity, and provision of culturally safe sexual health information in order to

  17. Degrees of secrecy in an open environment. The case of electronic theses and dissertations

    Directory of Open Access Journals (Sweden)

    Joachim SCHÖPFE

    2013-12-01

    Full Text Available The open access (OA principle requires that scientific information be made widely and readily available to society. Defined in 2003 as a “comprehensive source of human knowledge and cultural heritage that has been approved by the scientific community”, open access implies that content be openly accessible and this needs the active commitment of each and every individual producer of scientific knowledge. Today, the success of the open access initiative cannot be denied. Yet, in spite of the growing success of the open access initiative, a significant part of scientific and technical information remains unavailable on the web or circulates with restrictions. Even in institutional repositories (IR created to provide access to the scientific output of an academic institution and central vector of the so-called green road to open access, more or less important sectors of the scientific production are missing. This is because of lack of awareness, embargo, deposit of metadata without full text, confidential content etc. This problem concerns in particular electronic theses and dissertations (ETDs that are disseminated with different statuses – some are freely available, others are under embargo, confidential, restricted to campus access (encrypted or not or not available at all. While other papers may be available through alternative channels (journals, monographs etc., ETDs most often are not. Our paper describes a new and unexpected effect of the development of digital libraries and open access, as a paradoxical practice of hiding information from the scientific community and society, partly while sharing it with a restricted population (campus. We try to explain these different shades of grey literature in terms of different degrees of secrecy related to intellectual property, legitimate interests, expected exploitation and trade secrets, and suggest some ways of increasing availability of ETDs in an open environment (inter-lending loan and

  18. An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels †

    Science.gov (United States)

    Ortiz, Andrés

    2017-01-01

    The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of “simulatenous” presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions. PMID:28677637

  19. An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels

    Directory of Open Access Journals (Sweden)

    Mike Burmester

    2017-07-01

    Full Text Available The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT, and in particular Radio Frequency Identification (RFID technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of “simulatenous” presence can be employed, while for the latter, ownership transfer protocols (OTP are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.

  20. An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.

    Science.gov (United States)

    Burmester, Mike; Munilla, Jorge; Ortiz, Andrés; Caballero-Gil, Pino

    2017-07-04

    The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of "simulatenous" presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.

  1. Becoming a morther by non-anonymous egg donation: secrecy and the relationship between egg recipient, egg donor and egg donation child

    NARCIS (Netherlands)

    Berkel, D.A.M. van; Candido, A.; Pijffers, W.H.

    The object of the study was to investigate secrecy in non-anonymous egg donation, to explore some characteristics of this kind of egg donation arrangement and the relationship of the recipient with her non-genetic child. Forty-four egg recipients and 62 IVF patients with a child conceived through

  2. Financial transparency in Britain’s secrecy jurisdictions has just got a whole lot murkier following the UK’s decision to leave the EU

    OpenAIRE

    Young, M. A.

    2016-01-01

    In light of recent political events, this commentary aims to provoke and promote a discussion concerning the effect of the UK’s decision to leave the EU, on its ability to regulate financial crime in the Overseas Territories and Crown Dependencies which operate as financial secrecy havens.

  3. On the finite-SNR diversity-multiplexing tradeoff of zero-forcing transmit scheme under secrecy constraint

    KAUST Repository

    Rezki, Zouheir

    2011-06-01

    In this paper, we address the finite Signal-to-Noise Ratio (SNR) Diversity-Multiplexing Tradeoff (DMT) of the Multiple Input Multiple Output (MIMO) wiretap channel, where a Zero-Forcing (ZF) transmit scheme, that intends to send the secret information in the orthogonal space of the eavesdropper channel, is used. First, we introduce the secret multiplexing gain at finite-SNR that generalizes the definition at high-SNR. Then, we provide upper and lower bounds on the outage probability under secrecy constraint, from which secret diversity gain estimates of ZF are derived. Through asymptotic analysis, we show that the upper bound underestimates the secret diversity gain, whereas the lower bound is tight at high-SNR, and thus its related diversity gain estimate is equal to the actual asymptotic secret diversity gain of the Multiple-Input Multiple-Output (MIMO) wiretap channel. © 2011 IEEE.

  4. Biological warfare warriors, secrecy and pure science in the Cold War: how to understand dialogue and the classifications of science.

    Science.gov (United States)

    Bud, Robert

    2014-01-01

    This paper uses a case study from the Cold War to reflect on the meaning at the time of the term 'Pure Science'. In 1961, four senior scientists from Britain's biological warfare centre at Porton Down visited Moscow both attending an International Congress and visiting Russian microbiological and biochemical laboratories. The reports of the British scientists in talking about a limited range of topics encountered in the Soviet Union expressed qualities of openness, sociologists of the time associated with pure science. The paper reflects on the discourses of "Pure Science", secrecy and security in the Cold War. Using Bakhtin's approach, I suggest the cordial communication between scientists from opposing sides can be seen in terms of the performance, or speaking, of one language among several at their disposal. Pure science was the language they were allowed to share outside their institutions, and indeed political blocs.

  5. A Stiff Man-Child Walking: Derrida’s Economy of Secrecy and Faulkner’s “Barn Burning”

    Directory of Open Access Journals (Sweden)

    Michael Wainwright

    2011-12-01

    Full Text Available Working from Jacques Derrida’s contentions about secrecy and authorial responsibility, and paying brief but specific attention to Charles Baudelaire’s “La fausse monnaie” (1869, as suggested by Derridean concerns over capitalist economics, this article studies the manner in which the inviolable and conditional secrets of William Faulkner’s “Barn Burning” (1938 reveal the poststructural tendencies avant la lettre of this leading American modernist.  While Faulkner scholars have focused on the ambivalent language and metaphors deployed in this short story, they have not formerly traced the manner in which “Barn Burning” incites a sense of deconstructive criticism, and have thereby failed to acknowledge Faulkner’s attendant authorial irresponsibility.  This article redresses this critical imbalance.

  6. PUBLICATION BANS IN A FACEBOOK AGE: HOW INTERNET VIGILANTES HAVE CHALLENGED THE YOUTH CRIMINAL JUSTICE ACT’S “SECRECY LAWS” FOLLOWING THE 2011 VANCOUVER STANLEY CUP RIOT

    Directory of Open Access Journals (Sweden)

    Tania Arvanitidis

    2016-08-01

    Full Text Available On June 15th, 2011, a hockey riot occurred in Vancouver, British Columbia. This event is prominent in Canada’s history for, among other reasons, the unprecedented extent to which it was documented via photographs and video footage. The days that followed the riot saw much of this media documentation uploaded to social media platforms on the Internet, where Internet users worked together to identify and collectively “name and shame” those believed to have been involved in the disturbance. Several individuals targeted by these “Internet vigilantes” were young offenders whose identities are legally protected from publication under the Youth Criminal Justice Act (YCJA. This article examines the phenomenon of “Internet vigilantism”, and raises the issue of whether those provisions within the YCJA that prohibit the identification of youth remain relevant today, given the current difficulties in enforcing these provisions. Following an overview of these “secrecy provisions”, the phenomenon of Internet vigilantism is defined, and challenges posed by acts of Internet vigilantism are discussed. A “naming and shaming” Facebook group created for the purpose of identifying participants in the 2011 Vancouver riot is then looked to as a case study of Internet vigilantism in action. This article concludes with recommendations for how justice officials and social media outlets may modify current practices to better protect the safety and security of young offenders, and to minimize harmful instances of Internet vigilantism.

  7. Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels

    Directory of Open Access Journals (Sweden)

    T.-T. Phu

    2016-12-01

    Full Text Available In this paper, we evaluate probability of non-zero secrecy capacity of multi-hop relay networks over Nakagami-m fading channels in presence of hardware impairments. In the considered protocol, a source attempts to transmit its data to a destination by using multi-hop randomize-and-forward (RF strategy. The data transmitted by the source and relays are overheard by an eavesdropper. For performance evaluation, we derive exact expressions of probability of non-zero secrecy capacity (PoNSC, which are expressed by sums of infinite series of exponential functions and exponential integral functions. We then perform Monte Carlo simulations to verify the theoretical analysis.

  8. 76 FR 33413 - Proposed Renewal Without Change; Comment Request; Nine Bank Secrecy Act Recordkeeping Requirements

    Science.gov (United States)

    2011-06-08

    ... with a caption, in the body of the text, ``BSA Recordkeeping Requirements Comments.'' FOR FURTHER..., or regulatory investigations or proceedings, or in the conduct of intelligence or counter-intelligence activities, including analysis, to protect against international terrorism, and to implement anti...

  9. 76 FR 57799 - Agency Information Collection Activities; Proposal That Electronic Filing of Bank Secrecy Act...

    Science.gov (United States)

    2011-09-16

    ..., tax, and regulatory matters, or in the conduct of intelligence or counter-intelligence activities to... scope of the BSA to intelligence or counter-intelligence activities to protect against international... forms that allows users to create templates, reducing data entry but still providing for printing paper...

  10. Secrecy in Wireless Information and Power Transfer for One-Way and Two-Way Untrusted Relaying with Friendly Jamming

    Directory of Open Access Journals (Sweden)

    Lin Xiao

    2017-01-01

    Full Text Available An untrusted relay system combined with a simultaneous wireless information and power transfer (SWIPT scheme is considered in one-way and two-way relaying transmission strategies. In the system, two source nodes can only communicate with each other via an untrusted energy harvesting relay node, which sends the message by using its harvested energy from the source nodes. Specifically, we classify the intermediate relay as an eavesdropper into two modes: active eavesdropper and nonactive eavesdropper, depending on whether it has sufficient energy of its own to transmit the message or not. Under a simplified three-node fading wiretap channel setup, the transmit power allocation and power splitting ratio are jointly optimized to minimize the outage probability in the delay-sensitive case and to maximize the average rate in the delay-insensitive case, subject to the average and peak total power constraints. Applying the dual-decomposition method, the optimization problem can be efficiently solved in the delay-sensitive scenario. Moreover, an iterative algorithm is proposed to derive the solution to maximize the average rate in the delay-insensitive scenario. Numerical results demonstrate the performance of system outage probability in the two modes versus different rates and how efficiently the secrecy rate is improved compared with traditional schemes.

  11. Presencia de sistemas de secreción de patógenos en bacterias endosimbióticas aisladas de Lupinus de la península Ibérica

    OpenAIRE

    Pastor, Víctor; Iglesias, Ana Isabel; Duran Wendt, David Ricardo; Rey Navarro, Luis

    2012-01-01

    Los rizobios son bacterias endosimbióticas capaces de fijar nitrógeno en estructuras especializadas de leguminosas. Esta simbiosis es altamente específica y depende, entre otros factores, de la capacidad de los rizobios de secretar proteínas efectoras a las células vegetales. Se han descrito diferentes sistemas de secreción en patógenos animales y vegetales y posteriormente también se han encontrado en algunos rizobios. En este trabajo se presenta el estudio de varios sistemas de secreción id...

  12. A Tale of Two Paranoids: A Critical Analysis of the Use of the Paranoid Style and Public Secrecy by Donald Trump and Viktor Orbán

    Directory of Open Access Journals (Sweden)

    Andria Timmer

    2018-02-01

    Full Text Available Within the last decade, a rising tide of right-wing populism across the globe has inspired a renewed push toward nationalism. Capitalizing on an increasingly chaotic public sphere, leaders are stoking fear in their constituents such that their radical ideologies and hardline policy decisions may be enacted. This article offers a comparative study of two leaders exploiting the vulnerabilities of their respective citizenries: United States President Donald Trump and Hungarian Prime Minister Victor Orbán. Drawing from and reimagining Richard Hofstadter’s germane essay, “The Paranoid Style in American Politics,” we argue that both represent a new manifestation of the paranoid style as it enables (and is enabled by “public secrecy.” By controlling the media and redirecting collective attention by way of rhetorical sleight of hand, the two are able to sow disorder and confusion such that their secrecy may persist out in the open. Despite using similar issues to promulgate fear and paranoia, most prominently the refugee and immigration crises, and their similar end goals, the two must nonetheless engage in different discursive strategies that reflect the distinct cultures and histories of their respective countries.

  13. Prevalencia de microorganismos asociados a secreción genital femenina, Argentina Prevalence of associated microorganisms in genital discharge, Argentina

    Directory of Open Access Journals (Sweden)

    Susana Di Bartolomeo

    2002-10-01

    Full Text Available OBJETIVO: Hay un aumento significativo de pacientes con Secreción Genital Femenina, en el Sector Público del gran Buenos Aires. Fue necesario actualizar la prevalencia de los microorganismos asociados a los efectos de revisar el apoyo necesario de laboratorio y ajustar las medidas de prevención y control. MÉTODOS: Se incorporan a este estudio, la totalidad de los casos atendidos (1997-1998: 84 adolescentes (15 a 19 años y 784 adultas (20 a 60 años sintomáticas. El protocolo incluye (secreción vaginal y endocervical detección de Neisseria gonorrhoeae, Streptococcus agalactiae, Trichomonas vaginalis, Candida spp y vaginosis bacteriana. Aplicando métodos específicos directos y cultivo, Chlamydia trachomatis (detección de antígeno, Ureaplasma urealitycum y Mycoplasma hominis (cultivos fueron estudiados en parte de la población total. RESULTADOS: El aumento de la demanda de consulta fue continuo desde 1997 y aumentó 2.10 veces del primero al último semestre de 1998. En las mujeres adultas se encontró: vaginosis bacteriana, 23,8%; Candida spp 17,8%; S. agalactiae 5,6%; T. vaginalis 2,4%. En 50,3% no se detecto ninguno. En adolescentes se detectó: vaginosis bacteriana, 17,8%; Candida spp 29,7%; S. agalactiae 3,6%, T. vaginalis 2,4%: En 46,4% de los casos el resultado fue negativo. En el grupo de mujeres adultas sintomáticas, no en la totalidad, se detectó: C. trachomatis (7/400 1,76%, U. urealyticum (209/340 61,4% y M. hominis (45/272 16,5%. CONCLUSIONES: El aumento significativo de consultas se debe a problemas sociales en la población, no al aumento de ninguna patología en especial. Impacta como problema clínico concreto la prevalencia de vaginosis bacteriana y Candida spp. Llama la atención, la nula incidencia de N. gonorrhoeae y la baja circulación de T. Vaginalis y C. trachomatis, en este tipo de población. La prevalencia de U. urealyticum y M. hominis es alta, pero su real participación en la patología genital de

  14. Delay and Secrecy

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Toole, Andrew A.

    2015-01-01

    examines the relationship between industry sponsorship and restrictions on disclosure using individual-level data on German academic researchers. Accounting for self-selection into extramural sponsorship, our evidence strongly supports the perspective that industry sponsorship jeopardizes public disclosure......The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. Aggregate data from the OECD show a broad shift in the institutional financing structure that supports academic research from public to private sponsorship. This article...

  15. Delay and Secrecy

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Toole, Andrew A.

    examines the relationship between industry sponsorship and restrictions on disclosure using individual-level data on German academic researchers. Accounting for self-selection into extramural sponsorship, our evidence strongly supports the perspective that industry sponsorship jeopardizes public disclosure......The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. Aggregate data from the OECD show a broad shift in the institutional financing structure that supports academic research from public to private sponsorship. This paper...

  16. Datenschutz- und Medizinprodukterecht bei Ubiquitous Computing-Anwendungen im Gesundheitssektor / Data protection and medical product law with respect to medical ubiquitous computing applications

    Directory of Open Access Journals (Sweden)

    Skistims, Hendrik

    2011-01-01

    Full Text Available With respect to ubiquitous computing there is a great potential of application, particularly in medicine and health care. This work deals with the legal problems which ubiquitous computing is facing in these areas. At the beginning, issues with respect to data protection and professional secrecy are treated. Afterwards the problem of applicability of medical product law for medical ubiquitous computing applications as well as the resulting requirements for manufactures, operators and users will be discussed.

  17. Caracterización físico-química y actividad antimicrobiana de la secreción mucosa de Achatina fulica

    Directory of Open Access Journals (Sweden)

    Andrés E Pereira P

    2016-06-01

    Full Text Available Introducción: El caracol gigante africano Achatina fulica es reconocido como una plaga que afecta la biodiversidad, la Salud Pública y la productividad. Sin embargo, se ha demostrado que su secreción mucosa tiene propiedades cosméticas, cicatrizantes y antimicrobianas. Objetivo: Determinar las características físico-químicas y evaluar la actividad antimicrobiana de la secreción mucosa de Achatina fulica. Metodología: Se hicieron pruebas bioquímicas para la determinación cualitativa y cuantitativa de glúcidos, proteínas y lípidos. Se determinó el contenido de Calcio, Potasio, cloruros, Sodio y Magnesio. Se midieron los parámetros de conductividad eléctrica, potencial óxido-reducción, saturación de oxígeno, oxígeno total disuelto, pH, sólidos disueltos totales. Se realizó un ensayo de actividad antibacteriana por la técnica de microdilución en caldo. Resultados: Se encontraron glúcidos en concentraciones de 582 μg/mL en la fracción soluble y de 62.1 μg/mL en la fracción de mucinas, y proteínas en concentraciones de 836 μg/mL en la fracción soluble y de 1413 μg/mL en la fracción de mucinas. Se observó actividad antimicrobiana frente a las tres cepas ensayadas. Streptococcus agalactiae alcanzó un MIC90 a una concentración de 3,6 mg/mL con la fracción de mucinas; Staphylococcus aureus resistente a meticilina tuvo un MIC50 de 3,3 mg/mL y Escherichia coli un MIC 70 de 3.8 mg/mL. Conclusiones: Se reportan por primera vez las características físicas y los oligoelementos presente en la secreción de Achatina fulica. La actividad antibacteriana obtenida frente a cepas Gram positivas y Gram negativas plantea la necesidad de realizar estudios para purificar las moléculas con dicha actividad, conocer los mecanismos de acción y establecer la inocuidad, entre otros.

  18. O Serviço de Informações e a cultura do segredo The Secret Service and the culture of secrecy

    Directory of Open Access Journals (Sweden)

    Suzeley Kalil Mathias

    2012-12-01

    Full Text Available Neste texto revisitamos a formação dos serviços de inteligência no Brasil e sua adaptação à cultura do segredo. Também avaliamos como a existência de serviços de inteligência no interior das forças armadas modificaram a estratégia de atuação castrense no âmbito interno, utilizando como exemplo a campanha Marajoara, terceira empreitada militar na guerrilha do Araguaia.In this paper we revisit the formation of intelligence services in Brazil and its adaptation to the culture of secrecy. We also evaluate how the existence of intelligence services within the armed forces have changed the strategy of action in the framework military built, using the example of the Marajoara campaign in Araguaia guerrilla.

  19. A CyberCIEGE Scenario Illustrating Secrecy Issues in an Internal Corporate Network Connected to the Internet

    Science.gov (United States)

    2004-09-01

    revolutionary that VentureGames’ competition is determined to get a copy of it; 26 additionally the gamer community has gotten wind of the NG game and...to provide access to and protect are the NG Game Code, Employee Files, E -MAIL, Marketing Plans and Legacy Code. The NG Game Code is the MOST...major hit. E -MAIL is classified NON- SENSITIVE. The Marketing Plans are for the NG Game Code. They contain information concerning what the new

  20. #whitegenocide, the Alt-right and Conspiracy Theory: How Secrecy and Suspicion Contributed to the Mainstreaming of Hate

    Directory of Open Access Journals (Sweden)

    Andrew F. Wilson,

    2018-02-01

    Full Text Available This article considers the relationship between “hashtag activism” as it is currently being used by the alt-right and the tendency to draw on conspiracy theory that Richard Hofstadter identified as being prevalent among what he termed “pseudo-conservatives” half a century earlier. Both the alt-right and Hofstadter’s “pseudo-conservatives” can be characterised by a pronounced populist nationalism that understands its aims as protecting a particular way of life whilst drawing on an aggrieved sense of injustice at being conspired against by an unseen enemy. That this “enemy” is typically foreign in actuality or in spirit confirms the cultural dimension on which their politics is played out. It is argued here that this paranoid populist nationalism has been figuratively drawn upon in the rhetoric of Donald Trump and that this apparent openness to the “pseudo-conservative” discourse on nationalism has provided a bridging effect via which far right elements are seeking to normalize extremist viewpoints

  1. Glucemia, insulinemia y secreción de insulina en ratas prepúberes hiperandrogenizadas e hiperestrogenizadas Glycemia, insulinemia and insulin secretion in prepubescent rats receiving high doses of androgens and strogens

    Directory of Open Access Journals (Sweden)

    Aimée Álvarez Álvarez

    2001-04-01

    Full Text Available Se estudió el efecto de una sobredosis de enantato de testosterona y de benzoato de estradiol en ratas machos prepúberes, sobre el comportamiento de la glucemia y la insulinemia in vivo, durante una prueba de tolerancia a la glucosa. Adicionalmente se exploró, in vitro, la capacidad de secreción de insulina estimulada por glucosa de los islotes de Langerhans de estas ratas hiperandrogenizadas e hiperestrogenizadas. Se encontró que la hiperandrogenización se acompañaba de un deterioro de la sensibilidad a la insulina, con hiperinsulinemia, que no se corresponde con un aumento de la capacidad de secreción de insulina de los islotes de Langerhans. Sin embargo, se comprobó que la hiperestrogenización no indujo cambios en los perfiles de glucemia, ni de insulinemia, ni en la capacidad de secreción de insulina de los islotes de Langerhans de este grupo de ratas hiperestrogenizadas.The effect of an overdose of testosterone heptanoate and estradiol in male prepubescent rats on the behavior of glycemia and insulinemia was studied in vivo during a glucose tolerance test. The capacity of insulin secretion stimulated by glucose from the islets of Langerhans of these rats that were administered a high dose of androgens and estrogens was explored in vitro. It was found that the high level of circulating androgens was accompanied by a deterioration of sensitivity to insulin with hyperinsulinemia that does not correspond to an increase of the insulin secreting capacity of the islets of Langerhans. However, it was demonstrated that the high level of circulating estrogens did not produce changes either in the glycemia and insulinemia profiles or in the insulin secreting capacity of the islets of Langerhans in this group of rats that received an elevated dose of estrogens.

  2. Clonación y caracterización de CaSEC14 : un gen inmplicado en la ruta de secreción de proteínas en "Candida albicans"

    OpenAIRE

    Monteoliva Díaz, Lucía

    1997-01-01

    Uno de los objetivos fundamentales de nuestro grupo de investigación es la identificación de distintas funciones celulares de la célula fúngica que puedan utilizarse en el desarrollo de nuevos fármacos antifungicos. En este trabajo se ha clonado y caracterizado el gen casec14 de la levadura patógena oportunista candida albicans, implicado en la ruta de secreción de proteínas. Dicho gen codifica una proteína, casec14p, que presenta una secuencia con elevada homologa (67%) con otras proteínas s...

  3. Whistleblower Protection

    Science.gov (United States)

    The Whistleblower Protection Enhancement Act of 2012 (WPA) and the Whistleblower Protection Act of 1989 Enhanced by the Act of 2012 provides protection rights for Federal employees against retaliation for whistleblowing activities.

  4. Radiation protection

    International Nuclear Information System (INIS)

    Koelzer, W.

    1975-01-01

    Physical and radiological terms, quantities, and units. Basic principles of radiation protection (ICRP, IAEA, EURATOM, FRG). Biological effects of ionizing radiation. Objectives of practical radiation protection. (HP) [de

  5. [Aspects of data protection in telemedicine].

    Science.gov (United States)

    Vetter, R

    2001-10-01

    Telemedical applications like the electronic patient file, the electronic physician's letter and the electronic consultation ("Telekonsil"), the electronic prescription, the electronic patient's card (the "patient smart card") facilitate and improve the processing of sensitive medical data as well as the possibilities for using medical resources in an unusual degree and can thereby substantially contribute to the well-being of the patient. However, improving the quality of medical supply must not lead to a degradation of the patients' rights, in particular their right of self-determination. The introduction and the use of telemedical applications do not change the legal basic conditions for medical data processing. Therefore, a patient-friendly telemedicine must include data protection as well. Data protective telemedicine requires medical secrecy ensuring the patients' rights of information and transparency, correction of false and the up-to-date deletion of information that is no longer necessary, as well as secure data processing. All electronic processing of patients' data must meet the requirements of data security, i.e. the confidentiality, the integrity, the availability of the data at any time and the verifiability of the data processing have to be guaranteed. For this, electronic signatures and encodings have to be used, medical information systems have to be protected effectively against any risks resulting from open networks, particularly the Internet, and data processing has to be monitored. Electronic patient files may be open only to the treating physician and the medical assistants up to the necessary extent, ensuring the possibility of an emergency access. Any access beyond that does require the special consent of the patient. The medical secrecy has to be ensured. The electronic prescription with a documentation of the patient's medication requires the consent of the patient and must protect the rights of the physicians. In particular it has to

  6. Physical protection

    International Nuclear Information System (INIS)

    Myers, D.A.

    1989-01-01

    Physical protection is defined and its function in relation to other functions of a State System of Accounting for and Control of Nuclear Materials is described. The need for a uniform minimum international standard for physical protection as well as the need for international cooperation in physical protection is emphasized. The IAEA's INFCIRC/225/Rev. 1 (Annex 1) is reviewed. The Convention on the Physical Protection of Nuclear Material (Annex 2) is discussed. Photographs show examples of typical physical protection technology (Annex 3)

  7. Diplomatic Protection

    OpenAIRE

    Režná, Jana

    2006-01-01

    Final thesis Topic: Diplomatic protection Thesis supervisor: JUDr. Vladimír Balaš, CSc. Student: Marek Čermák Thesis on the topic of diplomatic protection deals with the granting of exercise of diplomatic protection by the states and is divided into seven chapters which follow each other. The first chapter describes the diplomatic protection and its historical foundations. The second chapter focuses on the possibility of exercise of diplomatic protection in respect of natural persons and the ...

  8. The Physical Burdens of Secrecy

    Science.gov (United States)

    Slepian, Michael L.; Masicampo, E. J.; Toosi, Negin R.; Ambady, Nalini

    2012-01-01

    The present work examined whether secrets are experienced as physical burdens, thereby influencing perception and action. Four studies examined the behavior of people who harbored important secrets, such as secrets concerning infidelity and sexual orientation. People who recalled, were preoccupied with, or suppressed an important secret estimated…

  9. Environmental protection

    International Nuclear Information System (INIS)

    Klinda, J.; Lieskovska, Z.

    1998-01-01

    In this chapter environmental protection in the Slovak Republic in 1997 are reviewed. The economics of environmental protection, state budget, Slovak state environmental fund, economic instruments, environmental laws, environmental impact assessment, environmental management systems, and environmental education are presented

  10. Protective relay

    International Nuclear Information System (INIS)

    Lim, Mu Ji; Jung, Hae Sang

    1974-10-01

    This book is divided into two chapters, which deals with protective relay. The first chapter deals with the basic knowledge of relay on development of relay, classification of protective relay, rating of protective relay general structure of protective relay, detecting of ground protection, about point of contact, operating relay and trip relaying. The second chapter is about structure and explanation of relay on classification by structure such as motor type and moving-coil type, explanation of other relays over current relay, over voltage relay, short voltage relay, relay for power, relay for direction, test of over voltage relay, test of short voltage relay and test of directional circuit relay.

  11. Unstimulated salivary flow rate, pH and buffer capacity of saliva in healthy volunteers Débito basal, pH y capacidad tampón de la secreción salivar en sujetos sanos

    Directory of Open Access Journals (Sweden)

    C. Fenoll-Palomares

    2004-11-01

    Full Text Available Objectives: to assess the salivary flow rate, pH, and buffer capacity of healthy volunteers, and their relationships with age, gender, obesity, smoking, and alcohol consumption, and to establish the lower-end value of normal salivary flow (oligosialia. Methods: a prospective study was conducted in 159 healthy volunteers (age > 18 years, absence of medical conditions that could decrease salivary flow. Unstimulated whole saliva was collected during ten minutes, and salivary flow rate (ml/min, pH, and bicarbonate concentration (mmol/l were measured using a Radiometer ABL 520. The 5 percentile of salivary flow rate and bicarbonate concentration was considered the lower limit of normality. Results: median salivary flow rate was 0.48 ml/min (range: 0.1-2 ml/min. Age younger than 44 years was associated with higher flow rates (OR 2.10. Compared with women, men presented a higher flow rate (OR 3.19 and buffer capacity (OR 2.81. Bicarbonate concentration correlated with salivary flow rate. The lower-end values of normal flow rate and bicarbonate concentration were 0.15 ml/min and 1.800 mmol/l, respectively. The presence of obesity, smoking, and alcohol consumption did not influence salivary parameters. Conclusions: in healthy volunteers, salivary flow rate depends on age and gender, and correlates with buffer capacity. Obesity, smoking, and alcohol use do not influence salivary secretion.Objetivos: conocer el débito, pH y capacidad tampón de la saliva en sujetos sanos y sus relaciones con edad, sexo, obesidad y hábitos tabáquico y alcohólico, así como establecer la definición de hiposialia. Métodos: estudio observacional prospectivo en 159 voluntarios sanos (> 18 años, sin factores conocidos que disminuyan la secreción salivar. Se ha recogido la saliva total, sin estímulo, durante 10 minutos, determinando su débito (ml/min, pH y capacidad tampón (concentración de bicarbonato en mmol/l mediante autoanalizador Radiometer ABL 520. Se han

  12. Taxonomía de onicóforos de Santander, Colombia y termogravimetría, calorimetría de barrido diferencial y espectroscopía infrarroja de la secreción adhesiva (Onychophora: Peripatidae

    Directory of Open Access Journals (Sweden)

    Javier H Jerez-Jaimes

    2009-09-01

    Full Text Available Redescribimos taxonómicamente el gusano Macroperipatus geagy Bouvier 1899, a partir de 15 especímenes recolectados en los cafetales de hacienda El Roble, Santander, Colombia. De acuerdo con la reconstrucción en tres dimensiones de la superficie dorsal del cuerpo, las papilas primarias y accesorias de M. geagy se distribuyen sin formar un patrón determinado. Características diagnósticas: un diente accesorio y un diente principal en la mandíbula externa; y un diente principal, un diente accesorio y siete dentículos en la sierra de la mandíbula interna. Cuerpo: longitud (X=45.66; S=26.10 mm, peso (X= 0.95; S= 2.21 y pares de lobopodos (X= 28.13; S= 1.30. Se elaboró una clave para seis especies de Macroperipatus. La secreción adhesiva en estado líquido perdió 60% del peso inicial al alcanzar los 70 ºC, la muestra sólida perdió el 13% del peso cerca de los 90 ºC, la fase de estabilidad térmica de la secreción estuvo entre los 90 y 280 ºC en la secreción líquida y entre los 100 y 205 ºC en la sólida. La temperatura de inicio de la degradación de las muestras se registró a los 355 ºC. En comparación con la araña Nephila sp., el onicóforo perdió mayor porcentaje de peso y alcanzó la fase de degradación a temperaturas más bajas. Los cambios en el flujo de calor en la secreción adhesiva sólida y líquida de M. geagy fueron confirmados con el comportamiento de las muestras en el análisis de termogravimetría. La proporción de láminas beta calculado en el espectro infrarrojo de la secreción adhesiva fue del 59%. La presencia de este tipo de conformación de la estructura secundaria de las proteínas en la secreción adhesiva de M. geagy conferiría extensibilidad y resistencia a la tracción, en similitud con las fibras de seda tejidas por las arañas para depredación.Velvet worm taxonomy from Santander, Colombia and thermogravimetry, differential scanning calorimetry and infrared spectroscopy of the adhesive

  13. Radiation Protection

    International Nuclear Information System (INIS)

    Loos, M.

    2002-01-01

    Major achievements of SCK-CEN's Radiation Protection Department in 2001 are described. The main areas for R and D of the department are enviromnental remediation, emergency planning, radiation protection research, low-level radioactvity measurements, safeguards and physics measurements, decision strategy research and policy support and social sciences in nuclear research. Main achievements for 2001 in these areas are reported

  14. Sun protection

    Science.gov (United States)

    ... sun exposure. The start of summer is when UV rays can cause the most skin damage. Use sun protection, even on cloudy days. Clouds and haze don't protect you from the sun. Avoid surfaces that reflect light, such as water, sand, concrete, snow, and areas ...

  15. Radiation protection

    International Nuclear Information System (INIS)

    1989-01-01

    A NRPB leaflet in the 'At-a-Glance' series explains in a simple but scientifically accurate way what radiation is, the biological effects and the relative sensitivity of different parts of the human body. The leaflet then discusses radiation protection principles, radiation protection in the UK and finally the effectiveness of this radiation protection as judged by a breakdown of the total dose received by an average person in the UK, a heavy consumer of Cumbrian seafood, an average nuclear industry worker and an average person in Cornwall. (UK)

  16. Protected Areas

    Data.gov (United States)

    Kansas Data Access and Support Center — This dataset shows the boundaries of properties in Kansas in public or institutional ownership that contain ecological resources that merit some level of protection....

  17. Protective clothing

    International Nuclear Information System (INIS)

    Malet, J.C.; Regnier, J.

    1979-01-01

    The present operational and intervention suits are described. Research work is currently in progress to improve the performance of the existing suits and to develop more resistant protective clothing. (author)

  18. Radiation protection

    International Nuclear Information System (INIS)

    Ures Pantazi, M.

    1994-01-01

    This work define procedures and controls about ionizing radiations. Between some definitions it found the following topics: radiation dose, risk, biological effects, international radioprotection bodies, workers exposure, accidental exposure, emergencies and radiation protection

  19. Employment protection

    OpenAIRE

    Stefano Scarpetta

    2014-01-01

    Laws on hiring and firing are intended to protect workers from unfair behavior by employers, to counter imperfections in financial markets that limit workers’ ability to insure themselves against job loss, and to preserve firm-specific human capital. But by imposing costs on firms’ adaptation to changes in demand and technology, employment protection legislation may reduce not only job destruction but also job creation, hindering the efficient allocation of labor and productivity growth....

  20. Environmental protection

    International Nuclear Information System (INIS)

    Martinez, A.S.

    1987-01-01

    The question of environment protection related to the use of nuclear energy aiming to power generation, based on the harmonic concept of economic and industrial development, preserving the environment, is discussed. A brief study of environmental impacts for some energy sources, including nuclear energy, to present the systems of a nuclear power plant which aim at environmental protection, is done. (M.C.K.) [pt

  1. Radiation protection

    International Nuclear Information System (INIS)

    Koelzer, W.

    1976-01-01

    The lecture is divided into five sections. The introduction deals with the physical and radiological terms, quantities and units. Then the basic principles of radiological protection are discussed. In the third section attention is paid to the biological effects of ionizing radiation. The fourth section deals with the objectives of practical radiological protection. Finally the emergency measures are discussed to be taken in radiation accidents. (HP) [de

  2. Copyright protection

    OpenAIRE

    Plchotová, Gabriela

    2011-01-01

    The aim of this thesis is to offer a straightforward manual to anyone who authors their own original work or who utilises the original work of other creators. As such, it is necessary to briefly and clearly explain the historical development and essential terms of authorship as a concept and the origin of the need for copyright protection. Furthermore, this thesis includes chapters on copyright protection development specifically in the Czech Republic and the current definition of related law...

  3. Radiological protection

    International Nuclear Information System (INIS)

    Azorin N, J.; Azorin V, J. C.

    2010-01-01

    This work is directed to all those people related with the exercise of the radiological protection and has the purpose of providing them a base of knowledge in this discipline so that they can make decisions documented on technical and scientist factors for the protection of the personnel occupationally exposed, the people in general and the environment during the work with ionizing radiations. Before de lack of a text on this matter, this work seeks to cover the specific necessities of our country, providing a solid presentation of the radiological protection, included the bases of the radiations physics, the detection and radiation dosimetry, the radiobiology, the normative and operational procedures associates, the radioactive wastes, the emergencies and the transport of the radioactive material through the medical and industrial applications of the radiations, making emphasis in the relative particular aspects to the radiological protection in Mexico. The book have 16 chapters and with the purpose of supplementing the given information, are included at the end four appendixes: 1) the radioactive waste management in Mexico, 2-3) the Mexican official standards related with the radiological protection, 4) a terms glossary used in radiological protection. We hope this book will be of utility for those people that work in the investigation and the applications of the ionizing radiations. (Author)

  4. Radiation protection

    International Nuclear Information System (INIS)

    Jain, Aman; Sharma, Shivam; Parasher, Abhishek

    2014-01-01

    Radiation dose measurement, field of radiobiology, is considered to be critical factor for optimizing radiation protection to the health care practitioners, patients and the public. This lead to equipment that has dose - area product meters permanently installed. In many countries and even institution, the range of equipment is vast and with the opportunity for radiation protection and dose recording varies considerably. Practitioners must move with the changed demands of radiation protection but in many cases without assistance of modern advancements in technology Keeping the three basic safety measures Time, Dose and Shielding we can say 'Optimum dose is safe dose' instead of 'No dose is safe dose'. The purpose enclosed within the title 'Radiation Protection'. The use of radiation is expanding widely everyday around the world and crossing boundaries of medical imaging, diagnostic and. The way to get the ''As low as reasonably achievable' is only achievable by using methodology of radiation protection and to bring the concern of general public and practitioners over the hazards of un-necessary radiation dose. Three basic principles of radiation protection are time, distance and shielding. By minimizing the exposure time increasing the distance and including the shielding we can reduce the optimum range of dose. The ability of shielding material to attenuate radiation is generally given as half value layer. This is the thickness of the material which will reduce the amount of radiation by 50%. Lab coat and gloves must be worn when handling radioactive material or when working in a labeled radiation work area. Safety glasses or other appropriate splash shields should be used when handling radioactive material. 1. Reached to low dose level to occupational workers, public as per prescribed dose limit. 2. By mean of ALARA principle we achieved the protection from radiation besides us using the radiation for our benefit

  5. Machine Protection

    International Nuclear Information System (INIS)

    Schmidt, R

    2014-01-01

    The protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent. It is related to the increasing beam power of high-power proton accelerators such as ISIS, SNS, ESS and the PSI cyclotron, to the emission of synchrotron light by electron–positron accelerators and FELs, and to the increase of energy stored in the beam (in particular for hadron colliders such as LHC). Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping the beam at low energy) and an interlock system providing the glue between these systems. The most recent accelerator, the LHC, will operate with about 3 × 10 14 protons per beam, corresponding to an energy stored in each beam of 360 MJ. This energy can cause massive damage to accelerator equipment in case of uncontrolled beam loss, and a single accident damaging vital parts of the accelerator could interrupt operation for years. This article provides an overview of the requirements for protection of accelerator equipment and introduces the various protection systems. Examples are mainly from LHC, SNS and ESS

  6. Machine Protection

    CERN Document Server

    Schmidt, R

    2014-01-01

    The protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent. It is related to the increasing beam power of high-power proton accelerators such as ISIS, SNS, ESS and the PSI cyclotron, to the emission of synchrotron light by electron–positron accelerators and FELs, and to the increase of energy stored in the beam (in particular for hadron colliders such as LHC). Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping the beam at low energy) and an ...

  7. Machine Protection

    International Nuclear Information System (INIS)

    Zerlauth, Markus; Schmidt, Rüdiger; Wenninger, Jörg

    2012-01-01

    The present architecture of the machine protection system is being recalled and the performance of the associated systems during the 2011 run will be briefly summarized. An analysis of the causes of beam dumps as well as an assessment of the dependability of the machine protection systems (MPS) itself is being presented. Emphasis will be given to events that risked exposing parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems will be evaluated along with their impact on the 2012 run. The role of rMPP during the various operational phases (commissioning, intensity ramp up, MDs...) will be discussed along with a proposal for the intensity ramp up for the start of beam operation in 2012

  8. Machine Protection

    CERN Document Server

    Zerlauth, Markus; Wenninger, Jörg

    2012-01-01

    The present architecture of the machine protection system is being recalled and the performance of the associated systems during the 2011 run will be briefly summarized. An analysis of the causes of beam dumps as well as an assessment of the dependability of the machine protection systems (MPS) itself is being presented. Emphasis will be given to events that risked exposing parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems will be evaluated along with their impact on the 2012 run. The role of rMPP during the various operational phases (commissioning, intensity ramp up, MDs...) will be discussed along with a proposal for the intensity ramp up for the start of beam operation in 2012.

  9. Machine Protection

    Energy Technology Data Exchange (ETDEWEB)

    Zerlauth, Markus; Schmidt, Rüdiger; Wenninger, Jörg [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    The present architecture of the machine protection system is being recalled and the performance of the associated systems during the 2011 run will be briefly summarized. An analysis of the causes of beam dumps as well as an assessment of the dependability of the machine protection systems (MPS) itself is being presented. Emphasis will be given to events that risked exposing parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems will be evaluated along with their impact on the 2012 run. The role of rMPP during the various operational phases (commissioning, intensity ramp up, MDs...) will be discussed along with a proposal for the intensity ramp up for the start of beam operation in 2012.

  10. Official announcement of the directive on protection of nuclear power plant equipped with LWR-type reactors from human intrusion or other interference by third parties. Announcement of BMU (German Federal Ministry Environment), of 6 Dec. 1995 - RS I 3 13151 - 6/14

    International Nuclear Information System (INIS)

    1996-01-01

    An operating permit for a nuclear power plant is to be granted only if the applicant and facility operator presents evidence guaranteeing the legally required physical protection and other security measures for protection from human instrusion and other type of interference. As a basis for review and licensing, the competent authorities in 1987 have issued a directive specifying the requirements to be met for physical protection of nuclear power plant equipped with PWR-type reactors, and in 1994 followed a second, analogous directive relating to nuclear power plant with BWR-type reactors. The directive now announced for physical protection of nuclear power plant equipped with LWR-type reactors combines and replaces the two former ones, and from the date of the announcement is the only applicable directive. The text of the directive is not reproduced for reasons of secrecy protection. (orig./CB) [de

  11. Physical protection

    International Nuclear Information System (INIS)

    Myre, W.C.; DeMontmollin, J.M.

    1989-01-01

    Serious concern about physical protection of nuclear facilities began around 1972. R and D was initiated at Sandia National Laboratories which had developed techniques to protect weapons for many years. Special vehicles, convoy procedures, and a communications system previously developed for weapons shipments were improved and extended for shipments of other sensitive materials. Barriers, perimeter alarms, portal and internal control systems were developed, tested, and published in handbooks and presented at symposia. Training programs were initiated for U.S. and foreign personnel. Containment and surveillance techniques were developed for the IAEA. Presently emphasis is on computer security, active barriers, and techniques to prevent theft or sabotage by ''insiders''

  12. People involved in radiation research and protection - an historical perspective

    International Nuclear Information System (INIS)

    Toussaint, L.F.

    2010-01-01

    Full text: The lives of selected people involved in radiation research are covered in two parts: 1. history of radiation and radioactivity; and 2. historical aspects of radiation and radiation protection in Western Australia. History of radiation/radioactivity: The background of some of the key people involved in early radiation research is discussed. These include Rontgen and Becqucrel who undertook early research into X-rays and radioactivity respectively. As well as the radiation hazards which early radiation scientists faced, there were also social pressures, as exemplified by the life of women such as Marie Curie, particularly after the death of her husband Pierre. Despite this being the time of the so-called 'beautiful years' in Europe, where there was a friendly exchange of ideas between scientists from various countries, there were also protracted disagreements. Some of the scientific findings of the Curies' daughter (Irene Joliot-Curie) and husband (Frederic Joliot-Curie) were vigorously disputed by Lisa Meitner (and colleague Otto Hahn) in Vienna. The 'beautiful years' came to an end when politics intruded and scientists such as Lisa Meitner had to flee from persecution. The splitting of the atom and realisation (by Leo Szilard) that a chain reaction was possible, led to political barriers being erected around scientists. With Europe poised for war, the implication of this science for warfare application was cause for concern among many of the normally free thinking and co-operative scientists. Secrecy now prevailed.

  13. ANONIMATO DEL PROGENITOR Y DERECHO A LA IDENTIDAD DEL HIJO: DECISIONES JUDICIALES ENCONTRADAS SOBRE RESERVA DE IDENTIDAD EN LOS CASOS DE MADRE SOLTERA Y DONANTE DE ESPERMA Anonymity of genetic parents and the children's right to know own biological identity: Opossed judicial decisions about the secrecy of identity in the cases of single mother and sperm donors

    Directory of Open Access Journals (Sweden)

    Ramón Duran Rivacoba

    2010-01-01

    faculty to the anonymity of genetic parents and the children's right to know own biological identity, appear confronted. We will contrast a decision of the Supreme Tribunal who declared unconstitutional the norms which allow the unwed mother to refuse the child and protect the secrecy of her identity, with the Constitutional Tribunal's decision (issued a few months earlier which legitimates the anonymity of the sperm donor in the context of an assisted reproduction proceeding. We argue, against both solutions, that in the first one, maternal anonymity seeks not to protect the mother, but to protect the child before a possible abortion or infanticide so the right to the identity must be limited. To illustrate the convenience and viability of this argument we analyze the "Odiévre" case, in which the European Human Rights Court concluded that the Trench system (that reserves the identity of the mother was not contrary to the European Covenant. On the other hand, we criticize the Constitutional Tribunal's decision regarding the sperm donor because it overstate the right of privacy of the progenitor against the child's best interest. This contrast exercise shows that the mother, who used to have certain means that could jeopardize the child's life, loses them; however the father (that since 1981 reform that allowed free paternity investigation, benefits with the same dispense that the mother nowadays lack.

  14. Negotiating Protection

    DEFF Research Database (Denmark)

    Bille, Mikkel

    efficacy. Some informants, for example, adopt an orthodox scriptural Islamic approach to protection and denounce certain material registers as un-Islamic and materialistic leftovers from an ignorant past, and rather prescribe Qur'anic remembrance. For other informants the very physicality of such contested...

  15. Protection Myopia

    DEFF Research Database (Denmark)

    Laursen, Keld; Salter, Ammon; Li, Cher

    from having an orientation towards legal appropriability, we conjecture that protection myopia may lead some firms to allocate too much attention to legal appropriability, in particular when the behavioral and structural contingencies are unfavorable. Examining a panel of three successive waves...

  16. Protective articles

    International Nuclear Information System (INIS)

    Wardley, R.B.

    1983-01-01

    This patent specification describes an article affording protection against radiation, and especially against X-rays comprising at least one flexible layer of lead filled material in an envelope of, or sandwiched between two layers of a knitted, woven or non-woven fabric preferably of synthetic fibrous material, carrying on its outer surface a coating of flexible polyurethane. The outer fabric provides a resilient, extremely tough and cut resistant covering for the relatively soft lead filled material. (author)

  17. Eye Protection

    OpenAIRE

    Pashby, Tom

    1986-01-01

    Eye injuries frequently occur in the home, at work and at play. Many result in legally blind eyes, and most are preventable. Awareness of potential hazards is essential to preventing eye injuries, particularly in children. In addition, protective devices must be used appropriately. We have developed eye protectors that have proved effective in reducing both the overall incidence and the severity of sports eye injuries.

  18. [Cerebral protection].

    Science.gov (United States)

    Cattaneo, A D

    1993-09-01

    Cerebral protection means prevention of cerebral neuronal damage. Severe brain damage extinguishes the very "human" functions such as speech, consciousness, intellectual capacity, and emotional integrity. Many pathologic conditions may inflict injuries to the brain, therefore the protection and salvage of cerebral neuronal function must be the top priorities in the care of critically ill patients. Brain tissue has unusually high energy requirements, its stores of energy metabolites are small and, as a result, the brain is totally dependent on a continuous supply of substrates and oxygen, via the circulation. In complete global ischemia (cardiac arrest) reperfusion is characterized by an immediate reactive hyperemia followed within 20-30 min by a delayed hypoperfusion state. It has been postulated that the latter contributes to the ultimate neurologic outcome. In focal ischemia (stroke) the primary focus of necrosis is encircled by an area (ischemic penumbra) that is underperfused and contains neurotoxic substances such as free radicals, prostaglandins, calcium, and excitatory neurotransmitters. The variety of therapeutic effort that have addressed the question of protecting the brain reflects their limited success. 1) Barbiturates. After an initial enthusiastic endorsement by many clinicians and years of vigorous controversy, it can now be unequivocally stated that there is no place for barbiturate therapy following resuscitation from cardiac arrest. One presumed explanation for this negative statement is that cerebral metabolic suppression by barbiturates (and other anesthetics) is impossible in the absence of an active EEG. Conversely, in the event of incomplete ischemia EEG activity in usually present (albeit altered) and metabolic suppression and hence possibly protection can be induced with barbiturates. Indeed, most of the animal studies led to a number of recommendations for barbiturate therapy in man for incomplete ischemia. 2) Isoflurane. From a cerebral

  19. Concepts of radiation protection

    International Nuclear Information System (INIS)

    2013-01-01

    This seventh chapter presents the concepts and principles of safety and radiation protection, emergency situations; NORM and TENORM; radiation protection care; radiation protection plan; activities of the radiation protection service; practical rules of radiation protection and the radiation symbol

  20. Environmental protection

    International Nuclear Information System (INIS)

    Hull, A.P.

    1979-01-01

    Environmental Studies and Internal Dosimetry projects include: Environmental Protection; 1977 Environmental Monitoring Report; Sewage Sludge Disposal on the Sanitary Landfill; Radiological Analyses of Marshall Islands Environmental Samples, 1974 to 1976; External Radiation Survey and Dose Predictions for Rongelap, Utirik, Rongerik, Ailuk, and Wotje Atolls; Marshall Islands - Diet and Life Style Study; Dose Reassessment for Populations on Rongelap and Utirik Following Exposure to Fallout from BRAVO Incident (March 1, 1954); Whole Body Counting Results from 1974 to 1979 for Bikini Island Residents; Dietary Radioactivity Intake from Bioassay Data, a Model Applied to 137 Cs Intake by Bikini Island Residents; and External Exposure Measurements at Bikini Atoll

  1. Radiation protection

    International Nuclear Information System (INIS)

    Kamalaksh Shenoy, K.

    2013-01-01

    Three main pillars underpin the IAEA's mission: Safety and Security - The IAEA helps countries to upgrade their infrastructure for nuclear and radiation safety and security, and to prepare for and respond to emergencies. Work is keyed to international conventions, the development of international standards and the application of these standards. The aim is to protect people and the environment from the harmful effects of exposure to ionizing radiation. Science and Technology - The IAEA is the world's focal point for mobilizing peaceful applications of nuclear science and technology for critical needs in developing countries. The work contributes to alleviating poverty, combating disease and pollution of the environment and to other goals of sustainable development. Safeguards and Verification - The IAEA is the nuclear inspectorate, with more than four decades of verification experience. Inspectors work to verify that nuclear material and activities are not diverted towards military purposes. Quantities and Units: Dose equivalent is the product of absorbed dose of radiation and quality factor (Q). For absorbed dose in rads, dose equivalent is in rems. If absorbed dose is in gray, the dose equivalent is in sievert. Quality factor is defined without reference to any particular biological end point. Quality factors are recommended by committees such as the International Commission on Radiological Protection (ICRP) or the National Council on Radiation Protection and Measurements (NCRP), based on experimental RBE values but with some judgment exercised. Effective Dose Equivalent: It is the sum of the weighted dose equivalents for all irradiated tissues, in which the weighting factors represent the different risks of each tissue to mortality from cancer and hereditary effects. Committed dose equivalent: It is the integral over 50 years of dose equivalent following the intake of a radionuclide. Collective effective dose equivalent: It is a quantity for a population and is

  2. Protecting Antarctica

    Science.gov (United States)

    Carlowicz, Michael

    House Science Committee Chairman Robert Walker (R-Pa.) has introduced a bill into Congress to give the United States the legislative authority to implement the 1991 Environmental Protocol to the Antarctic Treaty. That protocol established rules and principles to shield the Antarctic environment from human spoilage—placing limits on the discharge of pollutants, protecting plant and animal life, and requiring environmental impact assessments before new activities and programs are launched. The protocol also forbids prospecting or developing of mineral resources except for scientific research.

  3. Food protection

    International Nuclear Information System (INIS)

    Gummer, Selwyn; Campbell-Savours, D.N.; Maxwell-Hyslop, R.

    1987-01-01

    The motion is to consolidate the Food Protection (Emergency Prohibitions) (England) (No 2) Order 1987 and seven subsequent amendment orders, into one order. The orders are those under which restrictions on the movement of sheep as a result of the Chernobyl accident are carried out. A debate lasting more than two hours followed and this is reported verbatim. Much of the early part of the debate concerns a telex message allegedly from the chief scientist of the radiochemical institute saying that meat contaminated by radiation after Chernobyl was sold in Britain. Both the source and the content of the telex were found not to be as alleged. In particular, the allegation that 10kg lambs had gone to market. The minister pointed out that these lambs were not big enough to be sold. The debate broadened into a more general discussion as to levels of contamination in sheep and the government diligence or otherwise in protecting the public. The motion was agreed to. (U.K.)

  4. Radiation protection and environmental protection

    International Nuclear Information System (INIS)

    Xie Zi; Dong Liucan; Zhang Yongxing

    1994-01-01

    A collection of short papers is presented which review aspects of research in radiation and environmental protection carried out by the Chinese Institute of Atomic Energy in 1991. The topics covered are: the analysis of Po 210 in the gaseous effluent of coal-fired boilers; the determination of natural radionuclide levels in various industrial waste slags and management countermeasures; assessment of the collective radiation dose from natural sources for the Chinese population travelling by water; the preliminary environmental impact report for the multipurpose heavy water research reactor constructed by China for the Islamic Republic of Algeria. (UK)

  5. Protective clothing

    International Nuclear Information System (INIS)

    Winnett, G.F.

    1979-01-01

    A protective suit used for isolating its wearer from radioactively contaminated areas is described in three parts. The first part includes the covering for the wearer's head, arms and upper body and at the waist is releasably fitted around an opening into the contaminated area. The second part includes the legs of the suit and is releasably connectible to the first part of the suit to enclose the wearer who is then supplied with air through an umbilical pipe. A further part surrounds the second part and is releasably connectible to it, enclosing a space between the parts. This further part is also releasably connectible to the opening at the waist to prevent egress from the contaminated area. The releasable connections between the parts may be bayonet type fittings or may be rotating T-shaped projections which engage in T-shaped grooves. (author)

  6. Fire protection

    International Nuclear Information System (INIS)

    Janetzky, E.

    1980-01-01

    Safety and fire prevention measurements have to be treated like the activities developing, planning, construction and erection. Therefore it is necessary that these measurements have to be integrated into the activities mentioned above at an early stage in order to guarantee their effectiveness. With regard to fire accidents the statistics of the insurance companies concerned show that the damage caused increased in the last years mainly due to high concentration of material. Organization of fire prevention and fire fighting, reasons of fire break out, characteristics and behaviour of fire, smoke and fire detection, smoke and heat venting, fire extinguishers (portable and stationary), construction material in presence of fire, respiratory protection etc. will be discussed. (orig./RW)

  7. Protecting Democracy

    DEFF Research Database (Denmark)

    Galster, Kjeld

    2007-01-01

    of a democratic state as defence per se is to its government. Democratic governance rests on the mutual dependence and influence of leadership and led, and the practical function subsumes professional bureaucracies. Thus, defence debate is the exchange of views on matters important to national security amongst...... the democratically elected leadership, the public, and the defence bureaucracy’s professional experts. Defence debate is a decisive contributor to defence policy and it normally includes quantitative issues like the size of military forces and the proportion of the state’s resources devoted to the armed forces......ABSTRACT Galster, Kjeld Hald. Doctoral Student (History). Saxo Institute. May 2007. Protecting Democracy: Danish Defence Debate in Times of Change. Supervisor: Professor, Dr. Gunner Lind. Democratic debate on defence and democratic organisation of the forces are as central to the life...

  8. Protective Coatings

    Science.gov (United States)

    1980-01-01

    General Magnaplate Corporation's pharmaceutical machine is used in the industry for high speed pressing of pills and capsules. Machine is automatic system for molding glycerine suppositories. These machines are typical of many types of drug production and packaging equipment whose metal parts are treated with space spinoff coatings that promote general machine efficiency and contribute to compliance with stringent federal sanitation codes for pharmaceutical manufacture. Collectively known as "synergistic" coatings, these dry lubricants are bonded to a variety of metals to form an extremely hard slippery surface with long lasting self lubrication. The coatings offer multiple advantages; they cannot chip, peel or be rubbed off. They protect machine parts from corrosion and wear longer, lowering maintenance cost and reduce undesired heat caused by power-robbing friction.

  9. Offspring Protection

    Directory of Open Access Journals (Sweden)

    Eric T. Steiner

    2016-08-01

    Full Text Available Parental aggression, that is, offspring protection aggression, can be viewed as a type of parental investment. Most mammalian males do not exhibit parental investment and therefore exhibit little, if any, parental aggression. Men demonstrate parental investment, and are typically more physically aggressive than women, but parental physical aggression in humans has been largely unexplored. The current study examined potential sex differences in estimates of parental physical aggression involving hypothetical situations, while controlling for general physical aggression. A self-report measure was administered to 217 students from a western U.S. university (55 male nonparents, 50 female nonparents, 54 fathers, and 58 mothers. Male nonparents reported higher parental physical aggression than female nonparents, but there was no difference between mothers and fathers. The results are interpreted in light of ancestral effects of sexual selection and proximal effects of sex differences in testosterone, risk taking, and fear aversion.

  10. Galileo's Instruments of Credit Telescopes, Images, Secrecy

    CERN Document Server

    Biagioli, Mario

    2006-01-01

    In six short years, Galileo Galilei went from being a somewhat obscure mathematics professor running a student boarding house in Padua to a star in the court of Florence to the recipient of dangerous attention from the Inquisition for his support of Copernicanism. In that brief period, Galileo made a series of astronomical discoveries that reshaped the debate over the physical nature of the heavens: he deeply modified the practices and status of astronomy with the introduction of the telescope and pictorial evidence, proposed a radical reconfiguration of the relationship between theology and a

  11. Radiation protection principles

    International Nuclear Information System (INIS)

    Ismail Bahari

    2007-01-01

    The presentation outlines the aspects of radiation protection principles. It discussed the following subjects; radiation hazards and risk, the objectives of radiation protection, three principles of the system - justification of practice, optimization of protection and safety, dose limit

  12. [Light protection: principles of UV protection].

    Science.gov (United States)

    Stege, H; Mang, R

    2006-05-01

    UV radiation is responsible for the induction of epithelial and melanocytic skin cancer, photoaging, and photodermatoses. UV protection is necessary to prevent damage caused by non-physiologic exposure. UV protection includes not only reduction of sun exposure but also use of sun protective filters, UV protective clothes, DNA repair enzymes, and antioxidant supplementation. Consumers are uncertain about the possibilities and limitations of commercial sun protection measures. Dermatologists must explain protective measures to the general public which continues to believe that UV-tanned skin is healthy. The sunscreen market is a highly competitive but lucrative market. The range of products with different designations and promises makes difficult for both consumers and dermatologists to determine what is sensible UV protection.

  13. Laser Protection TIL

    Data.gov (United States)

    Federal Laboratory Consortium — The Laser Protection TIL conducts research and analysis of laser protection materials along with integration schemes. The lab's objectives are to limit energy coming...

  14. Protecting human health and security in digital Europe: how to deal with the "privacy paradox"?

    Science.gov (United States)

    Büschel, Isabell; Mehdi, Rostane; Cammilleri, Anne; Marzouki, Yousri; Elger, Bernice

    2014-09-01

    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed light on the tension between secrecy and transparency in the digital era. A special focus is put from the perspectives of psychology, medical ethics and European law on the contradiction between individuals' motivations for consented processing of personal data and their fears about unknown disclosure, transferal and sharing of personal data via information and communication technologies (named the "privacy paradox"). Potential benefits and harms for the individual and society resulting from the use of computers, mobile phones, the Internet and social media are being discussed. Furthermore, the authors point out the ethical and legal limitations inherent to the processing of personal data in a democratic society governed by the rule of law. Finally, they seek to demonstrate that the impact of information and communication technology use on the individuals' well-being, the latter being closely correlated with a high level of fundamental rights protection in Europe, is a promising feature of the socalled "e-democracy" as a new way to collectively attribute meaning to large-scale online actions, motivations and ideas.

  15. Environmental protection economically viable

    International Nuclear Information System (INIS)

    Dartsch, B.; Hildebrandt, T.

    1994-01-01

    The Environmental Technology Forum for Industry and Research (Utech) was held for the fifth time this year at the International Congress Centre in Berlin. The main themes of this year's Utech were additive environmental protection, production-integrated environmental protection, management and economic aspects of environmental protection, research and development in environmental protection as well as environmental information legislation. (orig.) [de

  16. Nature and landscape protection

    International Nuclear Information System (INIS)

    Klinda, J.; Lieskovska, Z.

    1998-01-01

    In accordance with National Council of the Slovak Republic Act N. 287/1994 Coll. on Nature and Landscape Protection, the system of complex nature landscape protection has been designed based on five levels of protection. Categories of protected areas as well as cultural monuments in the Slovak Republic are reviewed.Slovak contribution to the world heritage is included

  17. Operational radiation protection and radiation protection training

    International Nuclear Information System (INIS)

    Kraus, W.

    1989-01-01

    The radiation protection system in the German Democratic Republic (GDR) is reviewed. The competent authority (the SAAS) and its systems of licensing and supervision are described. Discussion covers the role of the Radiation Protection Officer, the types of radiation monitoring, medical surveillance programs and the classification of workers and work areas. Unusual occurrences in the GDR, 1963-1976, are presented and the occupational radiation protection problems at some specific types of workplaces are discussed. The GDR's system of training in radiation protection and nuclear safety is described. 5 figs., 18 tabs

  18. Focus radiation protection

    International Nuclear Information System (INIS)

    Ebermann, Lutz

    2016-01-01

    The publication of the Bundesamt fuer Strahlenschutz on radiation protection covers the following issues: (i) exposure from natural sources: health hazard due to radon, radiation protection in residential homes, radon in Germany, natural raw materials in industrial processes; (ii) clearance of radioactive wastes: clearance in the frame of nuclear power plant dismantling, the situation in Germany and Europe; (iii) emergency management: principles of radiation protection, fictive sequence of accident events; (iiii) other actual radiation protection topics: more limits - more protection? radiation protection in medicine, occupational radiation protection.

  19. Radiation. Protection. Health. Proceedings

    International Nuclear Information System (INIS)

    Hajek, Michael; Maringer, Franz Josef; Steurer, Andreas; Schwaiger, Martina; Timal, Guenter

    2015-01-01

    The topics of the meeting are the diagnostic and therapeutic application of ionizing radiations, the application of radiation in research, industry and engineering and radiation protection. The volume includes the following chapters: Radiation protection and society, radiation protection infrastructure, population and environment, metrology and measuring techniques, 1. Workshop on population and environment, NORM and radon, 2. Update: dose - extent of damage - limiting value definition, radiation protection for personnel (except medicine), radiation protection in medicine.

  20. Loft fire protection

    International Nuclear Information System (INIS)

    White, E.R.; Jensen, J.D.

    1980-01-01

    Quantified criteria that was developed and applied to provide in-depth fire protection for the Loss of Fluid Test (LOFT) Facility are presented. The presentation describes the evolution process that elevated the facility's fire protection from minimal to that required for a highly protected risk or improved risk. Explored are some infrequently used fire protection measures that are poorly understood outside the fire protection profession

  1. La inmunización con productos de excreción-secreción de Trichinella spiralis unido al bloqueo de CTLA-4 produce un elevado grado de protección ante un reto con el parásito

    Directory of Open Access Journals (Sweden)

    José Lino Zumaquero-Ríos

    2017-04-01

    Full Text Available En la búsqueda de una vacuna experimental efectiva contra Trichinella spiralis se han utilizado diferentes estrategias, pero el grado de protección alcanzado en la casi totalidad de los ensayos es insuficiente para lograr un adecuado control de la enfermedad. En la literatura hay evidencias de que moléculas inhibidoras de la activación de los linfocitos T están implicadas en la regulación de la respuesta inmune contra los helmintos. El bloqueo de estas moléculas puede ser un blanco potencial para el tratamiento de las infecciones causadas por estos parásitos. Por otra parte, se ha informado que la inmunización con productos de excreción-secreción de larvas musculares de T. spiralis proporciona una inmunidad protectora parcial. La infección con el parásito induce una elevada población de linfocitos T reguladores que modulan la respuesta inmune. En este trabajo encontramos que la inmunización con antígenos de excreción-secreción de larvas musculares, más el bloqueo de la molécula inhibidora CTLA-4 en los linfocitos T, causa una significativa reducción de las larvas del parásito en un modelo experimental murino. De esta forma, queda demostrado que la eliminación del efecto supresor inducido por el helminto da por resultado una respuesta Th2 protectora más potente.

  2. Aircraft Fire Protection Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Navy Aircraft Protection Laboratory provides complete test support for all Navy air vehicle fire protection systems.The facility allows for the simulation of a...

  3. Noise and Hearing Protection

    Science.gov (United States)

    ... ENTCareers Marketplace Find an ENT Doctor Near You Noise and Hearing Protection Noise and Hearing Protection Patient ... it is. How can I tell if a noise is dangerous? People differ in their sensitivity to ...

  4. Radiation protection standards

    International Nuclear Information System (INIS)

    Koelzer, W.

    1980-01-01

    The present paper deals with: Objectives and basic concepts of radiation protection, basic radiobiological considerations, the ICRP system of dose limitation and with operational radiation protection (limits, reference levels, occupational exposure). (RW)

  5. Cathodic protection -- Rectifier 46

    International Nuclear Information System (INIS)

    Lane, W.M.

    1995-01-01

    This Acceptance Test Procedure (ATP) has been prepared to demonstrate that the cathodic protection system functions as required by project criteria. The cathodic protection system is for the tank farms on the Hanford Reservation. The tank farms store radioactive waste

  6. Healthy Watersheds Protection

    Science.gov (United States)

    ... for restoring areas with degraded water quality, as well as protecting healthy waters from emerging problems before expensive damages occur. ... exclusively on restoring impaired waters, EPA created the Healthy ... more emphasis to proactively protecting high quality waters, following the ...

  7. Cathodic protection -- Rectifier 47

    International Nuclear Information System (INIS)

    Lane, W.M.

    1995-01-01

    This Acceptance Test Procedure (ATP) has been prepared to demonstrate that the cathodic protection system functions as required by project criteria. The cathodic protection system is for the tank farms at the Hanford Reservation. The tank farms store radioactive waste

  8. Endangered Species Protection Bulletins

    Science.gov (United States)

    Endangered Species Protection Bulletins set forth geographically specific pesticide use limitations for the protection of threatened and endangered (listed) species and their designated critical habitat. Find out how to get and use Bulletins.

  9. Information protection playbook

    CERN Document Server

    Kane, Greg

    2013-01-01

    The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to

  10. Machine protection systems

    CERN Document Server

    Macpherson, A L

    2010-01-01

    A summary of the Machine Protection System of the LHC is given, with particular attention given to the outstanding issues to be addressed, rather than the successes of the machine protection system from the 2009 run. In particular, the issues of Safe Machine Parameter system, collimation and beam cleaning, the beam dump system and abort gap cleaning, injection and dump protection, and the overall machine protection program for the upcoming run are summarised.

  11. Environmental Protection Agency, Protecting Children's Environmental Health

    Science.gov (United States)

    ... and Research Centers Contact Us Share Protecting Children's Environmental Health Children are often more vulnerable to pollutants ... during development. Learn more about children's health, the environment, and what you can do. Basic Information Children ...

  12. Protective Behavior in Games

    OpenAIRE

    Fiestras-Janeiro, G.; Borm, P.E.M.; van Megen, F.J.C.

    1996-01-01

    This paper introduces the notion of protective equilibrium in the context of fin ite games in strategic form.It shows that for matrix games the set of protective equilibria equals the set of proper equilibria.Moreover, in the context of bima trix games, the notion of protective behaviour is used as a refinement tool.

  13. Protective Behavior in Games

    NARCIS (Netherlands)

    Fiestras-Janeiro, G.; Borm, P.E.M.; van Megen, F.J.C.

    1996-01-01

    This paper introduces the notion of protective equilibrium in the context of fin ite games in strategic form.It shows that for matrix games the set of protective equilibria equals the set of proper equilibria.Moreover, in the context of bima trix games, the notion of protective behaviour is used as

  14. Radiation protection seminar

    International Nuclear Information System (INIS)

    2012-01-01

    The Radiation Protection Seminar, was organized by the Argentina Association of Biology and Nuclear Medicine, and Bacon Laboratory, the 20 june 2012, in the Buenos Aires city of Argentina. In this event were presented some papers on the following topics: methods of decontamination, radiation protection of patients; concepts of radiation protection and dosimetry.

  15. Ozone Layer Protection

    Science.gov (United States)

    ... and Research Centers Contact Us Share Ozone Layer Protection The stratospheric ozone layer is Earth’s “sunscreen” – protecting ... GreenChill Partnership Responsible Appliance Disposal (RAD) Program Ozone Protection vs. Ozone Pollution This website addresses stratospheric ozone ...

  16. Designing physical protection technology for insider protection

    International Nuclear Information System (INIS)

    Trujillo, A.A.; Waddoups, I.G.

    1986-01-01

    Since its inception, the nuclear industry has been engaged in providing protection against an insider threat. Although insider protection activities have been fairly successful in the past, present societal conditions require increased protection to further minimize the existence of an insider or the consequences of an insider-perpetrated incident. Integration of insider protection techniques into existing administrative and operational procedures has resulted in economic and operational impacts. Future increases in insider protection may result in even greater impacts, so we must proceed wisely as new approaches are developed. Increased emphasis on background investigations, security clearances, human reliability programs, security awareness activities, and the development of technology to address the insider threat are evidence of continuing concern in this area. Experience ranging from operational test and evaluation of developmental equipment to conceptual designs for new facilities has led to the development of general principles and conclusions for mitigating the insider threat while minimizing adverse impacts on site operations. Important principles include real-time monitoring of personnel and material and requiring that the physical protection and material control and accounting systems to be much more coordinated and integrated than in the past

  17. Tax haven implications in financial crime

    OpenAIRE

    Daniela Iuliana Radu

    2015-01-01

    The term "tax haven" is often incorrectly used to describe a country because from this point of view, we should use the term "financial secrecy jurisdiction". A certain degree of financial and banking secrecy is characteristic of all states, almost all states requiring a certain level of protection for banking and commercial information. Banking and financial secrecy jurisdictions refuse, nearly always, to violate its own laws on banking secrecy, even when it could be a serious violation of t...

  18. Numerical distance protection

    CERN Document Server

    Ziegler, Gerhard

    2011-01-01

    Distance protection provides the basis for network protection in transmission systems and meshed distribution systems. This book covers the fundamentals of distance protection and the special features of numerical technology. The emphasis is placed on the application of numerical distance relays in distribution and transmission systems.This book is aimed at students and engineers who wish to familiarise themselves with the subject of power system protection, as well as the experienced user, entering the area of numerical distance protection. Furthermore it serves as a reference guide for s

  19. Radiation protection in Sudan

    International Nuclear Information System (INIS)

    Elamin, O.I.; Hajmusa, E.A.; Shaddad, I.A.

    2001-01-01

    The regulatory framework as established by the Sudan Atomic Energy Commission (SAEC) Act, promulgated in 1996, is described in the report. Three levels of responsibility in meeting radiation protection requirements are established: the Board, the Radiation Protection Technical Committee as the competent authority in the field of radiation protection, and the SAEC Department of Radiation Protection and Environmental Monitoring as the implementing technical body. The report also refers to environmental activities, patient doses in diagnostic radiology, the management of disused sources, emergency preparedness and orphan sources, and the national training activities in the radiation protection field. (author)

  20. Fire Protection Program Manual

    Energy Technology Data Exchange (ETDEWEB)

    Sharry, J A

    2012-05-18

    This manual documents the Lawrence Livermore National Laboratory (LLNL) Fire Protection Program. Department of Energy (DOE) Orders 420.1B, Facility Safety, requires LLNL to have a comprehensive and effective fire protection program that protects LLNL personnel and property, the public and the environment. The manual provides LLNL and its facilities with general information and guidance for meeting DOE 420.1B requirements. The recommended readers for this manual are: fire protection officers, fire protection engineers, fire fighters, facility managers, directorage assurance managers, facility coordinators, and ES and H team members.

  1. Numerical differential protection

    CERN Document Server

    Ziegler, Gerhard

    2012-01-01

    Differential protection is a fast and selective method of protection against short-circuits. It is applied in many variants for electrical machines, trans?formers, busbars, and electric lines.Initially this book covers the theory and fundamentals of analog and numerical differential protection. Current transformers are treated in detail including transient behaviour, impact on protection performance, and practical dimensioning. An extended chapter is dedicated to signal transmission for line protection, in particular, modern digital communication and GPS timing.The emphasis is then pla

  2. Personal protective equipment

    International Nuclear Information System (INIS)

    2004-01-01

    This Practical Radiation Technical Manual is one of a series that has been designed to provide guidance on radiological protection for employers, radiation protection officers, managers and other technically competent persons who have responsibility for ensuring the safety of employees working with ionizing radiation. The Manual may be used with the appropriate IAEA Practical Radiation Safety Manuals to provide training, instruction and information for all employees engaged in work with ionizing radiation. Personal protective equipment (PPE) includes clothing or other special equipment that is issued to individual workers to provide protection against actual or potential exposure to ionizing radiations. It is used to protect each worker against the prevailing risk of external or internal exposure in circumstances in which it is not reasonably practicable to provide complete protection by means of engineering controls or administrative methods. Adequate personal protection depends on PPE being correctly selected, fitted and maintained. Appropriate training for the users and arrangements to monitor usage are also necessary to ensure that PPE provides the intended degree of protection effectively. This Manual explains the principal types of PPE, including protective clothing and respiratory protective equipment (RPE). Examples of working procedures are also described to indicate how PPE should be used within a safe system of work. The Manual will be of most benefit if it forms part of a more comprehensive training programme or is supplemented by the advice of a qualified expert in radiation protection. Some of the RPE described in this Manual should be used under the guidance of a qualified expert

  3. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  4. Theory of vibration protection

    CERN Document Server

    Karnovsky, Igor A

    2016-01-01

    This text is an advancement of the theory of vibration protection of mechanical systems with lumped and distributed parameters. The book offers various concepts and methods of solving vibration protection problems, discusses the advantages and disadvantages of different methods, and the fields of their effective applications. Fundamental approaches of vibration protection, which are considered in this book, are the passive, parametric and optimal active vibration protection. The passive vibration protection is based on vibration isolation, vibration damping and dynamic absorbers. Parametric vibration protection theory is based on the Shchipanov-Luzin invariance principle. Optimal active vibration protection theory is based on the Pontryagin principle and the Krein moment method. The book also contains special topics such as suppression of vibrations at the source of their occurrence and the harmful influence of vibrations on humans. Numerous examples, which illustrate the theoretical ideas of each chapter, ar...

  5. Resilience from coastal protection.

    Science.gov (United States)

    Ewing, Lesley C

    2015-10-28

    Coastal areas are important residential, commercial and industrial areas; but coastal hazards can pose significant threats to these areas. Shoreline/coastal protection elements, both built structures such as breakwaters, seawalls and revetments, as well as natural features such as beaches, reefs and wetlands, are regular features of a coastal community and are important for community safety and development. These protection structures provide a range of resilience to coastal communities. During and after disasters, they help to minimize damages and support recovery; during non-disaster times, the values from shoreline elements shift from the narrow focus on protection. Most coastal communities have limited land and resources and few can dedicate scarce resources solely for protection. Values from shore protection can and should expand to include environmental, economic and social/cultural values. This paper discusses the key aspects of shoreline protection that influence effective community resilience and protection from disasters. This paper also presents ways that the economic, environmental and social/cultural values of shore protection can be evaluated and quantified. It presents the Coastal Community Hazard Protection Resilience (CCHPR) Index for evaluating the resilience capacity to coastal communities from various protection schemes and demonstrates the use of this Index for an urban beach in San Francisco, CA, USA. © 2015 The Author(s).

  6. Training in radiation protection

    International Nuclear Information System (INIS)

    Schreiber, F.

    1998-01-01

    Persons who are exposed to ionizing radiation at their workplace have to be trained in radiation protection. According to the Radiation Protection Ordinance the person with responsibility in radiation protection has to guarantee that the training is performed twice a year. Our training material was created especially for the persons defined in the Radiation Protection Ordinance and the X-ray Ordinance. It enables persons who teach (generally the radiation protection officer) to perform the training without tedious study and preparation of the documents. Our material is not just another textbook for radiation protection but rather a folder with colour transparencies and explanatory texts which make a difference in volume and price in comparison to other existing materials. (orig.) [de

  7. Protecting plutonium: physical safeguards

    International Nuclear Information System (INIS)

    Ney, J.F.

    1975-10-01

    In the development of physical protection systems, objectives for improving overall performance include the following: (1) Increase the time required for the malefactor to achieve his goal; (2) decrease the time required for detection of malevolent activities; (3) reduce the time for adequate response force arrival; (4) increase the capability to neutralize the malefactor; (5) reduce the total protection system costs, while increasing the level of protection; (6) improve acceptance levels (social, environmental, legal, and institutional); and (7) increase nuclear fuel cycle safety. Fortunately, there is sufficient lead time and technical base to explore and develop new protection system concepts so that a completely integrated and tested protection system capable of providing unprecedented levels of security can be available when needed. Although it will be impossible to completely eliminate all risks, it should be both possible and economically feasible to install protection systems which will deter or prevent a malefactor from using the nuclear fuel cycle to disrupt society

  8. Emergency Protection from Aerosols

    Energy Technology Data Exchange (ETDEWEB)

    Cristy, G.A.

    2001-11-13

    Expedient methods were developed that could be used by an average person, using only materials readily available, to protect himself and his family from injury by toxic (e.g., radioactive) aerosols. The most effective means of protection was the use of a household vacuum cleaner to maintain a small positive pressure on a closed house during passage of the aerosol cloud. Protection factors of 800 and above were achieved.

  9. Emergency protection from aerosols

    International Nuclear Information System (INIS)

    Cristy, G.A.; Chester, C.V.

    1981-07-01

    Expedient methods were developed that could be used by an average person, using only materials readily available, to protect himself and his family from injury by toxic (e.g., radioactive) aerosols. The most effective means of protection was the use of a household vacuum cleaner to maintain a small positive pressure on a closed house during passage of the aerosol cloud. Protection factors of 800 and above were achieved

  10. Protecting genetic privacy.

    Science.gov (United States)

    Roche, P A; Annas, G J

    2001-05-01

    This article outlines the arguments for and against new rules to protect genetic privacy. We explain why genetic information is different to other sensitive medical information, why researchers and biotechnology companies have opposed new rules to protect genetic privacy (and favour anti-discrimination laws instead), and discuss what can be done to protect privacy in relation to genetic-sequence information and to DNA samples themselves.

  11. Radiological protection act, 1991

    International Nuclear Information System (INIS)

    1991-01-01

    This Act provides for the establishment of the Radiological Protection Institute of Ireland and dissolves An Bord Fuinnimh Nuicleigh (the Board), transferring its assets and liabilities to the Institute. It sets out a range of radiation protection measures to be taken by various Ministers in the event of a radiological emergency and gives effect at national level to the Assistance Convention, the Early Notification Convention and the Physical Protection Convention. The Institute is the competent Irish authority for the three Conventions. (NEA) [fr

  12. Protection using telecommunications

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    Deregulation in both the telecommunication and electric power industry, together with new telecommunication network technologies and advances in numerical protection, has resulted in the need to reconsider traditional methods of delivering tele-protection schemes and their associated bearer services. Fibre-optic technology is commonly deployed in new telecommunication networks for inter-station communication and utility-owned and public telecommunication networks from third parties are available for protection purposes. (author)

  13. Cathodic Protection Model Facility

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: Performs Navy design and engineering of ship and submarine impressed current cathodic protection (ICCP) systems for underwater hull corrosion control and...

  14. DOE groundwater protection strategy

    International Nuclear Information System (INIS)

    Lichtman, S.

    1988-01-01

    EH is developing a DOE-wide Groundwater Quality Protection Strategy to express DOE's commitment to the protection of groundwater quality at or near its facilities. This strategy responds to a September 1986 recommendation of the General Accounting Office. It builds on EPA's August 1984 Ground-Water Protection Strategy, which establishes a classification system designed to protect groundwater according to its value and vulnerability. The purposes of DOE's strategy are to highlight groundwater protection as part of current DOE programs and future Departmental planning, to guide DOE managers in developing site-specific groundwater protection practices where DOE has discretion, and to guide DOE's approach to negotiations with EPA/states where regulatory processes apply to groundwater protection at Departmental facilities. The strategy calls for the prevention of groundwater contamination and the cleanup of groundwater commensurate with its usefulness. It would require long-term groundwater protection with reliance on physical rather than institutional control methods. The strategy provides guidance on providing long-term protection of groundwater resources; standards for new remedial actions;guidance on establishing points of compliance; requirements for establishing classification review area; and general guidance on obtaining variances, where applicable, from regulatory requirements. It also outlines management tools to implement this strategy

  15. Radiation protection in Bolivia

    International Nuclear Information System (INIS)

    Miranda Cuadros, A.A.

    2001-01-01

    Radiation protection in Bolivia has gone through a number of stages. Initially, in the 1970s, the focus was mainly on the analysis of environmental sources resulting from the nuclear tests carried out by France in the Pacific Ocean. Subsequently, the focus switched somewhat to radiation protection in connection with the mining of uranium and in the area of public health. During the third stage, radiation protection in other areas became important as the use of radiation sources was introduced. Finally, during the present -- fourth -- stage, radiation protection regulations are being introduced and mechanisms for the control of radiation sources are being established. (author)

  16. Radiological Protection Act 1970

    International Nuclear Information System (INIS)

    1970-01-01

    This Act provides for the establishment of a Radiological Protection Board to undertake research and advise on protection from radiation hazards. Its functions include provision of advice to Government departments with responsibilities in relation to protection of sectors of the community or the community as a whole against the hazards of ionizing radiation. The Act, which lays down that the Board shall replace certain departments concerned with radiation protection, repeals several Sections of the Radioactive Substances Act 1948 and the Science and Technology Act 1965. (NEA) [fr

  17. Complete rerouting protection

    DEFF Research Database (Denmark)

    Stidsen, Thomas K.; Kjærulff, Peter

    2006-01-01

    Protection of communication against network failures is becoming increasingly important and in this paper we present the most capacity efficient protection method possible, the complete rerouting protection method, when requiring that all communication should be restored in case of a single link...... network failure. We present a linear programming model of the protection method and a column generation algorithm. For 6 real world networks, the minimal restoration overbuild network capacity is between 13% and 78%. We further study the importance of the density of the network, derive analytical bounds...

  18. Techniques in cerebral protection.

    Science.gov (United States)

    Fanelli, Fabrizio; Bezzi, Mario; Boatta, Emanuele; Passariello, Roberto

    2006-10-01

    Carotid angioplasty and stenting is a valid alternative option to conventional carotid endarterectomy in the treatment of carotid artery stenosis. During the stenting process, however, distal embolization can occur with neurological consequences. To avoid this, cerebral protection devices have been introduced. Three principal types of protection system have been developed: distal balloon occlusion, distal filters and proximal protection with or without reversal of flow. As protection devices became the focus of interest by manufactures and physicians, several trials are going on worldwide to analyze the characteristics of each of them and to evaluate their efficacy to reduce the rate of distal embolization.

  19. Protection, interlocks and diagnostics

    CERN Document Server

    Griffiths, S A; White, C; Theed, J E

    2006-01-01

    When designing any power converter it is essential to assess and incorporate adequate protection. The main objective is to offer a solution which is safe, reliable and repairable and that achieves its specification within budget. The level of protection found within each converter varies widely and will depend on the topology employed, its application and rating. This document is a guide to the types of protection engineers should consider mainly when designing power converters, as protection added during construction or after installation will always be expensive.

  20. Radiation protection law

    International Nuclear Information System (INIS)

    Hebert, J.

    1981-01-01

    This article first reviews the general radiation protection law at international and national level, with particular reference to the recommendations of the International Commission on Radiological Protection (ICRP) which, although not mandatory, are nevertheless taken into consideration by international organisations establishing basic radiation protection standards such as the UN, IAEA, NEA and Euratom, at Community level, and by national legislation. These standards are therefore remarkably harmonized. Radiation protection rule applied in France for the different activities and uses of radioactive substances are then described, and finally, a description is given of the regulations governing artificial radioisotopes and radioactive effluents. (NEA) [fr

  1. Investor Protections and Economic Growth

    OpenAIRE

    Haidar, Jamal Ibrahim

    2009-01-01

    Using objective measures of investor protections in 170 countries, I establish that the level of investor protection matters for cross-country differences in GDP growth: countries with stronger protections tend to grow faster than those with poor investor protections.

  2. Protecting the Amazon with protected areas

    Science.gov (United States)

    Walker, Robert; Moore, Nathan J.; Arima, Eugenio; Perz, Stephen; Simmons, Cynthia; Caldas, Marcellus; Vergara, Dante; Bohrer, Claudio

    2009-01-01

    This article addresses climate-tipping points in the Amazon Basin resulting from deforestation. It applies a regional climate model to assess whether the system of protected areas in Brazil is able to avoid such tipping points, with massive conversion to semiarid vegetation, particularly along the south and southeastern margins of the basin. The regional climate model produces spatially distributed annual rainfall under a variety of external forcing conditions, assuming that all land outside protected areas is deforested. It translates these results into dry season impacts on resident ecosystems and shows that Amazonian dry ecosystems in the southern and southeastern basin do not desiccate appreciably and that extensive areas experience an increase in precipitation. Nor do the moist forests dry out to an excessive amount. Evidently, Brazilian environmental policy has created a sustainable core of protected areas in the Amazon that buffers against potential climate-tipping points and protects the drier ecosystems of the basin. Thus, all efforts should be made to manage them effectively. PMID:19549819

  3. Buffer moisture protection system

    International Nuclear Information System (INIS)

    Ritola, J.; Peura, J.

    2013-11-01

    With the present knowledge, bentonite blocks have to be protected from the air relative humidity and from any moisture leakages in the environment that might cause swelling of the bentonite blocks during the 'open' installation phase before backfilling. The purpose of this work was to design the structural reference solution both for the bottom of the deposition hole and for the buffer moisture protection and dewatering system with their integrated equipment needed in the deposition hole. This report describes the Posiva's reference solution for the buffer moisture protection system and the bottom plate on basis of the demands and functional requirements set by long-term safety. The reference solution with structural details has been developed in research work made 2010-2011. The structural solution of the moisture protection system has not yet been tested in practice. On the bottom of the deposition hole a copper plate which protects the lowest bentonite block from the gathered water is installed straight to machined and even rock surface. The moisture protection sheet made of EPDM rubber is attached to the copper plate with an inflatable seal. The upper part of the moisture protection sheet is fixed to the collar structures of the lid which protects the deposition hole in the disposal tunnel. The main function of the moisture protection sheet is to protect bentonite blocks from the leaking water and from the influence of the air humidity at their installation stage. The leaking water is controlled by the dewatering and alarm system which has been integrated into the moisture protection liner. (orig.)

  4. Protecting Cryptographic Keys and Functions from Malware Attacks

    Science.gov (United States)

    2010-12-01

    2009. 92 [17] D. Chaum and E. Van Heyst. Group signatures. In D. W. Davies, editor, Advances in Cryptology — Eurocrypt ’91, pages 257–265, Berlin...and David A. Patterson. Computer Architecture - A Quantitative Ap- proach. Morgan Kaufmann Publishers, pub-MORGAN-KAUFMANN:adr, third edition, 2002...to provide data secrecy for user appli- cations on a per-page basis. In David Gregg, Vikram S. Adve, and Brian N. Bershad, editors, Proceedings of the

  5. Smart cathodic protection systems

    NARCIS (Netherlands)

    Polder, R.B.; Leggedoor, J.; Schuten, G.; Sajna, S.; Kranjc, A.

    2010-01-01

    Cathodic protection delivers corrosion protection in concrete structures exposed to aggressive environments, e.g. in de-icing salt and marine climates. Working lives of a large number of CP systems are at least more than 13 years and probably more than 25 years, provided a minimum level of

  6. Complete Rerouting Protection

    DEFF Research Database (Denmark)

    Stidsen, Thomas K.; Kjærulff, Peter

    2005-01-01

    In this paper we present a new protection method: Complete Rerouting. This is the most capacity e cient protection method for circuit switched networks and it is, to the best of our knowledge, the first time it has been described. We implement a column generation algorithm and test the performance...

  7. Protected urban planet

    NARCIS (Netherlands)

    Pereira Roders, A.R.; Veldpaus, L.; Verbruggen, R.C.

    2012-01-01

    PUP, abbreviation to Protected Urban Planet, is the first tool developed for visualizing, mapping and contributing to information exchange on the evolution of protected urban areas worldwide. Besides locating them, it also provides communities with means to disseminate and raise awareness for their

  8. Protective Health Education

    Science.gov (United States)

    Aydin, Ganime

    2016-01-01

    Problem Statement: As a result of wars, starvation, traffic accidents, homicide, infectious diseases, insufficient adult protection, migration, and inadequate legal reforms the mortality rate of children has become a serious problem in the world. Protective health education contributes to a child's physical and social health. In this case, the…

  9. Regulations in radiation protection

    International Nuclear Information System (INIS)

    1986-01-01

    On the occasion of the twenty fifth anniversary of the Dutch Society for Radiation Protection, a symposium was held about Regulations in Radiation Protection. The program consisted of six contributions of which four are included in this publication. The posters presented are published in NVS-nieuws, 1985, vol. 11(5). (G.J.P.)

  10. Individual protections and ergonomics

    International Nuclear Information System (INIS)

    2000-01-01

    The object of this conference was the protective clothing against radioactive contamination. The regulatory frame, the physiological constraints and the human factor are the different aspects studied through the conference with a constant objective, the optimization of radiation protection. (N.C.)

  11. Environmental protection Implementation Plan

    International Nuclear Information System (INIS)

    Holland, R. C.

    1999-01-01

    This ''Environmental Protection Implementation Plan'' is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California's commitment to conduct its operations in an environmentally safe and responsible manner. The ''Environmental Protection Implementation Plan'' helps management and staff comply with applicable environmental responsibilities

  12. The Radiation Protection Act

    International Nuclear Information System (INIS)

    Persson, L.

    1989-01-01

    The new Radiation Protection Act (1988:220) entered into force in Sweden on July 1st, 1988. This book presents the Act as well as certain regulations connected to it. As previously, the main responsibility for public radiation protection will rest with one central radiation protection authority. According to the 1988 Act, the general obligations with regard to radiation protection will place a greater responsibility than in the past on persons carrying out activities involving radiation. Under the act, it is possible to adjust the licensing and supervisory procedures to the level of danger of the radiation source and the need for adequate competence, etc. The Act recognises standardised approval procedures combined with technical regulations for areas where the risks are well known. The Act contains several rules providing for more effective supervision. The supervising authority may in particular decide on the necessary regulations and prohibitions for each individual case. The possibilities of using penal provisions have been extended and a rule on the mandatory execution of orders has been introduced. The Ordinance on Radiation Protection (1988:293) designates the National Institute of Radiation Protection (SSI) as the central authority referred to in the Radiation Protection Act. The book also gives a historic review of radiation protection laws in Sweden, lists regulations issued by SSI and presents explanations of radiation effects and international norms in the area. (author)

  13. Electroplating offers embrittlement protection

    Science.gov (United States)

    Daniels, C. M., Jr.

    1970-01-01

    Thin copper electrodeposited layer protects metal parts in environments with which they may be incompatible. Originally developed for main engine of Space Shuttle where high strength nickle alloy bellows must operate in high-pressure hydrogen, technique protects nickel and is unaffected by forming process or subsequent heat treatment and preinstallation processing.

  14. Practical radiation protection

    International Nuclear Information System (INIS)

    Brouwer, G.; Van den Eijnde, J.H.G.M.

    1997-01-01

    This textbook aims at providing sufficient knowledge and insight to carry out correctly radiation protection activities and operations. The subjects are appropriate for the training of radiation protection experts for the levels 5A (encapsulated sources, X rays) and 5B (open sources, laboratory activities)

  15. Consumer rights and protections

    Science.gov (United States)

    ... care consumer rights; Rights of the health care consumer ... RIGHTS AND PROTECTIONS Here are ways that the health care law protects consumers. You must be covered, even if you have a pre-existing condition. No insurance plan can reject you, ...

  16. Military radiation protection

    International Nuclear Information System (INIS)

    Harrison, J.

    1993-01-01

    The Ministry of Defence and the military in particular have a very strong commitment to radiation protection of personnel in war and peace. MOD endeavours to do better all the time because it is essential that the armed forces have the confidence to fulfil their role and this is best achieved by providing them with the best possible protection irrespective of the hazard. (author)

  17. Respirators and protective clothing

    International Nuclear Information System (INIS)

    1967-01-01

    The basic object in the use of protective clothing and equipment is to prevent contamination of the skin and to prevent inhalation and ingestion of radioactive isotopes or other toxic materials. This book is a guide to deciding the kind and quantity of protective equipment needed for a particular type of laboratory or operation.

  18. Optimisation of radiation protection

    International Nuclear Information System (INIS)

    1988-01-01

    Optimisation of radiation protection is one of the key elements in the current radiation protection philosophy. The present system of dose limitation was issued in 1977 by the International Commission on Radiological Protection (ICRP) and includes, in addition to the requirements of justification of practices and limitation of individual doses, the requirement that all exposures be kept as low as is reasonably achievable, taking social and economic factors into account. This last principle is usually referred to as optimisation of radiation protection, or the ALARA principle. The NEA Committee on Radiation Protection and Public Health (CRPPH) organised an ad hoc meeting, in liaison with the NEA committees on the safety of nuclear installations and radioactive waste management. Separate abstracts were prepared for individual papers presented at the meeting

  19. Introduction to Machine Protection

    CERN Document Server

    Schmidt, R

    2016-01-01

    Protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent, although there was one paper that discussed beam-induced damage for the SLAC linac (Stanford Linear Accelerator Center) as early as in 1967. It is related to the increasing beam power of high-power proton accelerators, to the emission of synchrotron light by electron-positron accelerators and to the increase of energy stored in the beam. Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping ...

  20. Wake Shield Target Protection

    International Nuclear Information System (INIS)

    Valmianski, Emanuil I.; Petzoldt, Ronald W.; Alexander, Neil B.

    2003-01-01

    The heat flux from both gas convection and chamber radiation on a direct drive target must be limited to avoid target damage from excessive D-T temperature increase. One of the possibilities of protecting the target is a wake shield flying in front of the target. A shield will also reduce drag force on the target, thereby facilitating target tracking and position prediction. A Direct Simulation Monte Carlo (DSMC) code was used to calculate convection heat loads as boundary conditions input into ANSYS thermal calculations. These were used for studying the quality of target protection depending on various shapes of shields, target-shield distance, and protective properties of the shield moving relative to the target. The results show that the shield can reduce the convective heat flux by a factor of 2 to 5 depending on pressure, temperature, and velocity. The protective effect of a shield moving relative to the target is greater than the protective properties of a fixed shield. However, the protective effect of a shield moving under the drag force is not sufficient for bringing the heat load on the target down to the necessary limit. Some other ways of diminishing heat flux using a protective shield are discussed

  1. Optimization in radiological protection

    International Nuclear Information System (INIS)

    Acosta Perez, Clarice de Freitas

    1996-01-01

    The optimization concept in radiation protection is, in its essence, practical. In each aspect that we deal with the man, it is necessary to take frequent decisions such as: what is the protection level to be pursued, since the protection levels under consideration provide doses lower than the appropriate annual limits. The optimization gives a basic framework of the minding that is appropriate to conduct to a balance kind of the resources available for the protection and protection level obtained against a multitude of factors and constrains in a manner to obtain the best result. In this work, was performed the optimization, from the radiation protection point of view, of a facility project who enclose two shielded hot cells where will be handled UO 2 small plate with 50% of U-235 burn-up, irradiated in the research swimming pool reactor, IEA-R1. To obtain this goal were specified the relevant factors and criteria, were applied the main techniques used in a decision-making in radiological protection, presently adopted and was performed a sensibility study of the factors and criteria used in this work. In order to obtain a greater agility in applying the techniques for decision-making was developed a micro computer program. (author)

  2. Innovative protection cookbook

    International Nuclear Information System (INIS)

    Lambert, D.L.

    2002-01-01

    Full text: A large portion of the international community relies on expert judgment and military expertise to form the protection strategy of weapons-grade nuclear materials. This approach can be less than effectual for two primary reasons. First, much of the nuclear material that needs the most protection is not in a static form and located in easily secured storage locations. Some of the most effective measures for protection of in-process material are administrative and procedural in nature. There are basic protection differences between countries just like there are differences in baking bread. However, the necessary steps to produce bread are basically the same around the world. Certain ingredients are required to give it flavor, make it rise, and have a certain texture. So it is in the development of protection systems. A measure of intrusion detection, some access controls and searches, a pinch of computerized accounting, a layer of delay barriers, and a smidgen of armed response--and the basis for a 'cookbook' is born. Any and all protection systems can begin with simple elements that can be just as effective as the most sophisticated modern components. This paper will describe some of those simple, but effective, innovative protection measures. (author)

  3. Ethics and radiation protection

    International Nuclear Information System (INIS)

    Hansson, Sven Ove

    2007-01-01

    Some of the major problems in radiation protection are closely connected to issues that have a long, independent tradition in moral philosophy. This contribution focuses on two of these issues. One is the relationship between the protection of individuals and optimisation on the collective level, and the other is the relative valuation of future versus immediate damage. Some of the intellectual tools that have been developed by philosophers can be useful in radiation protection. On the other hand, philosophers have much to learn from radiation protectors, not least when it comes to finding pragmatic solutions to problems that may be intractable in principle

  4. PROTECTION OF THREATENED WITNESSES

    Directory of Open Access Journals (Sweden)

    Nadia Claudia CANTEMIR-STOICA

    2016-05-01

    Full Text Available First, I wish to make a presentation of historically institution and subsequently parallels between past and current regulators to expose whether the legislature has reached desire - namely ensuring effective protection of witnesses threatened and vulnerable. Also, I decided to analyze the topic from the perspective of the criminal procedural provisions of Law 682/2002 and witness protection, which are republished to expose the conditions and criteria by which to ensure this status. I also want to present besides theoretical and practical ways in which the National Office for Witness Protection gives effective legal provisions. Not least, I will bring criticism of current regulation and not by law ferenda proposals.

  5. Ethics and radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Hansson, Sven Ove [Department of Philosophy and the History of Technology, Royal Institute of Technology (KTH), Teknikringen 78 B, 2tr, SE-100 44 Stockholm (Sweden)

    2007-06-01

    Some of the major problems in radiation protection are closely connected to issues that have a long, independent tradition in moral philosophy. This contribution focuses on two of these issues. One is the relationship between the protection of individuals and optimisation on the collective level, and the other is the relative valuation of future versus immediate damage. Some of the intellectual tools that have been developed by philosophers can be useful in radiation protection. On the other hand, philosophers have much to learn from radiation protectors, not least when it comes to finding pragmatic solutions to problems that may be intractable in principle.

  6. Selective protection. Selektivschutz

    Energy Technology Data Exchange (ETDEWEB)

    1983-01-01

    TC 2, ''Transmission and distribution of electrical energy'', held its meeting on selective protection on 16/17 March 1983 at Nuremberg. The main reason for the development of computerized protective systems is their ability to solve a wide range of tasks using only a few, high-integrated systems, i.e. on the software side instead of the hardware side. At the meeting, experts from industrial companies and public utilities reviewed the status and trends of protective systems engineering. Scientific studies and operating experience were presented. Separate abstracts were prepared for 2 papers in this conference proceedings volume.

  7. Radiation protective clothing

    International Nuclear Information System (INIS)

    Fujinuma, Tadashi; Tamura, Shoji; Ijiri, Yasuo.

    1988-01-01

    Purpose: To obtain radiation protective clothings of excellent workability and durability. Constitution: Protective clothings of the present invention comprise shielding materials for the upper-half of the body having lead foils laminated on one surface and shielding materials for the lower-half of the body a resin sheet containing inorganic powders of high specific gravity. Such protective clothings have a frexibility capable of followings after the movement of the upper-half body and easily follow after the movement such as acute bending of the body near the waste in the lower-half body. (Kamimura, M.)

  8. Fall Protection Introduction, #33462

    Energy Technology Data Exchange (ETDEWEB)

    Chochoms, Michael [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-06-23

    The proper use of fall prevention and fall protection controls can reduce the risk of deaths and injuries caused by falls. This course, Fall Protection Introduction (#33462), is designed as an introduction to various types of recognized fall prevention and fall protection systems at Los Alamos National Laboratory (LANL), including guardrail systems, safety net systems, fall restraint systems, and fall arrest systems. Special emphasis is given to the components, inspection, care, and storage of personal fall arrest systems (PFASs). This course also presents controls for falling object hazards and emergency planning considerations for persons who have fallen.

  9. Protective head of sensors

    International Nuclear Information System (INIS)

    Liska, K.; Anton, P.

    1987-01-01

    The discovery concerns the protective heads of diagnostic assemblies of nuclear power plants for conductors of the sensors from the fuel and control parts of the said assemblies. A detailed description is presented of the design of the protective head which, as compared with the previous design, allows quick and simple assembly with reduced risk of damaging the sensors. The protective head may be used for diagnostic assemblies both in power and in research reactors and it will be used for WWER reactor assemblies. (A.K.). 3 figs

  10. Radiation protection; Proteccion Radiologica

    Energy Technology Data Exchange (ETDEWEB)

    Ures Pantazi, M [Universidad de la Republica, Facultad de Quimica (Uruguay)

    1994-12-31

    This work define procedures and controls about ionizing radiations. Between some definitions it found the following topics: radiation dose, risk, biological effects, international radioprotection bodies, workers exposure, accidental exposure, emergencies and radiation protection.

  11. Physics for radiation protection

    CERN Document Server

    Martin, James E

    2013-01-01

    A much-needed working resource for health physicists and other radiation protection professionals, this volume presents clear, thorough, up-to-date explanations of the basic physics necessary to address real-world problems in radiation protection. Designed for readers with limited as well as basic science backgrounds, Physics for Radiation Protection emphasizes applied concepts and carefully illustrates all topics through examples as well as practice problems. Physics for Radiation Protection draws substantially on current resource data available for health physics use, providing decay schemes and emission energies for approximately 100 of the most common radionuclides encountered by practitioners. Excerpts of the Chart of the Nuclides, activation cross sections, fission yields, fission-product chains, photon attenuation coefficients, and nuclear masses are also provided.

  12. Ingredients of protection engineering

    International Nuclear Information System (INIS)

    Latorre, V.R.; Spogen, L.R. Jr.

    1974-01-01

    The protection of an electronic/electrical system from an electromagnetic environment requires a systematic approach and a clear and concise identification of the data requirements and tools (analytical and experimental) for the vulnerability assessment. In this paper, a basic protection engineering concept is developed. The concept is general and therefore applicable to many systems. It consists of five stages: (1) systems analysis, (2) subsystem degradation, (3) interaction and coupling, (4) protection trade-off analysis, and (5) fabrication and operation. A detailed discussion of all functions performed in each stage is described; the input data to these functions identified; and means (tools) by which the functional operations are satisfied are summarized. Simple examples are used throughout the paper to illustrate the definitions of various functions and to emphasize the iterative process required in arriving at a protection scheme. (U.S.)

  13. Protection without Protectionism.

    Science.gov (United States)

    Saur, Ricardo A. C.

    1979-01-01

    Presents a Third World approach to transborder data flow. Suggests developing local capacities for computer power, confining data flow within borders, and providing protection for local development efforts. (PD)

  14. Radiation protection in brachytherapy

    International Nuclear Information System (INIS)

    Benitez, Manuel

    1996-02-01

    It covers technical procedures in medical applications for cancer treatment. Radiation protection principles in brachytherapy. Medical uses in therapy for Sr-90, Cs-137, Co-60, Ra-226, Ir-192, Au-198, Bi-214, Pb-214. (The author)

  15. Tritium protective clothing

    International Nuclear Information System (INIS)

    Fuller, T.P.; Easterly, C.E.

    1979-06-01

    Occupational exposures to radiation from tritium received at present nuclear facilities and potential exposures at future fusion reactor facilities demonstrate the need for improved protective clothing. Important areas relating to increased protection factors of tritium protective ventilation suits are discussed. These areas include permeation processes of tritium through materials, various tests of film permeability, selection and availability of suit materials, suit designs, and administrative procedures. The phenomenological nature of film permeability calls for more standardized and universal test methods, which would increase the amount of directly useful information on impermeable materials. Improvements in suit designs could be expedited and better communicated to the health physics community by centralizing devlopmental equipment, manpower, and expertise in the field of tritium protection to one or two authoritative institutions

  16. Radiation Protection: introduction

    International Nuclear Information System (INIS)

    Loos, M.

    2005-01-01

    The abstract gives an overview and introduction to the activities of SCK-CEN's Radiation Protection department. Main strategic developments and achievements in the field of life sciences, policy supports and medical applications are summarised

  17. Radiation protection in medicine

    International Nuclear Information System (INIS)

    Vano, E.; Holmberg, O.; Perez, M. R.; Ortiz, P.

    2016-01-01

    Diagnostic, interventional and therapeutic used of ionizing radiation are beneficial for hundreds of millions of people each year by improving health care and saving lives. In March 2001, the first International Conference on the Radiological Protection of Patients was held in Malaga, Spain, which led to an international action plan for the radiation protection of patients. Ten years after establishing the international action plan, the International Conference on Radiation Protection in Medicine: Setting the Scene for the Next Decade was held in Bonn, Germany, in December 2012. the main outcome of this conference was the so called Bonn Call for Action that identifies then priority actions to enhance radiation protection in medicine for the next decade. The IAEA and WHO are currently working in close cooperation to foster and support the implementation of these ten priority actions in Member States, but their implementation requires collaboration of national governments, international agencies, researchers, educators, institutions and professional associations. (Author)

  18. Water Quality Protection Charges

    Data.gov (United States)

    Montgomery County of Maryland — The Water Quality Protection Charge (WQPC) is a line item on your property tax bill. WQPC funds many of the County's clean water initiatives including: • Restoration...

  19. Radiation protection in medicine

    Energy Technology Data Exchange (ETDEWEB)

    Vano, E.; Holmberg, O.; Perez, M. R.; Ortiz, P.

    2016-08-01

    Diagnostic, interventional and therapeutic used of ionizing radiation are beneficial for hundreds of millions of people each year by improving health care and saving lives. In March 2001, the first International Conference on the Radiological Protection of Patients was held in Malaga, Spain, which led to an international action plan for the radiation protection of patients. Ten years after establishing the international action plan, the International Conference on Radiation Protection in Medicine: Setting the Scene for the Next Decade was held in Bonn, Germany, in December 2012. the main outcome of this conference was the so called Bonn Call for Action that identifies then priority actions to enhance radiation protection in medicine for the next decade. The IAEA and WHO are currently working in close cooperation to foster and support the implementation of these ten priority actions in Member States, but their implementation requires collaboration of national governments, international agencies, researchers, educators, institutions and professional associations. (Author)

  20. Radiation protection and monitoring

    International Nuclear Information System (INIS)

    Thomas, P.

    1982-01-01

    The present paper deals with the following topics: - Radiological quantities and units - Principles of radiological protection - Limits of doses and activity uptake - Activity discharges and monitoring - Radiation exposure and its calculation - Environmental monitoring - Personnel dosimetry. (orig./RW)

  1. Pollinator Protection Strategic Plan

    Science.gov (United States)

    Developed by EPA, this ensures that pesticide risk assessments and risk management decisions use best available information and scientific methods, and full evaluation of pollinator protection when making registration decisions.

  2. Personal Protective Equipment

    National Research Council Canada - National Science Library

    1998-01-01

    ... of personal protective equipment A safety program for new employees is a necessary part of any orientation program An on-going safety program should be used to motivate employees to continue to use...

  3. Power system protection

    International Nuclear Information System (INIS)

    Venkata, S.S.; Damborg, M.J.; Jampala, A.K.

    1991-01-01

    Power systems of the 21st century will be more modern, and complex, utilizing the latest available technologies. At the same time, generating plants will have to operate with minimal spinning margins and energy transportation has to take place at critical levels due to environmental and economical constraints. These factors dictate that the power systems be protected with optimum sensitivity, selectivity and time of operation to assure maximum reliability, and security at minimal cost. With an increasing role played by digital computers in every aspect of protection, it is important to take a critical and fresh look at the art and science of relaying and protection. The main objective of this paper is to review the past, present and future of power system protection from a software point of view

  4. Radiation Protection Group

    CERN Document Server

    2006-01-01

    The Radioactive Waste Section of the Radiation Protection Group wishes to inform you that the Radioactive Waste Treatment Centre will be closed on the afternoon of Tuesday 19 December 2006. Thank-you for your understanding.

  5. Asbestos: Protect Your Family

    Science.gov (United States)

    ... Related Topics: Asbestos Contact Us Share Protect Your Family How to Identify Materials That May Contain Asbestos ... Improper removal may actually increase your and your family’s exposure to asbestos fibers. Top of Page Asbestos ...

  6. Software for radiation protection

    International Nuclear Information System (INIS)

    Graffunder, H.

    2002-01-01

    The software products presented are universally usable programs for radiation protection. The systems were designed in order to establish a comprehensive database specific to radiation protection and, on this basis, model in programs subjects of radiation protection. Development initially focused on the creation of the database. Each software product was to access the same nuclide-specific data; input errors and differences in spelling were to be excluded from the outset. This makes the products more compatible with each other and able to exchange data among each other. The software products are modular in design. Functions recurring in radiation protection are always treated the same way in different programs, and also represented the same way on the program surface. The recognition effect makes it easy for users to familiarize with the products quickly. All software products are written in German and are tailored to the administrative needs and codes and regulations in Germany and in Switzerland. (orig.) [de

  7. Radiation protection standards

    International Nuclear Information System (INIS)

    Fitch, J.

    1983-11-01

    Topics covered include biological radiation effects, radiation protection principles, recommendations of the ICRP and the National Health and Medical Research Council, and dose limits for individuals, particularly the limit applied to the inhalation of radon daughters

  8. Tritium protective clothing

    Energy Technology Data Exchange (ETDEWEB)

    Fuller, T. P.; Easterly, C. E.

    1979-06-01

    Occupational exposures to radiation from tritium received at present nuclear facilities and potential exposures at future fusion reactor facilities demonstrate the need for improved protective clothing. Important areas relating to increased protection factors of tritium protective ventilation suits are discussed. These areas include permeation processes of tritium through materials, various tests of film permeability, selection and availability of suit materials, suit designs, and administrative procedures. The phenomenological nature of film permeability calls for more standardized and universal test methods, which would increase the amount of directly useful information on impermeable materials. Improvements in suit designs could be expedited and better communicated to the health physics community by centralizing devlopmental equipment, manpower, and expertise in the field of tritium protection to one or two authoritative institutions.

  9. Expeditionary Warfare- Force Protection

    National Research Council Canada - National Science Library

    Higgins, Eric

    2004-01-01

    In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study...

  10. Protected Objects in Java

    DEFF Research Database (Denmark)

    Løvengreen, Hans Henrik; Schwarzer, Jens Christian

    1998-01-01

    We present an implementation of Ada 95's notion of protected objects in Java. The implementation comprises a class library supporting entry queues and a (pre-) compiler translating slightly decorated Java classes to pure Java classes utilizing the library.......We present an implementation of Ada 95's notion of protected objects in Java. The implementation comprises a class library supporting entry queues and a (pre-) compiler translating slightly decorated Java classes to pure Java classes utilizing the library....

  11. Radiation protection housing

    Energy Technology Data Exchange (ETDEWEB)

    Maier, A

    1975-04-10

    The radiation protection housing consists of a foot rim with castor swivel wheels, a tubular frame tapering off at the top, and a crown. In the upper part of the tubular frame a lead glass window is permanently installed. The sides are covered with radiation attenuating curtains of leaded rubber. The housing has the shape of a truncated pyramid which can be dismantled into its constituent parts. It is used for protection from radiation encountered in X-ray facilities in dental radiology.

  12. Advanced worker protection system

    International Nuclear Information System (INIS)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-01-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D ampersand D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D ampersand D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D ampersand D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project will result in the development of an Advanced Worker Protection System (AWPS). The AWPS will be built around a life support backpack that uses liquid air to provide cooling as well as breathing gas to the worker. The backpack will be combined with advanced protective garments, advanced liquid cooling garment, respirator, communications, and support equipment to provide improved worker protection, simplified system maintenance, and dramatically improve worker productivity through longer duration work cycles. Phase I of the project has resulted in a full scale prototype Advanced Worker Protection Ensemble (AWPE, everything the worker will wear), with sub-scale support equipment, suitable for integrated testing and preliminary evaluation. Phase II will culminate in a full scale, certified, pre-production AWPS and a site demonstration

  13. Radiation protection forum

    International Nuclear Information System (INIS)

    Cabral, W.

    2010-01-01

    The National Director of the Nuclear Regulatory Authority and Radiation Protection of Uruguay in the first forum for radiation protection set out the following themes: activity of regulatory body, radiation safety, physical security, safeguards, legal framework, committed substantive program, use of radiation, risks and benefits, major sources of radiation, the national regulatory framework, national inventory of sources, inspections, licensing, import and export of sources control , radioactive transport, materials safety, agreements, information and teaching, radiological emergencies and prompt response.

  14. Manual of Radiation Protection

    International Nuclear Information System (INIS)

    Gambini, D.J.; Granier, R.; Boisserie, G.

    1992-01-01

    This manual explains the principles and practice of radiation protection for those whose work in research, in the field of medicine or in the industry requires the use of radiation sources. It provides the information radiation users need to protect themselves and others and to understand and comply with international recommendations, regulations and legislation regarding the use of radionuclides and radiation machines. It is designed to teach a wide audience of doctors, biologists, research scientists, technicians, engineers, students and others

  15. Radiation protection instrument 1993

    International Nuclear Information System (INIS)

    1993-04-01

    The Radiation Protection Instrument, 1993 (Legislative Instrument 1559) prescribes the powers and functions of the Radiation Protection Board established under the Ghana Atomic Energy Commission by the Atomic Energy Commission (Amendment) Law, 1993 (P.N.D.C. Law 308). Also included in the Legislative Instrument are schedules on control and use of ionising radiation and radiation sources as well as procedures for notification, licensing and inspection of ionising radiation facilities. (EAA)

  16. Laser radiation protection

    International Nuclear Information System (INIS)

    Pantelic, D.; Muric, B.; Vasiljevic, D.

    2011-01-01

    We have presented the effects of laser radiation on human organism, with special emphasize on eye as the most sensitive organ. It was pointed-out that there are many parameters that should be taken into account when determining the level of protection from laser light. In that respect it is important to be aware of international standards that regulate this area. In addition, we have described a new material which efficiently protects human eye, by formation of microlens and carbonization. [sr

  17. Radiation protection philosophy alters

    International Nuclear Information System (INIS)

    Firmin, G.

    1977-01-01

    Two significant events that have taken place this year in the field of radiation protection are reported. New SI units have been proposed (and effectively adopted), and the ICRP has revised its recommendations. Changes of emphasis in the latest recommendations (ICRP Publication 26) imply an altered radiation protection philosophy, in particular the relation of dose limits to estimates of average risk, an altered view of the critical organ approach and a new attitude to genetic dose to the population. (author)

  18. Advanced worker protection system

    Energy Technology Data Exchange (ETDEWEB)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-12-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D&D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D&D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D&D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project will result in the development of an Advanced Worker Protection System (AWPS). The AWPS will be built around a life support backpack that uses liquid air to provide cooling as well as breathing gas to the worker. The backpack will be combined with advanced protective garments, advanced liquid cooling garment, respirator, communications, and support equipment to provide improved worker protection, simplified system maintenance, and dramatically improve worker productivity through longer duration work cycles. Phase I of the project has resulted in a full scale prototype Advanced Worker Protection Ensemble (AWPE, everything the worker will wear), with sub-scale support equipment, suitable for integrated testing and preliminary evaluation. Phase II will culminate in a full scale, certified, pre-production AWPS and a site demonstration.

  19. Protection Coordination in Electrical Substation Part-2 Unit Protections (Differential and Distance Protection)

    OpenAIRE

    TÜR, Mehmet Rida; Shobole, Abdulfetah; Baysal, Mustafa; Wadi, Mohammed

    2018-01-01

    Power systemsmust be protected against faults to ensure quality and reliable generation,transmission and distribution of power systems. Power system protection is providedby the protection relays. This paper is the second part of the ProtectionCoordination study for the Siddik Kardesler Substation. The protection fortransmission lines, transformer, bus bars and customer feeders is provided byovercurrent protection, differential and distance protection schemes. In thispaper, issues related wit...

  20. Protection of Levees against Beavers

    Science.gov (United States)

    Kozłowski, Wojciech; Balawejder, Adam

    2017-10-01

    Beavers are a protected species, so the levees must be properly protected so as not to harm the beavers and protect the levees from the destruction caused by these animals. This protection requires the use of bentonite mats as shaft seals, and wire mesh. Recently, such new protection structures began to be used successfully.

  1. Advanced worker protection system

    Energy Technology Data Exchange (ETDEWEB)

    Caldwell, B.; Duncan, P.; Myers, J. [Oceaneering Space Systems, Houston, TX (United States)

    1995-10-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D&D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D&D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D&D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project describes the development of an Advanced Worker Protection System (AWPS) which will include a life-support backpack with liquid air for cooling and as a supply of breathing gas, protective clothing, respirators, communications, and support equipment.

  2. Advanced worker protection system

    International Nuclear Information System (INIS)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-01-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D ampersand D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D ampersand D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D ampersand D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project describes the development of an Advanced Worker Protection System (AWPS) which will include a life-support backpack with liquid air for cooling and as a supply of breathing gas, protective clothing, respirators, communications, and support equipment

  3. Concepts in radiation protection

    International Nuclear Information System (INIS)

    Oncescu, M.

    1996-01-01

    This monograph provides basic notions and principles in dosimetry and radiation protection in compliance with two fundamental works: IAEA Safety Series No.115 - International Basic Safety Standards for Protection against Ionizing Radiation and for the Safety of Radiation Sources - and Publication no. 60 of International Commission on Radiological Protection. After the review of quantities and units necessary in radiation protection, the book presents the new values of dose limits as well as the values of 'radiation weighting factor', 'tissue weighting factor' and 'conversion factor intake-dose' (committed effective dose per unit intake) by ingestion and inhalation for 30 most important radionuclides. The new values of dose limits, lower than the old values, are a challenge for the radiation protection, especially of the 'public' where the dose limit diminished by a factor of five relative to the earlier edition. The new value of dose limit for public, 1 mSv per year (obviously over the natural exposure of 2.4 mSv per year), imposes new action ways and levels in radiation protection, especially in some cases of exacerbated natural radioactivity. The book provides the calculus of external exposure with the Gamma constant expressed in adequate units, to make the calculation easier. In the calculus of protection shield for gamma sources one uses a method, which while approximate helps save time. The calculus of internal exposure is made using the conversion factor intake-dose. Finally, the 'dosimetric watch' of the natural and artificial radioactivity of the atmosphere, hydrosphere and biosphere is intended to comply with the International Basic Safety Standards. Each chapter ends with a set of illustrative problems which enhances the reader's understanding of underlying concepts and current methods used in the field

  4. ETHIOPIAN WITNESS PROTECTION SYSTEM: COMPARATIVE ...

    African Journals Online (AJOL)

    witness protection involves social cohesion of the protected person. Scholars ..... interests' need to balance an accused right to know and confront prosecution ..... was reduced to 2.5 years through the fast tracking of witness protection cases.

  5. Radiation protection optimization of workers

    International Nuclear Information System (INIS)

    Lochard, J.

    1994-11-01

    This report presents the contribution of CEPN (study center on protection evaluation in nuclear area) to the Days of the French Radiation Protection Society (SFRP) on optimization of workers radiation protection in electronuclear, industrial and medical areas

  6. Anticorrosion protection of uranium

    Energy Technology Data Exchange (ETDEWEB)

    Goncharov, Ivan D.; Kazakovskaya, Tatiana; Tukmakov, Victor; Shapovalov, Vyacheslav [Russian Federal Nuclear Center-VNIIEF, 37, Mira Ave., RU-607190 Sarov (Nizhnii Gorod), 010450 (Russian Federation)

    2004-07-01

    Uranium in atmospheric conditions is non-stable. Sloughing products are being generated on its surface during storage or use. These corrosion products make many difficulties because of necessity to provide personnel safety. Besides, uranium corrosion may cause damage in parts. The first works devoted to uranium corrosion were performed in the framework of the USA Manhattan Project in the early forties of last century. Various methods of uranium protection were investigated, among them the galvanic one was the most studied. Later on the galvanic technology was patented. The works on this problem remains urgent up to the present time. In Russia, many methods of uranium corrosion protection, mainly against atmospheric corrosion, were tried on. In particular, such methods as diffusion zinc and paint coating were investigated. In the first case, a complex intermetallic U-Zn compound was formed but its protection was not reliable enough, this protection system was inconvenient and uncertain and that is why an additional paint coating was necessary. In the case of paint coatings another problem appeared. It was necessary to find such a coating where gas-permeability would prevail over water-permeability. Otherwise significant uranium corrosion occurs. This circumstance together with low mechanical resistance of paint coatings does not allow to use paint coating for long-term protection of uranium. Currently, there are following methods of uranium protection: ion-plasma, galvanic and thermo-vacuum annealing. These are described in this paper. In the end the issue of corrosion protection in reactor core zones is addressed. Here the greatest difficulties are caused when enriched uranium heated up to 500 deg. C needs anticorrosion protection. In this case various metal coatings are not reliable because of brittle inter-metallide formation. The reliable protection may be provided only up to the temperature plus 400 - 500 deg. C with the help of galvanic copper coating since

  7. Anticorrosion protection of uranium

    International Nuclear Information System (INIS)

    Goncharov, Ivan D.; Kazakovskaya, Tatiana; Tukmakov, Victor; Shapovalov, Vyacheslav

    2004-01-01

    Uranium in atmospheric conditions is non-stable. Sloughing products are being generated on its surface during storage or use. These corrosion products make many difficulties because of necessity to provide personnel safety. Besides, uranium corrosion may cause damage in parts. The first works devoted to uranium corrosion were performed in the framework of the USA Manhattan Project in the early forties of last century. Various methods of uranium protection were investigated, among them the galvanic one was the most studied. Later on the galvanic technology was patented. The works on this problem remains urgent up to the present time. In Russia, many methods of uranium corrosion protection, mainly against atmospheric corrosion, were tried on. In particular, such methods as diffusion zinc and paint coating were investigated. In the first case, a complex intermetallic U-Zn compound was formed but its protection was not reliable enough, this protection system was inconvenient and uncertain and that is why an additional paint coating was necessary. In the case of paint coatings another problem appeared. It was necessary to find such a coating where gas-permeability would prevail over water-permeability. Otherwise significant uranium corrosion occurs. This circumstance together with low mechanical resistance of paint coatings does not allow to use paint coating for long-term protection of uranium. Currently, there are following methods of uranium protection: ion-plasma, galvanic and thermo-vacuum annealing. These are described in this paper. In the end the issue of corrosion protection in reactor core zones is addressed. Here the greatest difficulties are caused when enriched uranium heated up to 500 deg. C needs anticorrosion protection. In this case various metal coatings are not reliable because of brittle inter-metallide formation. The reliable protection may be provided only up to the temperature plus 400 - 500 deg. C with the help of galvanic copper coating since

  8. Special protective concretes

    International Nuclear Information System (INIS)

    Bouniol, P.

    2001-01-01

    Concrete is the most convenient material when large-scale radiation protection is needed. Thus, special concretes for nuclear purposes are used in various facilities like reactors, reprocessing centers, storage sites, accelerators, hospitals with nuclear medicine equipment, food ionization centers etc.. The recent advances made in civil engineering for the improvement of concrete durability and compactness are for a large part transposable to protection concretes. This article presents the basic knowledge about protection concretes with the associated typological and technological aspects. A large part is devoted to the intrinsic properties of concretes and to their behaviour in irradiation and temperature conditions: 1 - definition and field of application of special protective concretes; 2 - evolution of concepts and technologies (durability of structures, techniques of formulation, new additives, market evolution); 3 - design of protective structures (preliminary study, radiation characteristics, thermal constraints, damping and dimensioning, mechanical criteria); 4 - formulation of special concretes (general principles, granulates, hydraulic binders, pulverulent additives, water/cement ratio, reference composition of some special concretes); 5 - properties of special concretes (damping and thermo-mechanical properties); 6 - induced-irradiation and temperature phenomena (activation, radiolysis, mineralogical transformations, drying, shrinking, creep, corrosion of reinforcement). (J.S.)

  9. Digital integrated protection system

    International Nuclear Information System (INIS)

    Savornin, M.; Furet, M.

    1978-01-01

    As a result of technological progress it is now possible to achieve more elaborate protection functions able to follow more closely the phenomena to be supervised. For this reason the CEA, Framatome and Merlin/Gerin/CERCI have undertaken in commonn to develop a Digital Integrated Protection System (D.I.P.S.). This system is designed with the following aims: to improve the safety of the station, . to improve its availability, . to facilitate installation, . to facilitate tests and maintenance. The main characteristics adopted are: . possibilities of obtaining more elaborate monitoring and protection algorithm treatments, . order 4 redundancy of transducers, associated instruments and signal processing, . possibility of inhibiting part of the protection system, . standardisation of equipment, physical and electrical separation of redundant units, . use of multiplexed connections, . automation of tests. Four flow charts are presented: - DIPS with four APUP (Acquisition and Processing Unit for Protection) - APUP - LSU (Logic Safeguard Unit), number LSU corresponding to number fluidic safeguard circuits, - structure of a function unit, - main functions of the APUP [fr

  10. System level ESD protection

    CERN Document Server

    Vashchenko, Vladislav

    2014-01-01

    This book addresses key aspects of analog integrated circuits and systems design related to system level electrostatic discharge (ESD) protection.  It is an invaluable reference for anyone developing systems-on-chip (SoC) and systems-on-package (SoP), integrated with system-level ESD protection. The book focuses on both the design of semiconductor integrated circuit (IC) components with embedded, on-chip system level protection and IC-system co-design. The readers will be enabled to bring the system level ESD protection solutions to the level of integrated circuits, thereby reducing or completely eliminating the need for additional, discrete components on the printed circuit board (PCB) and meeting system-level ESD requirements. The authors take a systematic approach, based on IC-system ESD protection co-design. A detailed description of the available IC-level ESD testing methods is provided, together with a discussion of the correlation between IC-level and system-level ESD testing methods. The IC-level ESD...

  11. Sports eyewear protective standards.

    Science.gov (United States)

    Dain, Stephen J

    2016-01-01

    Eye injuries sustained during sport comprise up to 20 per cent of all injuries to the eye serious enough for medical attention to be sought. The prevalence of eye injuries in sport is not easily assessed due to lack of authoritative participation rates, so most studies report total numbers in a time period. The evidence on the proportion of all ocular injuries that are from sport is reviewed. The relative frequencies in different sports are compared in a qualitative manner and the sports with greater numbers of ocular injuries are detailed. In common with occupational injuries to the eye, most sports eye injuries are considered preventable. The hierarchy of action for occupational risk is detailed and adapted to use in a sports scenario. All the available international, regional and national standards on sports eye protection are detailed and their provisions compared. The major function of the standards is to provide adequate protection against the hazard of the sport concerned. These are detailed and compared as a function of energy transfer. Eye protection must not introduce additional or secondary hazards (for instance, fracturing into sharp fragments on impact) and not introduce features that would deter the wearing of eye protection (for instance, restricting field of view to impede playing the sport). The provisions of the standards intended to limit secondary hazards are detailed and compared. The need for future work in standards writing and the activities of the International Standardization Organization in sports eye protection are detailed. © 2016 Optometry Australia.

  12. Instructed officers Radiation Protection

    International Nuclear Information System (INIS)

    2007-01-01

    This law contains instructions on the prevention of radiological and contains 4 articles Article I: describe the responsibilities of the institutions that operate within the scope of radiological protection in terms of the number of radiation protection officers and personal Supervisors who available in the practices radiation field. Article II: talking about the conditions of radiation protection officers that must be available in the main officers and working field in larg institutions and thecondition of specific requirements for large enterprises of work permits in the field of radiological work that issued by the Council. Article III: the functions and duties of officers in the prevention of radiological oversee the development of radiation protection programmes in the planning stages, construction and preparing the rules of local labour and what it lead of such tasks.Article IV: radiation protection officers powers: to modify and approve the programme of prevention and radiation safety at the company, stop any unsafe steps, amend the steps of the usage, operation of materials, devices and so on

  13. Characteristics of protective instrumentation

    International Nuclear Information System (INIS)

    Reichart, G.

    1982-01-01

    Protective Instrumentation (PI) for Nuclear Power Plants (NPP) is a general term for an highly reliable instrumentation, which provides information for keeping the system within safe limits, for initation of countermeasures in the case of an incident or for mitigation of consequences of an accident. In German NPPs one can find a hierarchical structure of protective instrumentation, wherein the Reactor Protection System (RPS) has the highest priority. To meet the reliability requirements different design principles are used, like - redundancy - diversity - fail safe - decoupling. The presentation gives an overview about the different design principles and characterizes their reliability aspects. As an example for the technical realization the RPS of a German NPP is discussed in some detail. Furthermore some information about other type of PI is given and reliability aspects of the interaction of operating personell with these systems are mentioned. (orig.)

  14. Radiation protecting clothing materials

    International Nuclear Information System (INIS)

    Mio, Kotaro; Ijiri, Yasuo.

    1986-01-01

    Purpose: To provide radiation protecting clothing materials excellent in mechanical strength, corrosion resistance, flexibility and flexing strength. Constitution: The radiation protecting clothing materials according to this invention has pure lead sheets comprising a thin pure lead foil of 50 to 150 μm and radiation resistant organic materials, for example, polyethylene with high neutron shielding effect disposed to one or both surfaces thereof. The material are excellent in the repeating bending fatigue and mechanical strength, corrosion resistance and flexibility and, accordingly, radiation protecting clothings prepared by using them along or laminating them also possess these excellent characteristics. Further, they are excellent in the handlability, particularly, durability to the repeated holding and extension, as well as are preferable in the physical movability and feeling upon putting. The clothing materials may be cut into an appropriate size, or stitched into clothings made by radiation-resistant materials. In this case, pure lead sheets are used in lamination. (Horiuchi, T.)

  15. Reactor protection system

    International Nuclear Information System (INIS)

    Fairbrother, D.B.; Lesniak, L.M.; Orgera, E.G.

    1977-10-01

    The report describes the reactor protection system (RPS-II) designed for use on Babcock and Wilcox 145-, later 177-, and 205-fuel assembly pressurized water reactors. In this system, relays in the trip logic have been replaced by solid state devices. A calculating module for the low DNBR, pump status, and offset trip functions has replaced the overpower trip (based on flow and imbalance), the power/RC pump trip, and the variable low-pressure trip. Included is a description of the changes from the present Oconee-type reactor protection system (RPS-I), a functional and hardware description of the calculating module, a description of the software programmed in the calculating module, and a discussion of the qualification program conducted to ensure that the degree of protection provided by RPS-II is not less than that provided by previously licensed systems supplied by B and W

  16. Protective and preventative measures

    International Nuclear Information System (INIS)

    Freedman, P. N

    2002-01-01

    Health care workers who come in contact with blood and other body fluids in their working environment risk being exposed to blood borne diseases such as human immunodeficiency virus (HIV), hepatitis B and C. An anti-hepatitis B vaccine is available as well as hepatitis B immunoglobulin but no vaccine is available against hepatitis C and HIV. The best way to protect against exposure to blood and body fluids is to use 'Universal Precautions' which encourage safe working methods. If an exposure does take place it should be regarded as an urgent medical problem and every facility should have a management policy to deal with this problem. The source patient's rights must also be protected. The preventative and protective measures available to health care workers as well as practical suggestions to carry out in the event of an exposure are discussed (Au)

  17. Smart Machine Protection System

    International Nuclear Information System (INIS)

    Clark, S.; Nelson, D.; Grillo, A.; Spencer, N.; Hutchinson, D.; Olsen, J.; Millsom, D.; White, G.; Gromme, T.; Allison, S.; Underwood, K.; Zelazny, M.; Kang, H.

    1991-11-01

    A Machine Protection System implemented on the SLC automatically controls the beam repetition rates in the accelerator so that radiation or temperature faults slow the repetition rate to bring the fault within tolerance without shutting down the machine. This process allows the accelerator to aid in the fault diagnostic process, and the protection system automatically restores the beams back to normal rates when the fault is diagnosed and corrected. The user interface includes facilities to monitor the performance of the system, and track rate limits, faults, and recoveries. There is an edit facility to define the devices to be included in the protection system, along with their set points, limits, and trip points. This set point and limit data is downloaded into the CAMAC modules, and the configuration data is compiled into a logical decision tree for the 68030 processor. 3 figs

  18. Advanced Worker Protection System

    International Nuclear Information System (INIS)

    1996-04-01

    The Advanced Worker Protection System (AWPS) is a liquid-air-based, self-contained breathing and cooling system with a duration of 2 hrs. AWPS employs a patented system developed by Oceaneering Space Systems (OSS), and was demonstrated at their facility in Houston, TX as well as at Kansas State University, Manhattan. The heart of the system is the life-support backpack that uses liquid air to provide cooling as well as breathing gas to the worker. The backpack is combined with advanced protective garments, an advanced liquid cooling garment (LCG), a respirator, and communications and support equipment. The prototype unit development and testing under Phase 1 has demonstrated that AWPS has the ability to meet performance criteria. These criteria were developed with an understanding of both the AWPS capabilities and the DOE decontamination and decommissioning (D and D) activities protection needs

  19. The protection of possession

    Directory of Open Access Journals (Sweden)

    Popov Danica

    2011-01-01

    Full Text Available Protection in disputes for the protection of possession can be attained through the following actions a for dispossession (interdictum recuperande possessionis and b with an action for the disturbance of possession (interdictum retinendae possessionis. The general feature of these disputes is that there is only discussion on the facts and not a legal matters. Subject matter jurisdiction for the resolution of such disputes belongs to the court of general jurisdiction, while the dispute itself is a litigation. The special rule of proceedings of action for disturbance are: provisionality of the protection of possession; urgency in proceedings; initiation of the proceedings; limiting of objection; prescribing temporary measures; rendering a ruling in the form of order; appeals which may be filed within a short deadline and which does not have suspensive effect (do not delay the execution of the order; revision is not allowed etc.

  20. Preventive Radiation Protection Act

    International Nuclear Information System (INIS)

    Roewer, H.

    1988-01-01

    The commentary is intended to contribute to protection of the population by a practice-oriented discussion and explanation of questions arising in connection with the Preventive Radiation Protection Act. Leaving aside discussions about abandonment of nuclear power, or criticism from any legal point of view, the commentary adopts the practical approach that accepts, and tries to help implementing, the act as it is. It is a guide for readers who are not experts in the law and gives a line of orientation by means of explanations and sometimes by citations from other acts (in footnotes). The commentary also presents the EURATOM Directive No. 3954/87 dated 22 December 1987, the EC Directive No. 3955/87 dated 22 December 1987, and the EC Directive No. 1983/88 dated 5 July 1988. A tabular survey shows the system of duties and competences defined by the Preventive Radiation Protection Act. (RST) [de

  1. Education in Radiation Protection

    International Nuclear Information System (INIS)

    Dodig, D.; Kasal, B.; Tezak, S.; Poropat, M.; Kubelka, D.

    2001-01-01

    Full text: This paper discussed the problem of the education in radiation protection. All aspects of education are included started with primary school and lasted with very specialised courses for the experts. In the last few years the lack of interest for education in radiation protection was recognised by many agencies included also IAEA and EU commission. In this paper the reasons for this situation will be presented and the way how to promote this subject again. It is not possible to prevent effects of radiation on environment and population if qualified and well educated experts do not exist. The situation in the field of education in radiation protection in Croatia will be presented, according to the new regulations in this field. (author)

  2. Smart machine protection system

    International Nuclear Information System (INIS)

    Clark, S.; Nelson, D.; Grillo, A.

    1992-01-01

    A Machine Protection System implemented on the SLC automatically controls the beam repetition rates in the accelerator so that radiation or temperature faults slow the repetition rate to bring the fault within tolerance without shutting down the machine. This process allows the accelerators to aid in the fault diagnostic process, and the protection system automatically restores the beams back to normal rates when the fault is diagnosed and corrected. The user interface includes facilities to monitor the performance of the system, and track rate limits, faults, and recoveries. There is an edit facility to define the devices to be included in the protection system, along with their set points, limits, and trip points. This set point and limit data is downloaded into the CAMAC modules, and the configuration data is complied into a logical decision tree for the 68030 processor. (author)

  3. New radiation protection law

    International Nuclear Information System (INIS)

    1985-01-01

    The structure of the existing legislation and its contents and aims are reconsidered. New rules which correspond to the present situation are to be established. Also the fundamental principles of the task and methods of radiation protection are to be changed. The main effort will be to create conditions so that all human beings will be protected against the harmful effects of radiation. The effects on plants, animals and on the environment should be considered as well. The legislation should include both ionizing and non-ionizing radiation. The main responsibility of protection should stay with the central authority. Licensing of apparatus, liability for medical applications and radioactive waste is discussed. Granting of permissions and control should be accomplished by the authority. Cooperation with other national and international authorities is dealt with. (G.B.)

  4. Radiation protection - Revision of French radiation protection regulations (1988)

    International Nuclear Information System (INIS)

    Mayoux, J.C.

    1989-01-01

    This article analyses the recent amendments to the 1966 and 1975 Decrees on general radiation protection principles and radiation protection of workers in large nuclear installations respectively and also describes national radiation protection law. In particular, the amendments incorporate the revised EURATOM basic radiation protection standards and the new international units (sievert and becquerel replace rem and curie) in the Decrees. (NEA) [fr

  5. Radiation protection in the field of environmental protection

    International Nuclear Information System (INIS)

    Zhao Yamin

    2003-01-01

    The relationship of radiation protection with environmental protection, the sources that may give rise to the environmental radiation contamination, and the system of radiation protection and the fundamental principles and requirements for radiation environmental management are introduced. Some special radiation protection problems faced with in the radiation environmental management are discussed. (author)

  6. Radiation protection in hospitals

    International Nuclear Information System (INIS)

    MOuld, R.F.

    1985-01-01

    A book on radiation protection in hospitals has been written to cater for readers with different backgrounds, training and needs by providing an elementary radiation physics text in Part I and an advanced, comprehensive Part II relating to specific medical applications of X-rays and of radioactivity. Part I includes information on basic radiation physics, radiation risk, radiation absorption and attenuation, radiation measurement, radiation shielding and classification of radiation workers. Part II includes information on radiation protection in external beam radiotherapy, interstitial source radiotherapy, intracavitary radiotherapy, radioactive iodine-131 radiotherapy, nuclear medicine diagnostics and diagnostic radiology. (U.K.)

  7. Radiation protection in space

    Energy Technology Data Exchange (ETDEWEB)

    Blakely, E.A. [Lawrence Berkeley Lab., CA (United States); Fry, R.J.M. [Oak Ridge National Lab., TN (United States)

    1995-02-01

    The challenge for planning radiation protection in space is to estimate the risk of events of low probability after low levels of irradiation. This work has revealed many gaps in the present state of knowledge that require further study. Despite investigations of several irradiated populations, the atomic-bomb survivors remain the primary basis for estimating the risk of ionizing radiation. Compared to previous estimates, two new independent evaluations of available information indicate a significantly greater risk of stochastic effects of radiation (cancer and genetic effects) by about a factor of three for radiation workers. This paper presents a brief historical perspective of the international effort to assure radiation protection in space.

  8. Protection from space radiation

    International Nuclear Information System (INIS)

    Tripathi, R.K.; Wilson, J.W.; Shinn, J.L.

    2000-01-01

    The exposures anticipated for astronauts in the anticipated human exploration and development of space will be significantly higher (both annual and carrier) than for any other occupational group. In addition, the exposures in deep space result largely from galactic cosmic rays for which there is as yet little experience. Some evidence exists indicating that conventional linear energy transfer defined protection quantities (quality factors) may not be appropriate. The authors evaluate their current understanding of radiation protection with laboratory and flight experimental data and discuss recent improvements in interaction models and transport methods

  9. Commercial Aircraft Protection

    Energy Technology Data Exchange (ETDEWEB)

    Ehst, David A. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2016-10-26

    This report summarizes the results of theoretical research performed during 3 years of P371 Project implementation. In results of such research a new scientific conceptual technology of quasi-passive individual infrared protection of heat-generating objects – Spatial Displacement of Thermal Image (SDTI technology) was developed. Theoretical substantiation and description of working processes of civil aircraft individual IR-protection system were conducted. The mathematical models and methodology were presented, there were obtained the analytical dependencies which allow performing theoretical research of the affect of intentionally arranged dynamic field of the artificial thermal interferences with variable contrast onto main parameters of optic-electronic tracking and homing systems.

  10. Radiation Protection Dosimetry

    International Nuclear Information System (INIS)

    Kramer, H.M.; Schnuer, K.

    1992-01-01

    The contributions presented during the seminar provided clear evidence that radiation protection of the patient plays an increasingly important role for manufacturers of radiological equipment and for regulatory bodies, as well as for radiologists, doctors and assistants. The proceedings of this seminar reflect the activities and work in the field of radiation protection of the patient and initiate further action in order to harmonize dosimetric measurements and calculations, to ameliorate education and training, to improve the technical standards of the equipment and to give a push to a more effective use of ionising radiation in the medical sector

  11. Environmental protection implementation plan

    International Nuclear Information System (INIS)

    Holland, R.C.

    1998-03-01

    This Environmental Protection Implementation Plan is intended to ensure that the environmental program objectives of Department of Energy Order 5400.1 are achieved at SNL/California. This document states SNL/California's commitment to conduct its operations in an environmentally safe and responsible manner. The Environmental Protection Implementation Plan helps management and staff comply with applicable environmental responsibilities. SNL is committed to operating in full compliance with the letter and spirit of applicable environmental laws, regulations, and standards. Furthermore, SNL/California strives to go beyond compliance with legal requirements by making every effort practical to reduce impacts to the environment to levels as low as reasonably achievable

  12. Material for radioactive protection

    Science.gov (United States)

    Taylor, R.S.; Boyer, N.W.

    A boron containing burn resistant, low-level radiation protection material useful, for example, as a liner for radioactive waste disposal and storage, a component for neutron absorber, and a shield for a neutron source is described. The material is basically composed of borax in the range of 25 to 50%, coal tar in the range of 25 to 37.5%, with the remainder being an epoxy resin mix. A preferred composition is 50% borax, 25% coal tar and 25% epoxy resin. The material is not susceptible to burning and is about 1/5 the cost of existing radiation protection material utilized in similar applications.

  13. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  14. Radiation protection in space

    International Nuclear Information System (INIS)

    Blakely, E.A.; Fry, R.J.M.

    1995-01-01

    The challenge for planning radiation protection in space is to estimate the risk of events of low probability after low levels of irradiation. This work has revealed many gaps in the present state of knowledge that require further study. Despite investigations of several irradiated populations, the atomic-bomb survivors remain the primary basis for estimating the risk of ionizing radiation. Compared to previous estimates, two new independent evaluations of available information indicate a significantly greater risk of stochastic effects of radiation (cancer and genetic effects) by about a factor of three for radiation workers. This paper presents a brief historical perspective of the international effort to assure radiation protection in space

  15. Radiation protection in education

    International Nuclear Information System (INIS)

    Viragh, Elemer

    1985-01-01

    The education of secondary school students in the fields of nuclear sciences was strictly limited according to the 9th recommendations of the ICRP issued in 1966 saying that people under age 18 are not allowed to deal with ionizing radiations. Due to the changes concerning the concept of radiation protection, new opportunities for teaching nuclear technology even in the secondary schools were opened. The 36th recommendations of the ICRP published in 1983 dealing with the maximum permissible doses and the measures taken for radiation protection should be kept in mind while organizing the education of the pupils between age 16 and 18. (V.N.)

  16. Radiation Protection Proclamation

    International Nuclear Information System (INIS)

    1993-01-01

    A proclamation of the Government of Ethiopia, cited as the radiation protection proclamation number 79/1993 was prepared with the objective to establish a national radiation protection authority that formulates policies, controls and supervises activities involving all sources of radiation and lay down laws governing such activities in order to ensure public safety against associated hazards while allowing radiation related activities to be carried out for the benefit of the public . The Authority is guided by an inter-ministerial board and is accountable to the Ethiopian Science and Technology Commission

  17. Radiation protection glossary

    International Nuclear Information System (INIS)

    1986-01-01

    The glossary is intended to be used as a terminology standard for IAEA documentation on radiation protection. An effort has been made to use definitions contained in internationally accepted publications such as recommendations of the International Commission on Radiological Protection (ICRP), standards of the International Organization for Standardization (ISO) and of the International Electrotechnical Commission (IEC), reports of the International Commission on Radiation Units and Measurements (ICRU), with only slight modifications in order to tailor them more closely to IAEA needs. The glossary is restricted to ionizing radiation

  18. Programme Biology - Health protection

    International Nuclear Information System (INIS)

    1975-01-01

    The scientific results for 1975, of the five-year Biology-Health Protection programme adopted in 1971, are presented in two volumes. In volume one, Research in Radiation Protection are developed exclusively, including the following topics: measurement and interpretation of radiation (dosimetry); transfer of radioactive nuclides in the constituents of the environment; hereditary effects of radiation; short-term effects (acute irradiation syndrome and its treatment); long-term effects and toxicology of radioactive elements. In volume, two Research on applications in Agriculture and Medicine are developed. It includes: mutagenesis; soil-plant relations; radiation analysis; food conservation; cell culture; radioentomology. Research on applications in Medicine include: Nuclear Medicine and Neutron Dosimetry

  19. Painting for protection

    International Nuclear Information System (INIS)

    Stepto, G.G.C.

    1981-01-01

    Despite the use of special alloys, paint is still the most economical and practical method of protecting steel. Chlorinated rubber resin based paint systems are shown to be satisfactory in areas requiring decontamination as well as for outside exposed areas of nuclear power plants. (author)

  20. Radiation protection glossary

    International Nuclear Information System (INIS)

    Othman, Ibrahim; Abdul-Rahim, Maha

    1989-12-01

    This glossary contains the arabic equivalent of all the terms included in the IAEA Safety Series No.76 (which is a selected basic terms used in IAEA publications), thus this glossary contains English, French, Spanish, Russian, and Arabic. It is intended to facilitate the work of arabic speaking scientists involved in the field of radiation protection

  1. Radiation protection to firemen

    International Nuclear Information System (INIS)

    Almeida, E.S. de.

    1985-01-01

    The basic Knowledge about ionizing radiation oriented for firemen, are presented. The mainly damage and effects caused by radiation exposure as well as the method of radiation protection are described in simple words. The action to be taken in case of fire involving radiation such as vehicles transporting radioactive materials are emphasized. (author)

  2. Marine Mammal Protection Act

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Marine Mammal Protection Act (MMPA or Act) prohibits, with certain exceptions, the "take" of marine mammals in U.S. waters and by U.S. citizens on the high seas,...

  3. Depth protection system

    International Nuclear Information System (INIS)

    Arita, Setsuo; Izumi, Shigeru; Suzuki, Satoru; Noguchi, Atomi.

    1988-01-01

    Purpose: To previously set a nuclear reactor toward safety side by the reactor scram if an emergency core cooling system is failed to operate. Constitution If abnormality occurs in an emergency core cooling system or an aqueous boric acid injection system, a reactor protection system is operated and, if the reactor protection system shows an abnormal state, a control rod withdrawal inhibition system is operated as a fundamental way. For instance, when the driving power source voltage for the emergency core cooling system is detected and, if it is lower than a predetermined value, the reactor protection system is operated. Alternatively, if the voltage goes lower than the predetermined value, the control rod withdrawal is inhibited. In addition, stopping for the feedwater system is inhibited. Further, integrity of the driving means for the emergency core cooling system is positively checked and the protection function is operated depending on the result of check. Since the nuclear reactor can be set toward the safety side even if the voltage for the driving power source of the aqueous boric acid injection system is lower than a predetermined value, the reactor safety can further be improved. (Horiuchi, T.)

  4. Radiation Protection in Guatemala

    International Nuclear Information System (INIS)

    Carazo, N.

    1979-01-01

    The tasks connected with radiation protection are allocated to the National Institute for Nuclear Energy in Guatemala. Regulatory measures are further needed to identify the responsibilities of various authorities to ensure that all radiation workers are provided with personal dosemeters. (author)

  5. Protectiveness, Persecution, and Powerlessness

    Science.gov (United States)

    Weeks, Kathleen G.

    1977-01-01

    This paper is an investigation of family pathology from a transactional viewpoint. The thesis proposed is that family pathology is a means of protecting the family and ensuring its survival. The father, mother, and child assume and exchange the roles of the Karpman drama triangle; namely, Persecutor, Victim, and Rescuer. (Author)

  6. Beyond Pain and Protection

    DEFF Research Database (Denmark)

    Lee, Jieun

    2007-01-01

    discourse on homosexual youth in Korea, protection discourse and pain discourse, the notion of identity itself will be critically examined and the girls' agency in destabilizing heteronormativity will be discussed. This study also deals with the appropriation of popular culture by the girls, suggesting...

  7. Applied Crop Protection 2017

    DEFF Research Database (Denmark)

    Jørgensen, Lise Nistrup; Nielsen, Bent Jørgen; Mathiassen, Solvejg Kopp

    Linket til højre henviser til rapporten i trykt format til download. This publication contains results from crop protection trials which were carried out at the Department of Agroecology within the area of gricultural crops. Most of the results come from field trials, but results from greenhouse...

  8. Maternity Protection at Work.

    Science.gov (United States)

    World of Work, 1998

    1998-01-01

    Discusses the need for maternity benefits for working women. Suggests that although most countries provide paid maternity leave by law, there is a gap between that law and practice. Includes a chart depicting maternity protection (length of leave, cash benefits, who pays) around the world. (JOW)

  9. Radiation protection in Switzerland

    International Nuclear Information System (INIS)

    Brunner, H.

    1990-01-01

    Switzerland's present radiation protection regulations are based on only two paragraphs of the atomic law but have been very successful in practice. A new radiation protection law, separated from nuclear legislation and valid for all application of ionizing radiation and radioctive materials, was proposed and drafted by the Federal Commission on Radiation Protection and has now been accepted by parliament with only minor modifications. The draft of the revised regulations which also will cover all applications, should be ready for consultations next year. Both the law (which contains principles but no figures such as limits) and the regulations incorporate the latest state of ICRP recommendations and are formulated in such a way as to allow application of or quick adaptation to the new basic ICRP recommendation expected for 1991. The legislation is flexible, with a relatively low regulation density and leaves sufficient room for professional judgement on a case by case basis both for authorities and for the specialists responsible for radiation protection in practice. (orig./HSCH)

  10. Inflation Protected Investment Strategies

    Directory of Open Access Journals (Sweden)

    Mirco Mahlstedt

    2016-03-01

    Full Text Available In this paper, a dynamic inflation-protected investment strategy is presented, which is based on traditional asset classes and Markov-switching models. Different stock market, as well as inflation regimes are identified, and within those regimes, the inflation hedging potential of stocks, bonds, real estate, commodities and gold are investigated. Within each regime, we determine optimal investment portfolios driven by the investment idea of protection from losses due to changing inflation if inflation is rising or high, but decoupling the performance from inflation if inflation is low. The results clearly indicate that these asset classes behave differently in different stock market and inflation regimes. Whereas in the long-run, we agree with the general opinion in the literature that stocks and bonds are a suitable hedge against inflation, we observe for short time horizons that the hedging potential of each asset class, especially of real estate and commodities, depend strongly on the state of the current market environment. Thus, our approach provides a possible explanation for different statements in the literature regarding the inflation hedging properties of these asset classes. A dynamic inflation-protected investment strategy is developed, which combines inflation protection and upside potential. This strategy outperforms standard buy-and-hold strategies, as well as the well-known 1 N -portfolio.

  11. Applied Crop Protection 2017

    DEFF Research Database (Denmark)

    Jørgensen, Lise Nistrup; Nielsen, Bent Jørgen; Mathiassen, Solvejg Kopp

    Linket til højre henviser til rapporten i trykt format til download. This publication contains results from crop protection trials which were carried out at the Department of Agroecology within the area of gricultural crops. Most of the results come from field trials, but results from greenhouse ...

  12. Applied crop protection 2016

    DEFF Research Database (Denmark)

    Jørgensen, Lise Nistrup; Nielsen, Bent Jørgen; Jensen, Peter Kryger

    This publication contains results from crop protection trials which were carried out at the Department of Agroecology within the area of agricultural crops. Most of the results come from field trials, but results from greenhouse and semi-field trials are also included. The report contains results...

  13. Consumer Protection for Educators.

    Science.gov (United States)

    Wallace, James M.

    Educational changes are examined from the perspective of consumer protection--the direct consumers are the teachers being prepared; the indirect consumers are the students and the society that supports the schools. During the colonial and early national periods of American history, there was an absence of formal and separate teacher education.…

  14. Armored garment for protecting

    Science.gov (United States)

    Purvis, James W [Albuquerque, NM; Jones, II, Jack F.; Whinery, Larry D [Albuquerque, NM; Brazfield, Richard [Albuquerque, NM; Lawrie, Catherine [Tijeras, NM; Lawrie, David [Tijeras, NM; Preece, Dale S [Watkins, CO

    2009-08-11

    A lightweight, armored protective garment for protecting an arm or leg from blast superheated gases, blast overpressure shock, shrapnel, and spall from a explosive device, such as a Rocket Propelled Grenade (RPG) or a roadside Improvised Explosive Device (IED). The garment has a ballistic sleeve made of a ballistic fabric, such as an aramid fiber (e.g., KEVLAR.RTM.) cloth, that prevents thermal burns from the blast superheated gases, while providing some protection from fragments. Additionally, the garment has two or more rigid armor inserts that cover the upper and lower arm and protect against high-velocity projectiles, shrapnel and spall. The rigid inserts can be made of multiple plies of a carbon/epoxy composite laminate. The combination of 6 layers of KEVLAR.RTM. fabric and 28 plies of carbon/epoxy laminate inserts (with the inserts being sandwiched in-between the KEVLAR.RTM. layers), can meet the level IIIA fragmentation minimum V.sub.50 requirements for the US Interceptor Outer Tactical Vest.

  15. Environmental radiation protection standards

    International Nuclear Information System (INIS)

    Richings, L.D.G.; Morley, F.; Kelley, G.N.

    1978-04-01

    The principles involved in the setting of radiological protection standards are reviewed, and the differences in procedures used by various countries in implementing them are outlined. Standards are taken here to mean the specific numerical limits relating to radiation doses to people or to amounts of radioactive material released into the environment. (author)

  16. Solar collector overheating protection

    NARCIS (Netherlands)

    Slaman, M.J.; Griessen, R.P.

    Prismatic structures in a thermal solar collector are used as overheating protection. Such structures reflect incoming light efficiently back whenever less thermal power is extracted from the solar collector. Maximum thermal power is generated when the prismatic structure is surrounded by a

  17. Radiation protection textbook

    International Nuclear Information System (INIS)

    Gambini, D.J.; Granier, R.

    2007-01-01

    This textbook of radiation protection presents the scientific bases, legal and statutory measures and technical means of implementation of the radioprotection in the medical and industrial sectors, research and nuclear installations. It collects the practical information (organization, analysis of post, prevention, evaluation and risks management, the controls, the training and the information) usually scattered and the theoretical knowledge allowing every person using ionizing radiation: To analyze jobs in controlled areas, to watch the respect for the current regulations, to participate in the training and in the information of the staffs exposed to intervene in accidental situation. This third edition is widely updated and enriched by the most recent scientific and legal data concerning, notably, the human exposure, the dosimetry, the optimization of the radiation protection and the epidemiological inquiries. The contents is as follows: physics of ionizing radiation, ionizing radiation: origin and interaction with matter, dosimetry and protection against ionizing radiation, detection and measurement of ionizing radiation, radiobiology, legal measures relative to radiation protection, human exposure of natural origin, human exposure of artificial origin, medical, dental and veterinarian radiology, radiotherapy, utilization of unsealed sources in medicine and research, electronuclear industry, non nuclear industrial and aeronautical activities exposing to ionizing radiation, accidental exposures. (N.C.)

  18. Towards data protection compliance

    NARCIS (Netherlands)

    Zannone, N.; Petkovic, M.; Etalle, S.

    2010-01-01

    Privacy and data protection are fundamental issues nowadays for every organization. This paper calls for the development of methods, techniques and infrastructure to allow the deployment of privacy-aware IT systems, in which humans are integral part of the organizational processes and accountable

  19. Towards Data Protection Compliance

    NARCIS (Netherlands)

    Zannone, Nicola; Petkovic, M.; Etalle, Sandro

    2010-01-01

    Privacy and data protection are fundamental issues nowadays for every organization. This paper calls for the development of methods, techniques and infrastructure to allow the deployment of privacy-aware IT systems, in which humans are integral part of the organizational processes and accountable

  20. ISO radiation protection standards

    International Nuclear Information System (INIS)

    Becker, K.; West, N.

    1981-01-01

    After a brief description of the International Organization for Standardization (ISO) and its Technical Committee (TC) 85 ''Nuclear Energy'', the work of its Sub-Committee (SC) 2 ''Radiation Protection'' is described in some detail. Several international standards on subjects closely related to radiation protection have already been published, for example ISO-361 (Basic radiation protection symbol), ISO-1757 (Photographic dosimeters), ISO-1758 and 1759 (Direct and indirect-reading pocket exposure meters), ISO-2889 (Sampling of airborne radioactive materials), ISO-4037 (X and gamma reference radiations for calibration) and ISO-4071 (Testing of exposure meters and dosimeters). TC 85/SC 2 has currently eight active Working Groups (WG) dealing with 14 standards projects, mostly in advanced stages, in such fields as neutron and beta reference radiations, and X and gamma radiations of high and low dose-rates and high energies for calibration purposes, reference radiations for surface contamination apparatus, ejection systems for gamma radiography apparatus, industrial and laboratory irradiators, lead shielding units, protective clothing, thermoluminescence dosemeters, radioelement gauges, and surface contamination and decontamination. (author)

  1. Radiation protection in Qatar

    International Nuclear Information System (INIS)

    Al Maadheed, Khalid; Al Khatibeh, Ahmad

    2008-01-01

    Full text: The State of Qatar has become a member State of IAEA since 1974. Later the Department of Industrial Development (DID) beam the focal point and the competent authority regarding all aspects of the peaceful application of Nuclear Technology. In July, 2000 the Supreme Council was established and charged with all matters related to environmental protection. The Supreme Council joined the IAEA Projects on upgrading protection infrastructure in West Asia region. A preliminary research was initiated to discover where radiation sources are being used, and the legal framework, if any, to regulate their use. The research indicated that radiation sources were being used in the industrial practices (well logging, industrial radiography and nuclear gauges) and in medical practices (mainly diagnostic radiology). The research also indicated that there was virtually no legal framework to regulate them. In less than five years, the State of Qatar was able to issue the radiation protection law, three sets of regulations, namely: Radiation Protection Regulations, Radioactive Waste Management Regulations and the Safe Transport of Radioactive Materials Regulations. In addition, several specific regulation work, dose limits and radiation protection officers were issued. A radiation Protection Department, comprising three sections was established. We are providing individual exposure monitoring for most of the radiation workers in the public sector and some in the private sector. We have set up a proper licensing and inspections procedures, where our inspectors are enforcing the law. More recently, we established an early warning network for nuclear of radiological emergencies, consisting of 6 transplantable stations, five mobile stations and two navigating stations. This year, the network was augmented with five fixed station and an advanced early warning centre, which provides early warning via multiple means (MMS, Fax, E-mail and audio alarms). Last year we signed a nuclear

  2. Foundations for radiation protection

    International Nuclear Information System (INIS)

    2006-01-01

    Full text; In 1996, the IAEA published the latest edition of the International Basic Safety Standards for Protection Against Ionizing Radiation and for the Safety of Radiation Sources (Basic Safety Standards or BSS) comprising basic requirements to be filled in all activities involving radiation exposure. The standards define internationally harmonized requirements and provide practical guidance for public authorities and services, employers and workers, specialized radiation protection bodies, enterprises and health and safety communities. In the same year, the IAEA, through the technical cooperation programme, launched the Model Project on Upgrading Radiation Protection Infrastructure, a global initiative designed to help Member States establish the infrastructure needed to adhere to the BSS. To address the complexity of this task, the radiation protection team identified key elements, known as Thematic Safety Areas. These are: 1. Legislative Framework and Regulatory Infrastructure, Draft and put into effect radiation protection laws and regulations and establish and empower a national regulatory authority. 2. Occupational Exposure Control Protect the health and safety of each individual who faces the risk of radiation exposure in the workplace through individual and workplace monitoring programmes, including dose assessment, record keeping of doses and quality management. 3. Medical Exposure Control: Develop procedures and activities to control the exposure of patients undergoing diagnosis and/or treatment via diagnostic and interventional radiology, nuclear medicine or radiotherapy through staff training, provision of basic quality control equipment, and the establishment of quality assurance programmes. 4. Public and Environmental Exposure Control: Develop means to protect both the public and the environment including: a) programmes to register, inventory and provide safe storage of unused radioactive sources and material; b) procedures to control and safely

  3. Principles of Radiation Protection Concepts

    International Nuclear Information System (INIS)

    Abd Aziz Mhd Ramli

    2004-01-01

    The contents of this chapter are follows - Radiation Protection Concepts: justification, dose limitation, optimisation, potential exposures, situation requiring intervention; Special Considerations. Protection from Radiation Hazards, Remove the Hazard, Prevent the Hazard, Guard the Worker, Implementation of Radiation Protection and Safety Measures, Distance, Shielding, Time, Monitoring Programme, Safety System. Radiation Protection in Radiological Service: Specific Requirement in Diagnostic Radiological Service

  4. BGS Radon Protective Measures GIS

    International Nuclear Information System (INIS)

    Appleton, D.; Adlam, K.

    2000-01-01

    The British Geological Survey Radon Protective Measures Geographical Information System is described. The following issues are highlighted: Identification of development sites where radon protection is required in new dwellings; Mapping radon potential on the basis of house radon and geology; Radon Protective Measures GIS; Radon site reports; and Follow-up radon protective measures sire reports

  5. Protection of HTS magnets

    International Nuclear Information System (INIS)

    Iwasa, Yukikazu

    2005-01-01

    The paper discusses protection issues for HTS magnet. For protection, the HTS magnet must rely on an active technique. Closed-form expressions of the matrix metal operating current density based on overheating and internal voltage criteria for protection, under very simplifying assumptions, are presented. Perhaps the most important conclusions of these criteria are that: (1) HTS (and LTS) magnets must be wound with composite conductor having a significant portion of its overall cross section occupied by normal metal generally of high electrical conductivity and (2) HTS windings must possess 'high' NZP velocities to make the resistive zone occupy as large a fraction of the winding volume as possible. The paper also derives an analytical expression, under another set of simplifying assumptions, to determine the minimum resistive voltage level, dictated by the maximum hot-spot temperature set at 150 K, required to initiate an active protection process. Remarkably, this minimum detection voltage is nearly independent of the matrix metal current density, I op /A m . For a set of operating parameters used in a numerical example, a computed minimum detection voltage, at I op /A m = 5 x 10 4 A/cm 2 , is ∼30 mV, which, considering it must be discerned in the presence of extraneous voltage signals likely to be present in real world operating conditions, would be non-trivial. To satisfy the overheating criterion at a level of I op /A m , which keeps the winding overall current density 'viable' and at the same time to raise the minimum detection resistive voltage, the winding volume occupied by the resistive state must be expanded. The paper concludes with discussion of challenging new areas of research for protection of HTS magnets

  6. Enhancing radiation protection

    International Nuclear Information System (INIS)

    2006-01-01

    When a new radiotherapy center in Gezira, Sudan, delivers its first therapeutic dose to a cancer patient, two things happen: A young man begins to regain his health and looks forward to being better able to support his family and contribute to his community; and a developing nation realizes an important step toward deriving the social and economic benefits of nuclear science. The strategic application of nuclear technology in particular fields- human health, industry, food and agriculture, energy, water resources and environmental protection - has enormous potential to help shape the future of developing countries. But past radiological incidents, several of which involved high levels of exposure or death (Bolivia, Brazil, Cost Rica, Georgia, Ghana, Morocco, Panama and Thailand), underscore the inherent and very serious risks. For this reason, the IAEA's Departments of Technical Cooperation and Nuclear Safety and Security partner closely, particularly in the area of radiation protection. They strive to consider every minute detail in the equation that brings together radiation sources, modern technologies, people and the environment. Launched in 1996, the Model Project on Upgrading Radiation Protection Infrastructure (the Model Project) aimed to help Member States: achieve capacities that underpin the safe and secure application of nuclear technologies; establish a legislative framework and regulatory infrastructure; develop exposure control mechanisms to protect workers, medical patients, the public and the environment; and achieve preparedness and planned response to radiological emergencies. In fact, the hospital scenario above typically marks several years of intense collaboration amongst scientists, legislators, regulators, politicians and administrators from both Member States and the IAEA, orchestrated and aided by regional managers and technical experts from the IAEA. As radiation protection team members can attest, every application of nuclear technology

  7. Focus radiation protection; Schwerpunkt Strahlenschutz

    Energy Technology Data Exchange (ETDEWEB)

    Ebermann, Lutz (comp.)

    2016-07-01

    The publication of the Bundesamt fuer Strahlenschutz on radiation protection covers the following issues: (i) exposure from natural sources: health hazard due to radon, radiation protection in residential homes, radon in Germany, natural raw materials in industrial processes; (ii) clearance of radioactive wastes: clearance in the frame of nuclear power plant dismantling, the situation in Germany and Europe; (iii) emergency management: principles of radiation protection, fictive sequence of accident events; (iiii) other actual radiation protection topics: more limits - more protection? radiation protection in medicine, occupational radiation protection.

  8. The impact of fear, secrecy, and stigma on parental disclosure of HIV status to children: a qualitative exploration with HIV positive parents attending an ART clinic in South Africa.

    Science.gov (United States)

    Madiba, Sphiwe

    2012-11-28

    South Africa is one of the sub Saharan countries where considerable progress in providing antiretroviral treatment (ART) has been made. The increased access to ART contributes to improvements in the prognosis of HIV and parents are more likely to raise their children than ever before. The study examined the social context influencing disclosure of parental HIV status to children from the perspectives of fathers and mothers accessing ART from an academic hospital in South Africa. Three focus group interviews were conducted with 26 non-disclosed biological parents of children aged between 7 and 18 years. Their ages ranged between 20-60 years and they cared for a total of 60 children. Parental decision not to disclose their HIV status to children was influenced by the fear of death and dying, the influence of television and media, stigma and discrimination. Parents delayed disclosure of their HIV status to children because children believed that AIDS kills. Parents also feared that the child may not be able to keep the parent's HIV status secret and might result in the family being subjected to stigma, discrimination, and isolation. Fear of stigma and discrimination were also responsible for the continuous efforts by parents to protect their HIV status from their children, family and neighbour's. Parents also delayed disclosure to children because they lacked disclosure skills and needed support for disclosure from health care providers. Healthcare providers are in a unique position to provide such support and guidance and assist parents to disclose and children to cope with parental HIV infection.

  9. Digital protection in power plants. Electrical unit and line protection. Digital protection systems for NPP

    International Nuclear Information System (INIS)

    Kaczmarek, A.

    2000-01-01

    In this presentation author deals with the digital protection systems for nuclear power plants. The evolution of protection devices, protection concept for power plants, concept of functional redundancy, references for digital protection, benefits for the customer well as concept fault recorder are presented. (author)

  10. A randomized efficacy trial of a cognitive-behavioral group intervention to prevent Internet Use Disorder onset in adolescents: The PROTECT study protocol.

    Science.gov (United States)

    Lindenberg, Katajun; Halasy, Katharina; Schoenmaekers, Sophie

    2017-06-01

    The reduction of prevalence rates of Internet Use Disorder (IUD) and its effective treatment are at high priority in both public health and educational policies. School-based preventive interventions facilitate a low-threshold approach for individuals with IUD, who are typically characterized by high therapy avoidance. Moreover, indicated approaches which target adolescents at high-risk show larger effects than universal prevention programs. Simultaneously, they reduce unnecessary burden for the majority of high-school students that is not at-risk. The PROTECT group intervention for indicated prevention of IUD in school settings was developed based on these preventive strategies. Three-hundred and forty adolescents, aged 12-18 years, from 40 secondary schools in Germany, screened for high-risk of IUD onset, are randomly assigned to a) PROTECT preventive intervention group or b) assessment only control group. The tested intervention consists of a cognitive-behavioral 4-session brief-protocol. Follow-up assessments are at 1, 4 and 12 months after admission. Primary outcome is the 12-months incidence rate of IUD. Secondary outcomes are the reduction of IUD and comorbid symptoms as well as the promotion of problem solving, cognitive restructuring and emotion regulation skills. The indicated preventive intervention PROTECT follows the APA-guidelines for psychological prevention, i.e., it is theory- and evidence-based and addresses both risk-reduction and strength-promotion, it considers current research and epidemiology and ethical standards such as professional secrecy and is designed as a systemic intervention at the school-level. It is expected that the intervention decreases risk of IUD onset (incidence rate). ClinicalTrials.gov: NCT02907658.

  11. Temporary physical protection systems

    International Nuclear Information System (INIS)

    Williams, J.D.; Gangel, D.J.; Madsen, R.W.

    1991-01-01

    Terrorism and other aspects of world political instability have created a high demand for temporary physical protection systems within the nuclear materials management community. They can be used when vehicles carrying important assets are away from their permanent fixed site location, around areas where experiments are being temporarily conducted, around construction areas and one portions of a fixed site physical security system which is temporarily inoperable. Physical security systems can be grouped into four categories: tactical, portable, semi-permanent, and fixed. The resources and experience gained at Sandia National Laboratories in over forty years of developing and implementing security systems for protecting nuclear weapons and fixed nuclear facilities is now being applied to temporary physical security systems. This paper emphasizes temporary physical security systems and their component parts that are presently available and identify additional system-subsystem objectives, requirements, and concepts

  12. Radiation protection manual

    International Nuclear Information System (INIS)

    Spang, A.

    1983-01-01

    According to the Radiation Protection Ordinance, radiation protection experts directing or supervising the handling of radioactive materials must have expert knowledge. The concept of expert knowledge has been clearly defined by the Fachverband e.V. in a catalogue of instruction goals. The manual follows the principles of this catalogue; it presents the expert knowledge required in a total of 15 subject groups. There is an index which helps the reader to find his specific subject group and the knowledge required of him in this subject group. However, the manual gives only an outline of the subject matter in many instances and should therefore not be regarded as a textbook in the proper sense. (orig./HP) [de

  13. Radiation Protection. Chapter 24

    Energy Technology Data Exchange (ETDEWEB)

    Sutton, D. [Ninewells Hospital, Dundee (United Kingdom); Collins, L. T. [Westmead Hospital, Sydney (Australia); Le Heron, J. [International Atomic Energy Agency, Vienna (Austria)

    2014-09-15

    Chapter 21, in describing basic radiation biology and radiation effects, demonstrates the need to have a system of radiation protection that allows the many beneficial uses of radiation to be realized while ensuring detrimental radiation effects are either prevented or minimized. This can be achieved with the twin objectives of preventing the occurrence of deterministic effects and of limiting the probability of stochastic effects to a level that is considered acceptable. In a radiology facility, consideration needs to be given to the patient, the staff involved in performing the radiological procedures, members of the public and other staff that may be in the radiology facility, carers and comforters of patients undergoing procedures, and persons who may be undergoing a radiological procedure as part of a biomedical research project. This chapter discusses how the objectives given above are fulfilled through a system of radiation protection and how such a system should be applied practically in a radiology facility.

  14. EMP protection technology interchange

    International Nuclear Information System (INIS)

    Martin, L.C.

    1977-01-01

    Investigation and assessment of the potential degrading and destructive effects associated with the nuclear electromagnetic (EMP) phenomena has created a large technological base. This base is indeed quite broad owing to the unique and system-pervasive character of the EMP. One of the aims of an emerging discipline, such as that associated with EMP, is to provide for adequate transfer and integration of the developing technology into the overall engineering community. The needs of the community and how EMP hardening and protection information can be transferred or exchanged are reviewed. Many of the current and generally available sources of information are listed, examples of interchange methods are provided, and problems of developing specifications, standards, and suitable guidelines for design and incorporation of protection are also discussed

  15. Lectures on radiation protection

    International Nuclear Information System (INIS)

    Wachsmann, F.; Consentius, K.

    1981-01-01

    All important subjects of radiation protection are presented in concise form; the explanations may serve as lecture manuscripts. The lectures are divided into 16 to 19 teaching units. Each teaching unit is supplemented by a slide to be projected on a screen while the text is read. This method of visual teaching has already been tried with good results in medicine and medical engineering. Pictures of the slides are given in the text so that the book may also be used for self-studies. The main facts are summarized at the end of each lesson. The finished book will consist of 8 lessons; the first three of these discuss 1. Radiation effects and hazards 2. Dose definitions and units and their role in radiology and radiation protection 3. Dose limits and legal specifications. (orig.) [de

  16. Radiation protection zoning

    International Nuclear Information System (INIS)

    2015-01-01

    Radiation being not visible, the zoning of an area containing radioactive sources is important in terms of safety. Concerning radiation protection, 2 work zones are defined by regulations: the monitored zone and the controlled zone. The ministerial order of 15 may 2006 settles the frontier between the 2 zones in terms of radiation dose rates, the rules for access and the safety standards in both zones. Radioprotection rules and the name of the person responsible for radiation protection must be displayed. The frontier between the 2 zones must be materialized and marked with adequate equipment (specific danger signs and tapes). Both zones are submitted to selective entrance, the access for the controlled zone is limited because of the radiation risk and of the necessity of confining radioactive contamination while the limitation of the access to the monitored zone is due to radiation risk only. (A.C.)

  17. Superconducting coil protection

    International Nuclear Information System (INIS)

    Woods, E.L.

    1975-01-01

    The protection system is based on a two-phase construction program. Phase I is the development of a reliable hardwired relay control system with a digital loop utilizing firmware and a microprocessor controller. Phase II is an expansion of the digital loop to include many heretofore unmonitored coil variables. These new monitored variables will be utilized to establish early quench detection and to formulate confirmation techniques of the quench detection mechanism. Established quench detection methods are discussed and a new approach to quench detection is presented. The new circuit is insensitive to external pulsed magnetic fields and the associated induced voltages. Reliability aspects of the coil protection system are discussed with respect to shutdowns of superconducting coil systems. Redundance and digital system methods are presented as related topics

  18. Geoconservation and protected areas

    OpenAIRE

    Brilha, J. B.

    2002-01-01

    Conservation will fail if nature conservation policies impose artificial boundaries on the natural world. The protected area manager’s main task is biodiversity preservation. Nevertheless, nature conservation requires a broad perspective. Incorporating geology into conservation policies at the same level as biology is urgent. The slow rate of many geological processes leads to the misconception that geological resources are inexhaustible and immutable. Geologists know that this is not true an...

  19. Fundamentals of radiological protection

    International Nuclear Information System (INIS)

    Wells, J.; Mill, A.J.; Charles, M.W.

    1978-05-01

    The basic processes of living cells which are relevant to an understanding of the interaction of ionizing radiation with man are described. Particular reference is made to cell death, cancer induction and genetic effects. This is the second of a series of reports which present the fundamentals necessary for an understanding of the bases of regulatory criteria such as those recommended by the International Commision on Radiological Protection (ICRP). Others consider basic radiation physics and the biological effects of ionizing radiation. (author)

  20. Protective garment ventilation system

    Science.gov (United States)

    Lang, R. (Inventor)

    1970-01-01

    A method and apparatus for ventilating a protective garment, space suit system, and/or pressure suits to maintain a comfortable and nontoxic atmosphere within is described. The direction of flow of a ventilating and purging gas in portions of the garment may be reversed in order to compensate for changes in environment and activity of the wearer. The entire flow of the ventilating gas can also be directed first to the helmet associated with the garment.

  1. Extending Mondrian Memory Protection

    Science.gov (United States)

    2010-11-01

    a kernel semaphore is locked or unlocked. In addition, we extended the system call interface to receive notifications about user-land locking...operations (such as calls to the mutex and semaphore code provided by the C library). By patching the dynamically loadable GLibC5, we are able to test... semaphores , and spinlocks. RTO-MP-IST-091 10- 9 Extending Mondrian Memory Protection to loading extension plugins. This prevents any untrusted code

  2. Radiation protection and society

    International Nuclear Information System (INIS)

    Skryabin, A.M.

    1997-01-01

    The radiological protection of population, living on the contaminated territories, is actual 10 years after the Chernobyl accident. Eventually, the whole system of countermeasures application is aimed to protect society as a complex community of individuals . The variety of levels of society, i.e. family, settlement on the whole, can be considered as certain harmonic systems differing in their public consciousness levels and lifestyles, this explain the difference in their 'behaviour' in terms of radiation protection and attitude to the information obtained. Each level of society possesses a certain degree of liberty of choice, that finally influence the magnitude and the character of dose distribution within certain population groups. In general, the dose distribution in the settlement can be explained only on the bases of 'family' analysis. This concerns the rural settlement as a society too. All rural settlement can be divided into two or three classes: with low, high and intermediate social features. Small settlements (< 100 persons), where the advanced in age persons with low material income and high degree of natural economy are applied to the first class. This results in higher doses (2-3 fold), than in the settlements with higher social level. The analysis shows that in socially 'waning' settlements the countermeasures are less efficient and the term of their action is shorter. (this class is the largest, About 50% among all the rural settlements). Due to the deterioration of the economic situation in the Republic of Belarus after 1991-1992 resulted in the increase of doses mainly in the habitants first of all of this class of settlements. It seems problematic to increase countermeasures efficiency in this class of settlements without the refuse of the accustomed lifestyle and radical improvement of social-demographic and economic conditions. The present material shows the necessity of the differential approach based on 'society-analysis' in the

  3. Radiation protection for nurses

    Energy Technology Data Exchange (ETDEWEB)

    Mould, R F

    1978-01-01

    Various aspects of radiation protection relevant to nurses are presented. The different radioisotopes used in internal radiotherapy and scintiscanning techniques and any necessary precautions which should be observed when nursing these patients are described. General information is also given on nuclear and atomic terminology, the physical half-life of radioisotopes, radiation dose as a function of distance, shielding, film badges and the maximum permissible dose.

  4. Fundamentals of radiological protection

    International Nuclear Information System (INIS)

    Mill, A.J.; Charles, M.W.; Wells, J.

    1978-04-01

    A review is presented of basic radiation physics with particular relevance to radiological protection. The processes leading to the production and absorption of ionising radiation are outlined, and the important dosimetric quantities and their units of measurements. The review is the first of a series of reports presenting the fundamentals necessary for an understanding of the basis of regulatory criteria such as those recommended by the ICRP. (author)

  5. Critical infrastructure protection

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, F. [Canadian Electricity Association, Toronto, ON (Canada)

    2003-04-01

    The need to protect critical electrical infrastructure from terrorist attacks, or other physical damage, including weather related events, or the potential impact of computer viruses and other attacks on IT resources are discussed. Activities of the North American Electric Reliability Council (NERC) are highlighted which seek to safeguard the North American bulk electric power system principally through the Information Sharing and Analysis Sector (ES-ISAC). ES-ISAC serves the electricity sector by facilitating communication between electric sector participants, federal government and other critical infrastructure industries by disseminating threat indications, analyses and warnings, together with interpretations, to assist the industry in taking infrastructure protection actions. Attention is drawn to the numerous cyber incidents in recent years, which although resulted in no loss of service to electricity customers so far, in at least one instance (the January 25th SOL-Slammer worm incident) resulted in degradation of service in a number of sectors, including financial, transportation and telecommunication services. The increasing frequency of cyber-based attacks, coupled with the industry's growing dependence on e-commerce and electronic controls, are good reasons to believe that critical infrastructure protection (CIP) poses a serious challenge to the industry's risk management practices. The Canadian Electricity Association (CEA) is an active participant in ES-ISAC and works cooperatively with a range of partners, such as the Edison Electric Institute and the American Public Power Association to ensure coordination and effective protection program delivery for the electric power sector. The Early Warning System (EWS) developed by the CIP Working Group is one of the results of this cooperation. EWS uses the Internet, e-mail, web-enabled cell phones and Blackberry hand-held devices to deliver real-time threat information to members on a 24/7 basis. EWS

  6. Radiation Protection: Introduction

    International Nuclear Information System (INIS)

    Loos, M.

    2007-01-01

    As a federal research Centre, SCK-CEN has the statutory assignment to give priority to research related to safety, radioactive waste management, protection of man and environment, management of fissile and other strategic materials and social implications as part of the pursuit of sustainable development and to develop and gather the necessary knowledge and spread this knowledge through formation and communication. At the Division of Radiation Protection at SCK-CEN we are therefore active to maintain and enhance knowledge and expertise in each aspect of radiation protection: we study the risk of exposure - the way that radioactive materials spread in the environment and the potential for human contact - and the risk from exposure - how radiation affects human health; we perform health physics measurements; we are involved in emergency planning and preparedness and support to risk governance and decision taking. These activities are supported by radiation specific analysis and measurement techniques. These activities are not performed in isolation but in context of national and international collaborations or demands

  7. Precautionary radiation protection

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    The German federal government annually reports about the development of radioactivity in the environment, providing the most important data and changes in environmental radioactivity and radiation exposure. These reports are based on the Act on Precautionary Protection of the Public against Radiation Exposure (Radiation Protection Provisions Act) of December 19, 1986 as a consequence of the Chernobyl reactor accident. The purpose of the Act is protection of the public from health hazards arising from a nuclear accident or any other event with comparable radiological consequences, and to create the foundations for correct evaluation of the risks resulting from specific radiation exposures. After 1986, the Act was soon given concrete shape by legal ordinances, which made it a workable tool. The following points, among others, can be summarized form the report for 2004: - The calculated natural and manmade overall exposure is 4.0 mSv/a, as in the previous year, and happens to be exactly the same figure as in the report for 1994. - The contribution to radiation exposure by nuclear power plants and other nuclear facilities is less than 0.01 mSv/a. Over a period of nearly twenty years, the Act and the annual reporting regime have proved to work. Standardized criteria prevent data abuse and misinterpretation, respectively. Definitions of limits have contributed to more transparency and more objectivity. (orig.)

  8. Fire protection measures

    International Nuclear Information System (INIS)

    Bittner

    1997-01-01

    The presentation could only show a very brief overview of the analysis results of a wide study of the existing fire protection situation at Mochovce. As far not already done the next steps will be the selection of the final suppliers of the different measures, the detailed design and the implementation of the measures. As part of the further assistance in fire protection EUCOM will perform compliance checks of the DD and implementation and assist EMO for raising problems. Especially during the implementation of the measures the belonging quality checks have a high priority. Assuming that the implementation of measures will be in accordance with with the study results and the relevant basic design requirements it can be stated that safety level concerning fire protection will be in accordance with international requirement like IAEA 50 SG D2. The next step of our work will be the delta analysis for 2 unit and the relevant basic design as far as there are differences to unit 1. (author)

  9. Radiation protection: A correction

    International Nuclear Information System (INIS)

    1972-01-01

    An error in translation inadvertently distorted the sense of a paragraph in the article entitled 'Ecological Aspects of Radiation Protection', by Dr. P. Recht, which appeared in the Bulletin, Volume 14, No. 2 earlier this year. In the English text the error appears on Page 28, second paragraph, which reads, as published: 'An instance familiar to radiation protection specialists, which has since come to be regarded as a classic illustration of this approach, is the accidental release at the Windscale nuclear centre in the north of England.' In the French original of this text no reference was made, or intended, to the accidental release which took place in 1957; the reference was to the study of the critical population group exposed to routine releases from the centre, as the footnote made clear. A more correct translation of the relevant sentence reads: 'A classic example of this approach, well-known to radiation protection specialists, is that of releases from the Windscale nuclear centre, in the north of England.' A second error appeared in the footnote already referred to. In all languages, the critical population group studied in respect of the Windscale releases is named as that of Cornwall; the reference should be, of course, to that part of the population of Wales who eat laver bread. (author)

  10. Ceramic protective coating

    International Nuclear Information System (INIS)

    Harbach, F.; Nicoll, A.

    1987-01-01

    The basic material of the above-mentioned layer consists of pure aluminium oxide or essentially aluminium oxide. To improve this protective layer metal oxides from the groups IIA, IIIA, IIIB, VB, VIB, VIIB or VIII of the periodic system are added to its basic material before the said protective coating is applied. In this way a corundum structure is formed in the case of aluminium oxide. Gallium oxide, vanadium oxide, chromium oxide or iron oxide are particularly suited for the correlation of such a corundum structure. The formation of the corundum structure increases the resistance of the protective coating to the corrosive effects of vanadium pentoxide and sodium sulfate. By the addition of a specific quantity of magnesium oxide it is possible not only to stimulate the formation of corundum but also to reduce the increase in grain size in the case of the aluminium oxide. The other metallic oxides are especially favorable to the formation of the corundum structure, so that preferably magnesium oxide is to be added to these metallic oxides in order to reduce the increase in grain size. (author)

  11. Radiation protection and monitoring

    International Nuclear Information System (INIS)

    Bruecher, L.; Langmueller, G.; Tuerschmann, G.

    1997-01-01

    The safety, the quality and efficiency of the radiological monitoring systems for block one and two of the NPP Mochovce, designed and delivered by the general designer, should be increased by EUCOM Siemens. Modern, accident resistant and/or more powerful monitoring systems have been designed by Siemens will be added to the existing systems. To achieve this radiation measuring units will be installed inside the hermetic zone, in the reactor hall, at the stack, at the release water system and in the environment in the vicinity of the NPP. The presentation, the storage distribution and the processing of all measuring results also will be optimised by installing a modern high-performance computer system, the so-called Central Radiological Computer System 'CRCS', featuring a high availability. The components will be installed in the relevant control rooms all over the plant. With this computer system it is easy to control the radiation level inside and outside the NPP during normal operation and during and after an accident. Special programs, developed by Siemens support the staff by interpreting the consequences of radioactive releases into the environment and by initiating protection procedures during and after an accident. All functions of the system are available for emergency protection drills and training the staff interruption of the normal control procedure. For the personal protection a digital personal dosimetry system completely considering with the requirements of ICRP 60 and several contamination monitors will be installed. (authors)

  12. Indium 111. Radiation protection

    International Nuclear Information System (INIS)

    Grafstroem, G.; Joensson, B.A.; Strand, S.E.

    1989-01-01

    The radiopharmaceutucal 111 In-oxine is used in labelling of different blood cells and proteins. Due to its liquid state, there is always a risk for contamination during handling procedures. The aim of the project was to evaluate the contamination risks, when using this radiopharmaceutical. The investigation includes calculations of the absorved dose to the skin after a contamination of 111 In-oxine, including the radionuclide impurity 114 In m / 114 In. Investigations of 288 protection gloves shows that there is always a risk for contamination, when working with 111 In-oxine. On the protection gloves, we found activities normally ranging from a 100 Bq up to a few kBq. Noticeable is the contamination on the vials, already before their use. Besides 111 In we found most of the radionuclides used in nuclear medicine, with activities up to tens of kBq. The radionuclide impurity was cleary detectable but below the recommended value. The penetration of 111 In-oxine protection gloves of latex was negligible. Measurements of penetration in skin was evaluated with two independent methods; in vivo using a surface barrier detector, and by autoradiography. The measured penetration was less than a few micrometers. Calculation from the experimental contamination values show that the absorbed dose to the basal cell layer could be in order of several Gy. (authors)

  13. Principles of radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Karamourtzounis, J. N. [World Health Organization, Geneva (Switzerland)

    1969-05-15

    In the rapidly developing areas of occupational and public health devoted to the protection of people from both immediate and delayed harmful (and sometimes Irreversible) effects of radiation exposure, industrial hygienists, radiological physicists and radiologists must now assume the additional responsibility of protection against radiation. Everyone during his life will have had one or more X-rays taken for diagnostic purposes. The doses received, depending upon the site, are not harmful to the individual, from the genetic aspect, however, the increasing use of X-ray examinations does present a danger,since almost the whole population is involved. Rapid progress in the development of nuclear energy and the practical extension of its use in medicine, agriculture and industry are steadily increasing the potential danger of large groups of the population being exposed to radiation, and radiation hazards are becoming an important aspect of industrial and public hygiene. WHO is concerned with the overall evaluation of population exposure from peaceful uses of atomic energy and through medical practice, the evaluation of radiation risks,and the control of medical radiation exposure. WHO stimulates and provides technical assistance for the development of appropriate programs of radiation protection with respect to the agricultural, industrial and medical applications of radioisotopes. X-rays and radium. (author)

  14. German mires - Utilisation and protection

    International Nuclear Information System (INIS)

    Roderfeld, H.

    1996-01-01

    Mires in Germany are mainly used for agriculture. Peat mining is important regionally, but forest utilisation less so. Twenty years ago in the former West Germany, the first steps from peatland utilisation to peatland protection were taken. Bog protection programmes were developed first. Nowadays research directed to fen protection has begun, prompted by the decreasing importance of agriculture in Central Europe and an increasing environmental awareness. The situation regarding mire protection in Germany is presented for each Federal State individually. A rough estimate suggests 45 000 ha of protected bogs and 25 000 ha of protected fens. These areas include natural and semi-natural mires as well as rewetted mires. (30 refs.)

  15. Protection of industrial and business secrets in environmental protection law

    International Nuclear Information System (INIS)

    Breuer, R.

    1986-01-01

    The author investigates the relation between environmental protection and data protection, especially concerning the protection of industrial and business secrets. For this kind of conflict there are only general administrative and procedural provisions with little systematic order. Special provisions of data protection covering all aspects of industrial and business secrets, as for example in social or tax law, do not exist in German law until now. (WG) [de

  16. Philosophy of radiological protection and radiation hazard protection law

    International Nuclear Information System (INIS)

    Kai, Michiaki; Kawano, Takao

    2013-01-01

    The radiation protection and the human safety in radiation facilities are strictly controlled by law. There are rules on the radiation measurement, too. In the present review, philosophy of the radiological protection and the radiation hazard protection law is outlined with reference to ICRP recommendations. (J.P.N.)

  17. Jordan Lake Watershed Protection District

    Data.gov (United States)

    Town of Chapel Hill, North Carolina — Polygon representing the area of the Jordan Lake Watershed Protection District. The Watershed Protection District (PDF) is a sensitive area of land that drains to...

  18. Ship impact against protection islands

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup

    1997-01-01

    The five most exposed piers and the anchor blocks on the East Bridge shall be protected by aritificial islands. Extensive analytical and experimental investitations were carried out to verify the efficiency of how these protection works....

  19. Integrating protection into food aid

    Directory of Open Access Journals (Sweden)

    Mariangela Bizzarri

    2007-01-01

    Full Text Available The World Food Programme (WFP does not have a specific protection mandate but its activities are increasingly shaped by awareness of the need to protect women and girls from sexual and gender-based violence (SGBV.

  20. Radiological protection Program of CDTN

    International Nuclear Information System (INIS)

    1983-01-01

    Radiological protection program of CDTN, its purposes and rules, responsabilities, physical control, monitoring, personnel radiation protection, radiation sources and radioactive wastes control, emergency and accidents and siting are described. (C.M.) [pt

  1. Radiological protection in dentistry

    Energy Technology Data Exchange (ETDEWEB)

    Holliday, B

    1974-01-01

    Information that would allow an assessment of the standard of radiological protection in dentistry in the United Kingdom is sparse. The National Radiological Protection Board (previously the Radiological Protection Service) has provided a monitoring and advisory service to dentists for many years but very limited use has been made of this service. In a recent survey, 114 dentists were visited in representative practices in South East England and it was established that only 6.5% of dentists in general practice do not use radiography as an adjunct to their practice (Smith, 1969). In the 88 x-ray sets which were examined, 24% had less than the recommended thickness of aluminium filtration, while 25% had a fixed field size which was larger than necessary for dental radiography; in addition, 27% of the timers were found to have an error of greater than 20% in repetition of the pre-set exposure time. The exposure rate at the cone tip of a dental x-ray unit is generally in the range 1 to 4 R/s. A fault in the timer unit coupled with a failure on the part of the dentist to notice that x-rays are being generated (normally indicated by a red warning light) would rapidly lead to excessive exposure of the patient. Furthermore, a dentist continually holding films in the mouth of his patient would certainly incur a dose well in excess of the permissible hand dose, assuming anaverage work load for the x-ray equipment. Three case histories are given to illustrate the type of hazard that might arise from faulty equipment or bad operating technique.

  2. Training in radiological protection

    International Nuclear Information System (INIS)

    Medina G, E.

    2014-08-01

    In the Peru, according to the current regulations, people that work with ionizing radiations should have an authorization (individual license), which is granted by the Technical Office of the National Authority that is the technical body of the Instituto Peruano de Energia Nuclear (IPEN) manager of the control of ionizing radiations in the country. The individual license is obtained after the applicant fulfills the requested requirements, as having safety knowledge and radiological protection. Since its founding in 1972, the Centro Superior de Estudios Nucleares (CSEN) of the IPEN has carried out diverse training courses in order to that people can work in a safe way with ionizing radiations in medicine, industry and research, until the year 2013 have been organized 2231 courses that have allowed the training of 26213 people. The courses are organized according to the specific work that is carried out with radiations (medical radio-diagnostic, dental radiology, nuclear medicine, radiotherapy, industrial radiography, nuclear meters, logging while drilling, etc.). In their majority the courses are directed to people that will make use of radiations for first time, but refresher courses are also granted in the topic. The CSEN also carries out the Master degree programs highlighting the Second Professional Specialization in Radiological Protection carried out from the year 2004 with the support of the National University of Engineering. To the present has been carried out 2 programs and there is other being developed. In this work is shown the historical evolution of the radiological protection courses as well as the important thing that they are to work in a safe way in the country. (Author)

  3. Radiological Protection in Medicine

    International Nuclear Information System (INIS)

    Valetin, J.

    2011-01-01

    This report was prepared to underpin the Commission's 2007 Recommendations with regard to the medical exposure of patients, including their comforters and carers, and volunteers in biomedical research. It addresses the proper application of the fundamental principles (justification, optimisation of protection, and application of dose limits) of the Commission's 2007 Recommendations to these individuals. With regard to medical exposure of patients, it is not appropriate to apply dose limits or dose constraints, because such limits would often do more harm than good. Often, there are concurrent chronic, severe, or even life-threatening medical conditions that are more critical than the radiation exposure. The emphasis is then on justification of the medical procedures and on the optimisation of radiological protection. In diagnostic and interventional procedures, justification of procedures (for a defined purpose and for an individual patient), and management of the patient dose commensurate with the medical task, are the appropriate mechanisms to avoid unnecessary or unproductive radiation exposure. Equipment features that facilitate patient dose management, and diagnostic reference levels derived at the appropriate national, regional, or local level, are likely to be the most effective approaches. In radiation therapy, the avoidance of accidents is a predominant issue. With regard to comforters and carers, and volunteers in biomedical research, dose constraints are appropriate. Over the last decade, the Commission has published a number of documents that provided detailed advice related to radiological protection and safety in the medical applications of ionising radiation. Each of the publications addressed a specific topic defined by the type of radiation source and the medical discipline in which the source is applied, and was written with the intent of communicating directly with the relevant medical practitioners and supporting medical staff. This report

  4. Tornado protection by venting

    International Nuclear Information System (INIS)

    Cavanagh, C.A.

    1987-01-01

    The purpose of this paper is to demonstrate the ability to protect a modern nuclear power plant from the effects of a tornado by the use of a system of venting in all safety-related structures outside of the containment. The paper demonstrates this by presenting a method of analysis and of equipment selection that fully complies with the intent and the letter of applicable federal regulatory guides. A report of an actual tornado in the City of Kalamazoo, Michigan, suggests that the concept of sealing a plant during a tornado may not always be applicable

  5. Fundamentals of radiological protection

    International Nuclear Information System (INIS)

    Charles, M.W.; Wells, J.; Mill, A.J.

    1978-04-01

    A brief review is presented of the early and late effects of ionising radiation on man, with particular emphasis on those aspects of importance in radiological protection. The terminology and dose response curves, are explained. Early effects on cells, tissues and whole organs are discussed. Late somatic effects considered include cancer and life-span shortening. Genetic effects are examined. The review is the third of a series of reports which present the fundamentals necessary for an understanding of the basis of regulatory criteria, such as those of the ICRP. (u.K.)

  6. Nuclear accidents and protection

    International Nuclear Information System (INIS)

    Biocanin, R.; Amidzic, B.

    2005-01-01

    The numerous threats are our cruel reality. There is a great arsenal of nuclear weapons. Nuclear terrorism and nuclear accidents are always possible, especially during the transport and handling different nuclear material. Terrorist organisation also goes for coming into the possession of the nuclear means. Specific and important problem is human radioactive contamination in using nuclear energy for peaceful and military purpose. So, realisation of the universal and united system of NBCD gives us a possibility by using the modern communication equipment and very effective mobile units to react in a real time and successfully perform monitoring, alarming, protection and decontamination. (author) [sr

  7. Protective plasma envelope

    International Nuclear Information System (INIS)

    Bocharov, V.N.; Konstantinov, S.G.; Kudryavtsev, A.M.; Myskin, O.K.; Panasyuk, V.M.; Tsel'nik, F.A.

    1984-06-01

    A method of creating an annular plasma envelope used to protect the hot plasma from flows of impurities and gases from the walls of the vacuum chamber is described. The diameter of the envelope is 30 cm, the thickness of the wall is 1.5 cm, the length is 2.5 m, and its density is from 10 13 to 10 14 cm -3 . The envelope attenuates the incident (from outside) flow of helium 10-fold and the low of hydrogen 20-fold

  8. Radiation protection considerations

    CERN Document Server

    Adorisio, C; Urscheler, C; Vincke, H

    2015-01-01

    This chapter summarizes the legal Radiation Protection (RP) framework to be considered in the design of HiLumi LHC. It details design limits and constraints, dose objectives and explains how the As Low As Reasonably Achievable (ALARA) approach is formalized at CERN. Furthermore, features of the FLUKA Monte Carlo code are summarized that are of relevance for RP studies. Results of FLUKA simulations for residual dose rates during Long Shutdown 1 (LS1) are compared to measurements demonstrating good agreement and providing proof for the accuracy of FLUKA predictions for future shutdowns. Finally, an outlook for the residual dose rate evolution until LS3 is given.

  9. Radiation Protection Considerations

    Science.gov (United States)

    Adorisio, C.; Roesler, S.; Urscheler, C.; Vincke, H.

    This chapter summarizes the legal Radiation Protection (RP) framework to be considered in the design of HiLumi LHC. It details design limits and constraints, dose objectives and explains how the As Low As Reasonably Achievable (ALARA) approach is formalized at CERN. Furthermore, features of the FLUKA Monte Carlo code are summarized that are of relevance for RP studies. Results of FLUKA simulations for residual dose rates during Long Shutdown 1 (LS1) are compared to measurements demonstrating good agreement and providing proof for the accuracy of FLUKA predictions for future shutdowns. Finally, an outlook for the residual dose rate evolution until LS3 is given.

  10. Environmental protection at home

    International Nuclear Information System (INIS)

    Bramigk, D.; Bramigk, G.

    1989-12-01

    The primer for households clarifies in a popular scientific form, how environmental protection can be practised in the domestic family circle. It is pointed out to the fact in how for a first step to the reduction of water and energy consumption can be made through a critical self control. Important hinds are given for waste avoidance and waste reutilization. It can be achieved through information and deliberation that the environment conscious household keeps away from products and arises endangering the health and impacting the environment. (orig./BBR) [de

  11. Radiation protection - the employer

    International Nuclear Information System (INIS)

    Goldfinch, E.

    1983-01-01

    A brief report is given of a paper presented at the symposium on 'Radiation and the Worker - where do we go from here' in London 1983. The paper concerned the employers' viewpoint on the draft of the proposed Ionising Radiations Regulations in the Health and Safety Commission Consultative Document. It was concluded that there was already a very good standard of radiological protection in the UK and that any improvements could therefore only be fringe improvements, although the cost to the employer of introducing and implementing the new proposed Regulations was bound to be high. (U.K.)

  12. RHIC prefire protection masks

    International Nuclear Information System (INIS)

    Drees, A.; Biscardi, C.; Curcio, T.; Gassner, D.; DeSanto, L.; Fu, W.; Liaw, C. J.; Montag, C.; Thieberger, P.; Yip, K.

    2015-01-01

    The protection of the RHIC experimental detectors from damage due to beam hitting close upstream elements in cases of abort kicker prefires requires some dedicated precautionary measures with two general options: to bring the beam close to a limiting aperture (i.e. the beam pipe wall), as far upstream of the detector components as possible or, alternatively, to bring a limiting aperture close to the circulating beam. Spontaneous and random prefires of abort kicker modules (Pulse Forming Network, PFN) have a history as long as RHIC is being operated. The abort system consist of 5 kickers in per ring, each of them equipped with its own dedicated PFN.

  13. Epidemiology and Radiation Protection

    International Nuclear Information System (INIS)

    1987-01-01

    Epidemiology aims at providing direct evidence of the long term health effects in humans due to potentially dangerous exposures to various nuisance agents, including ionising radiation. Inappropriate interpretation and use of the results of epidemiological studies may result in inaccurate assessments of the risks associated with radiation exposure. This report presents the proceedings of a Workshop organised by the NEA to create an opportunity for epidemiologists and radiation protection specialists to exchange their experiences and views on the problems of methodology in epidemiological research and on the application of its results to the assessment of radiation risks

  14. Designing radiation protection signs

    International Nuclear Information System (INIS)

    Rodriguez, M.A.; Richey, C.L.

    1995-01-01

    Entry into hazardous areas without the proper protective equipment is extremely dangerous and must be prevented whenever possible. Current postings of radiological hazards at the Rocky Flats Environmental Technology Site (RFETS) do not incorporate recent findings concerning effective warning presentation. Warning information should be highly visible, quickly, and easily understood. While continuing to comply with industry standards (e.g., Department of Energy (DOE) guidelines), these findings can be incorporated into existing radiological sign design, making them more effective in terms of usability and compliance. Suggestions are provided for designing more effective postings within stated guidelines

  15. Australia's radiation protection standards

    International Nuclear Information System (INIS)

    1989-01-01

    In Australia, public exposure to ionizing radiation above background is considered to be negligible. Average occupational exposures are about 0.5 millisievert per year, although there are some specialized industries and professions where they are much higher. The National Health and Medical Research Council has therefore adopted a position similar to that of the International Commission on Radiological Protection. For the moment, no revision of exposure limits is recommended, but users are remined of their responsibility to ensure that exposures are kept low, particularly in those workplaces where significant exposures take place

  16. The principles of radiation protection

    International Nuclear Information System (INIS)

    2004-01-01

    The aim of radiation protection is to avoid or to reduce the risks linked to ionizing radiation. In order to reduce these risks, the radiation protection uses three great principles: justification, optimization and limitation of radiation doses. to apply these principles, the radiation protection has regulatory and technical means adapted to three different categories of people: public, patients and workers. The nuclear safety authority elaborates the regulation, and carries out monitoring of the reliable application of radiation protection system. (N.C.)

  17. GROUNDWATER PROTECTION MANAGEMENT PROGRAM DESCRIPTION.

    Energy Technology Data Exchange (ETDEWEB)

    PAQUETTE,D.E.; BENNETT,D.B.; DORSCH,W.R.; GOODE,G.A.; LEE,R.J.; KLAUS,K.; HOWE,R.F.; GEIGER,K.

    2002-05-31

    THE DEPARTMENT OF ENERGY ORDER 5400.1, GENERAL ENVIRONMENTAL PROTECTION PROGRAM, REQUIRES THE DEVELOPMENT AND IMPLEMENTATION OF A GROUNDWATER PROTECTION PROGRAM. THE BNL GROUNDWATER PROTECTION MANAGEMENT PROGRAM DESCRIPTION PROVIDES AN OVERVIEW OF HOW THE LABORATORY ENSURES THAT PLANS FOR GROUNDWATER PROTECTION, MONITORING, AND RESTORATION ARE FULLY DEFINED, INTEGRATED, AND MANAGED IN A COST EFFECTIVE MANNER THAT IS CONSISTENT WITH FEDERAL, STATE, AND LOCAL REGULATIONS.

  18. Information booklet on personal protective equipment: arm and hand protection

    International Nuclear Information System (INIS)

    1992-01-01

    Fire, heat, cold, electro-magnetic and ionising radiation, electricity, chemicals, impacts, cuts, abrasion, etc. are the common hazards for arms and hands at work. The gloves chosen for protection of the arm and hand should cover those parts adequately and the material of the gloves should be capable of offering protection against the specific hazard involved. Criteria for choosing arm and hand protection equipment will be based on their shape and part of the arm and hand protected. Guide lines for choosing such personal protection equipment for nuclear facilities are given. (M.K.V.). 3 annexures, 1 appendix

  19. Safety of persons protected by the Government Protection Bureau

    Directory of Open Access Journals (Sweden)

    Wojciech Lis

    2015-12-01

    Full Text Available The state is the organizational structure, which unites the whole nation by providing optimal conditions for the functioning and development. One of the conditions for the basic functions of the state is efficient administration headed by a person with the role of management. They not only hold the highest position, but also represent the authority of the state. For this reason, they need special protection. Each attack undermines the authority of the administration and trust in the state institutions. For the protection of persons performing managerial functions in the state corresponds to the Government Protection Bureau that providing them protection at the same time protect the state.

  20. National congress of radiation protection

    International Nuclear Information System (INIS)

    2001-01-01

    The congress of radiation protection tackled different areas of radiation protection. The impact of ionizing radiations on environment coming from radioactive activities. The biological radiation effects, the dosimetry, the different ways of doing relative to radiation protection,the risks analysis and the communications with populations, information about accidents and the lessons learned from them are included in this congress. (N.C.)

  1. Systems approach to tamper protection

    International Nuclear Information System (INIS)

    Myre, W.C.; Eaton, M.J.

    1980-01-01

    Tamper-protection is a fundamental requirement of effective containment and surveillance systems. Cost effective designs require that the tamper protection requirements be considered early in the design phase and at the system level. A discussion of tamper protection alternatives as well as an illustrative example system is presented

  2. Welfare Effects of Employment Protection

    NARCIS (Netherlands)

    Belot, M.V.K.; Boone, J.; van Ours, J.C.

    2002-01-01

    Employment protection is often related to costs incurred by the firms when they hire a worker.The stability of the employment relationship, enhanced by employment protection, is also favorable to the productivity of the job.We analyze employment protection focusing on this trade-off between

  3. Faraday Cage Protects Against Lightning

    Science.gov (United States)

    Jafferis, W.; Hasbrouck, R. T.; Johnson, J. P.

    1992-01-01

    Faraday cage protects electronic and electronically actuated equipment from lightning. Follows standard lightning-protection principles. Whether lightning strikes cage or cables running to equipment, current canceled or minimized in equipment and discharged into ground. Applicable to protection of scientific instruments, computers, radio transmitters and receivers, and power-switching equipment.

  4. Patent protection strategies

    Directory of Open Access Journals (Sweden)

    Himanshu Gupta

    2010-01-01

    Full Text Available It is widely recognized that the pharmaceutical industry faces serious financial challenges. Large numbers of blockbuster drugs are losing patent protection and going generic. The pipeline of new drugs is too sparse to fill the gap and generate a platform for future growth. Moreover, many of the new products are biologics with much narrower target patient populations and comparatively higher prices relative to traditional pharmaceuticals. So now the time has come for pharmaceutical scientists to have a better understanding of patent fundamentals. This need is illustrated by analyses of key scientific and legal issues that arose during recent patent infringement cases involving Prozac, Prilosec, and Buspar. Facing this scenario, the pharmaceutical industry has moved to accelerate drug development process and to adopt at the same time different strategies to extend the life time of the patent monopoly to provide the economic incentives and utilizing it for drug discovery and development. This review covers the need of patent protection and various strategies to extend the patent.

  5. Protecting detectors in ALICE

    International Nuclear Information System (INIS)

    Lechman, M.; Augustinus, A.; Chochula, P.; Di Mauro, A.; Stig Jirden, L.; Rosinsky, P.; Schindler, H.; Cataldo, G. de; Pinazza, O.; Kurepin, A.; Moreno, A.

    2012-01-01

    ALICE (A Large Ion Collider Experiment) is one of the big LHC (Large Hadron Collider) experiments at CERN in Geneva. It is composed of many sophisticated and complex detectors mounted very compactly around the beam pipe. Each detector is a unique masterpiece of design, engineering and construction and any damage to it could stop the experiment for months or even for years. It is therefore essential that the detectors are protected from any danger and this is one very important role of the Detector Control System (DCS). One of the main dangers for the detectors is the particle beam itself. Since the detectors are designed to be extremely sensitive to particles they are also vulnerable to any excess of beam conditions provided by the LHC accelerator. The beam protection consists of a combination of hardware interlocks and control software and this paper will describe how this is implemented and handled in ALICE. Tools have also been developed to support operators and shift leaders in the decision making related to beam safety. The gained experiences and conclusions from the individual safety projects are also presented. (authors)

  6. Optimisation of staff protection

    International Nuclear Information System (INIS)

    Faulkner, K.; Marshall, N.W.; Rawlings, D.J.

    1997-01-01

    It is important to minimize the radiation dose received by staff, but it is particularly important in interventional radiology. Staff doses may be reduced by minimizing the fluoroscopic screening time and number of images, compatible with the clinical objective of the procedure. Staff may also move to different positions in the room in an attempt to reduce doses. Finally, staff should wear appropriate protective clothing to reduce their occupational doses. This paper will concentrate on the optimization of personal shielding in interventional radiology. The effect of changing the lead equivalence of various protective devices on effective dose to staff has been studied by modeling the exposure of staff to realistic scattered radiation. Both overcouch x-ray tube/undercouch image intensified and overcouch image intensifier/undercouch x-ray tube geometries were simulated. It was deduced from this simulation that increasing the lead apron thickness from 0.35 mm lead to 0.5 mm lead had only a small reducing effect. By contrast, wearing a lead rubber thyroid shield or face mask is a superior means of reducing the effective dose to staff. Standing back from the couch when the x-ray tube is emitting radiation is another good method of reducing doses, being better than exchanging a 0.35 mm lead apron for a 0.5 mm apron. In summary, it is always preferable to shield more organs than to increase the thickness of the lead apron. (author)

  7. Radiation protection primer

    International Nuclear Information System (INIS)

    Aigner, R.; Melzer, E.; Seissler, H.

    1986-01-01

    This 'radiation protection primer' does not pretend to give absolute, final answers to the many questions that have been arising after the Chernobyl accident. What it is intended to supply, as a schematic overview of problems resulting from nuclear accidents, and a likewise systematic outline of possible solutions and sensible reactions to such an event. The book takes up questions such as: What has happened to the soil. Will future harvests be 'clean' again. What does radioactivity to our drinking water and other waters. What are the effects of a radioactive fallout on food. What may we eat or drink. What happens to the human body after intake of radioactive air, or - even only slightly - contaminated food or water. What can we do to protect our health, and the health of our children. Is there anything else we can do in order to avoid such a disaster in future, except from shutting-off all reactors. The book itself presents some answers and advice, along with a list of terms and explanations, and addresses to apply to for further advice and information. (orig./HP) [de

  8. Radiation protective clothing

    International Nuclear Information System (INIS)

    Ijiri, Yasuo; Fujinuma, Tadashi; Aso, Tsutomu.

    1991-01-01

    The present invention concerns radiation protective clothings suitable for medical protective clothings, aprons, etc. A primary sheet comprises a lead-incorporated organic polymer layer having a less frictional layer on one side and a contamination-resistant layer on the other side. A secondary sheet comprises a lead-incorporated organic polymer layer having a less frictional layer on one side and a comfortable skin-feeling layer on the other side. The less frictional layers of the primary and the secondary layer are laminated so as to be in contact with each other. Then, they are formed so that the comfortable skin-feeling layer of the secondary sheet is on the inner side, in other words, on the side of a wearer, and the contamination-resistant layer of the primary sheet is on the outer side. With such a constitution, although it involves the lead-incorporated organic polymer sheets of a large weight, it is comfortable to wear because of excellent flexibility and causes less feeling of fatigue even during wearing for a long period of time. (I.N.)

  9. Protected areas in mountains

    Directory of Open Access Journals (Sweden)

    Hamilton, L. S.

    2006-12-01

    Full Text Available

    The importance of a global Protected Areas Network in sustaining appropriate mountain development is presented in this paper. Present status of the world’s “official” Protected Areas in the UN List, and the proportion that are in mountain areas, and including international designations (World Heritage and Biosphere Reserves. Current and future challenges in the management of these special areas are also commented.



    El autor destaca la importancia de una Red Mundial de Espacios Protegidos para el desarrollo sostenible de las montañas. Comenta luego el estatus actual de las Áreas Protegidas “oficiales” del Mundo en la Lista de las Naciones Unidas y qué proporción de ellas forma parte de las montañas, sin olvidar las figuras internacionales de protección como Patrimonio de la Humanidad y Reservas de Biosfera. Para terminar, se discuten los problemas de gestión actuales y futuros de estas áreas tan especiales

  10. ADVANCED WORKER PROTECTION SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Judson Hedgehock

    2001-03-16

    From 1993 to 2000, OSS worked under a cost share contract from the Department of Energy (DOE) to develop an Advanced Worker Protection System (AWPS). The AWPS is a protective ensemble that provides the user with both breathing air and cooling for a NIOSH-rated duration of two hours. The ensemble consists of a liquid air based backpack, a Liquid Cooling Garment (LCG), and an outer protective garment. The AWPS project was divided into two phases. During Phase 1, OSS developed and tested a full-scale prototype AWPS. The testing showed that workers using the AWPS could work twice as long as workers using a standard SCBA. The testing also provided performance data on the AWPS in different environments that was used during Phase 2 to optimize the design. During Phase 1, OSS also performed a life-cycle cost analysis on a representative clean up effort. The analysis indicated that the AWPS could save the DOE millions of dollars on D and D activities and improve the health and safety of their workers. During Phase 2, OSS worked to optimize the AWPS design to increase system reliability, to improve system performance and comfort, and to reduce the backpack weight and manufacturing costs. To support this design effort, OSS developed and tested several different generations of prototype units. Two separate successful evaluations of the ensemble were performed by the International Union of Operation Engineers (IUOE). The results of these evaluations were used to drive the design. During Phase 2, OSS also pursued certifying the AWPS with the applicable government agencies. The initial intent during Phase 2 was to finalize the design and then to certify the system. OSS and Scott Health and Safety Products teamed to optimize the AWPS design and then certify the system with the National Institute of Occupational Health and Safety (NIOSH). Unfortunately, technical and programmatic difficulties prevented us from obtaining NIOSH certification. Despite the inability of NIOSH to certify

  11. ADVANCED WORKER PROTECTION SYSTEM

    International Nuclear Information System (INIS)

    Judson Hedgehock

    2001-01-01

    From 1993 to 2000, OSS worked under a cost share contract from the Department of Energy (DOE) to develop an Advanced Worker Protection System (AWPS). The AWPS is a protective ensemble that provides the user with both breathing air and cooling for a NIOSH-rated duration of two hours. The ensemble consists of a liquid air based backpack, a Liquid Cooling Garment (LCG), and an outer protective garment. The AWPS project was divided into two phases. During Phase 1, OSS developed and tested a full-scale prototype AWPS. The testing showed that workers using the AWPS could work twice as long as workers using a standard SCBA. The testing also provided performance data on the AWPS in different environments that was used during Phase 2 to optimize the design. During Phase 1, OSS also performed a life-cycle cost analysis on a representative clean up effort. The analysis indicated that the AWPS could save the DOE millions of dollars on D and D activities and improve the health and safety of their workers. During Phase 2, OSS worked to optimize the AWPS design to increase system reliability, to improve system performance and comfort, and to reduce the backpack weight and manufacturing costs. To support this design effort, OSS developed and tested several different generations of prototype units. Two separate successful evaluations of the ensemble were performed by the International Union of Operation Engineers (IUOE). The results of these evaluations were used to drive the design. During Phase 2, OSS also pursued certifying the AWPS with the applicable government agencies. The initial intent during Phase 2 was to finalize the design and then to certify the system. OSS and Scott Health and Safety Products teamed to optimize the AWPS design and then certify the system with the National Institute of Occupational Health and Safety (NIOSH). Unfortunately, technical and programmatic difficulties prevented us from obtaining NIOSH certification. Despite the inability of NIOSH to certify

  12. Radiological protection report 2012

    International Nuclear Information System (INIS)

    2013-06-01

    Two years after the massive release of radiation from the nuclear power plants at Fukushima Dai-ichi, the repercussions continue to preoccupy the radiological and emergency protection community, both in Switzerland and internationally. In Switzerland the Swiss Federal Nuclear Safety Inspectorate (ENSI) has initiated measures as part of the European Union Stress Tests and has its own Fukushima Action Plan. In this Annual Report, ENSI focuses on radiological protection in Swiss nuclear facilities. The average individual dose has changed little compared with previous years. At 0.7 mSv, it is significantly below the limit both for persons exposed to radiation during their work (20 mSv) and the annual average rate of exposure for the population in Switzerland as a whole (5.5 mSv). In terms of collective doses, the extensive maintenance work at the Leibstadt power plant (KKL) resulted in a doubling of rates compared with recent years. However, in the remaining nuclear facilities the rates have not changed significantly. The highest individual dose during the year under review was 13 mSv. Exposure rates in 2012 for all those exposed to radiation during work in facilities subject to ENSI surveillance were below the maximum limit. Greater attention is now being given to work in high and variable radiation fields and in difficult conditions. Swiss nuclear facilities continue to operate a consistent radiological protection approach. Measuring equipment plays an important role in radiological protection. Having conducted a range of inspections and comparative measurements of aerosol-iodine filters and waste water sampling together with measurements in the field of personal dosimetry, ENSI has concluded that the required measuring equipment for radiological protection exists, that this equipment is correctly used and provides reliable data. ENSI maintains a test laboratory that analyses samples from nuclear facilities and their immediate vicinity and also conducts field

  13. The International Employment Protection Practices

    Directory of Open Access Journals (Sweden)

    Otenko Pavlo V.

    2017-09-01

    Full Text Available The article discusses the need for corporate protection of staff in accordance with both the European and the International labor law. The author defines the essence of the category of «protection of staff», its constituent elements and the importance of function of this mechanism in terms of corporate security. The main methods used in the international practice to achieve a high degree of protection of staff have been systematized and presented. The main stages of development and tendencies concerning the formation of instruments for protection of staff have been analyzed, and the principal indices to assess the degree of protection of staff have been determined.

  14. Radiation protection training in Switzerland

    International Nuclear Information System (INIS)

    Pfeiffer, H.J.

    1999-01-01

    An increasing number of radiation protection experts and of professionally exposed workers is temporarily or permanently working in a country other than the one where they received their radiation protection education or training. They all face the problem and the difficulties of recognition of radiation protection training programs by other countries. For this reason the German-Swiss Radiation Protection Association (Fachverband fuer Strahlenschutz; FS) made a proposal to IRPA for an action on the mutual recognition of radiation protection education in Europe. In a first step contacts were made with two other European Associations of France and UK in order to establish a joint working group. (orig.) [de

  15. FIRE PROTECTION SYSTEMS AND TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Aristov Denis Ivanovich

    2016-03-01

    Full Text Available The All-Russian Congress “Fire Stop Moscow” was de-voted to the analysis of the four segments of the industry of fire protection systems and technologies: the design of fire protec-tion systems, the latest developments and technologies of active and passive fire protection of buildings, the state and the devel-opment of the legal framework, the practice of fire protection of buildings and structures. The forum brought together the repre-sentatives of the industry of fire protection systems, scientists, leading experts, specialists in fire protection and representatives of construction companies from different regions of Russia. In parallel with the Congress Industrial Exhibition of fire protection systems, materials and technology was held, where manufacturers presented their products. The urgency of the “Fire Stop Moscow” Congress in 2015 organized by the Congress Bureau ODF Events lies primarily in the fact that it considered the full range of issues related to the fire protection of building and construction projects; studied the state of the regulatory framework for fire safety and efficiency of public services, research centers, private companies and busi-nesses in the area of fire safety. The main practical significance of the event which was widely covered in the media space, was the opportunity to share the views and information between management, science, and practice of business on implementing fire protection systems in the conditions of modern economic relations and market realities. : congress, fire protection, systems, technologies, fire protection systems, exhibition

  16. VIP protection from CBRN hazards

    International Nuclear Information System (INIS)

    Kaszeta, D.

    2009-01-01

    Protection of heads of state/government from CBRN threats requires flexibility and advanced planning. The best approach to CBRN countermeasures in a close protection context combine traditional close protection techniques, sound security practices, and a good understanding of the technical nature of the threat. Poor general security practices make for poor CBRN protection. This paper addresses a methodology for assessing the viability of threats to protected persons/VIPs and provides an overview of close protection in the CBRN environment. It is important to define the scope of CBRN response in the close protection context. Some threat agents are more applicable to a military environment than to the type of attack consistent with assassination. By focussing the scope of CBRN close protection more specifically on the more technically viable threats, appropriate concepts of operation can be developed. Concepts of operation, developed with an understanding of the threat, determine the requirement for advanced preparation and the training and equipping of protective details. Most of the responses required in CBRN incidents are well served by tactically sound close protection procedures. The fundamental principles are: rapid identification of hazard, speed, use of protective technology, and medical interventions, including rapid decontamination and basic and advanced life support measures. This paper does not contain confidential or classified information and represents only the opinion of its author. It does not represent any official policy or opinion of the authors present or previous employers.(author)

  17. Ethical issues in radiation protection

    International Nuclear Information System (INIS)

    Persson, Lars

    2000-03-01

    Ethical theories are relevant to the current recommendations and standards for radiation protection. Radiation protection is not only a matter for science. It is also a problem of philosophy. In order for protection regulations to be respected, it must correspond to widely accepted ethical values among those who are affected by the regulations. The workshop covered the following issues: Problems in Present Protection Policy, ICRP Protection Policy - A Historical Perspective, Radiation Risk - What we know and what we believe, Present ICRP Recommendations, Ethical Values in the Context of ICRP Recommendations, Collective Responsibility for Invisible Harm, Environmental Protection - Ethical Issues, The Global Change of Values, and Procedural justice and Radiation Protection. Six workshop contributions and a workshop summary are presented in this report

  18. Ethical issues in radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Persson, Lars (ed.)

    2000-03-15

    Ethical theories are relevant to the current recommendations and standards for radiation protection. Radiation protection is not only a matter for science. It is also a problem of philosophy. In order for protection regulations to be respected, it must correspond to widely accepted ethical values among those who are affected by the regulations. The workshop covered the following issues: Problems in Present Protection Policy, ICRP Protection Policy - A Historical Perspective, Radiation Risk - What we know and what we believe, Present ICRP Recommendations, Ethical Values in the Context of ICRP Recommendations, Collective Responsibility for Invisible Harm, Environmental Protection - Ethical Issues, The Global Change of Values, and Procedural justice and Radiation Protection. Six workshop contributions and a workshop summary are presented in this report.

  19. The national radiation protection infrastructure

    International Nuclear Information System (INIS)

    Mastauskas, A.

    1999-01-01

    The state system of radiation protection is still being created after Lithuania regained its independancy and in connection with recommendations laid in the ICRP-60 publication and requirements of legislation of European Community. A new regulation institutions was established and a number of laws and regulations related to radiation protection was prepared. The Radiation Protection Centre of Ministry of Health is the regulatory authority responsible for radiation protection of public and of workers using sources of ionizing radiation in Lithuania. A new Radiation Protection Law, Nuclear Energy Law, Radioactive Waste Management Law and different regulations was approved. Preparation of legislation, creation of state system of radiation protection and its upgrading allow to presume that the necessary level of radiation protection is to be achieved. (au)

  20. Protecting your practice.

    Science.gov (United States)

    Kerr, Joseph

    2015-01-01

    Dentists have much invested in their practices. They need to protect their practices from fraud and noncompliance. The author provides practical suggestions for how to significantly reduce the risk of fraud and theft in the practice without disrupting day-to-day operations. By adhering to nonintrusive policy and procedure changes, dental practice owners can reduce inherent risks of fraud and theft, while increasing financial and human resource knowledge regarding their practice. Practice owners with the appropriate policies and procedures benefit from significantly lower risk of loss from fraud and theft. Furthermore, they have a better understanding of their practice's finances and human resources. Copyright © 2015 American Dental Association. Published by Elsevier Inc. All rights reserved.

  1. Radiation protecting sheet

    International Nuclear Information System (INIS)

    Makiguchi, Hiroshi.

    1989-01-01

    As protection sheets used in radioactivity administration areas, a thermoplastic polyurethane composition sheet with a thickness of less 0.5 mm, solid content (ash) of less than 5% and a shore D hardness of less than 60 is used. A composite sheet with thickness of less than 0.5 mm laminated or coated with such a thermoplastic polyurethane composition as a surface layer and the thermoplastic polyurethane composition sheet applied with secondary fabrication are used. This can satisfy all of the required properties, such as draping property, abrasion resistance, high breaking strength, necking resistance, endurance strength, as well as chemical resistance and easy burnability in burning furnace. Further, by forming uneveness on the surface by means of embossing, etc. safety problems such as slippage during operation and walking can be overcome. (T.M.)

  2. Protective barrier development: Overview

    International Nuclear Information System (INIS)

    Wing, N.R.; Gee, G.W.

    1990-01-01

    Protective barrier and warning marker systems are being developed to isolate wastes disposed of near the earth's surface at the Hanford Site. The barrier is designed to function in an arid to semiarid climate, to limit infiltration and percolation of water through the waste zone to near-zero, to be maintenance free, and to last up to 10,000 yr. Natural materials (e.g., fine soil, sand, gravel, riprap, clay, asphalt) have been selected to optimize barrier performance and longevity and to create an integrated structure with redundant features. These materials isolate wastes by limiting water drainage; reducing the likelihood of plant, animal, and human intrusion; controlling emission of noxious gases; and minimizing erosion. Westinghouse Hanford Company and Pacific Northwest Laboratory efforts to assess the performance of various barrier and marker designs will be discussed

  3. Sodium fire protection

    International Nuclear Information System (INIS)

    Raju, C.; Kale, R.D.

    1979-01-01

    Results of experiments carried out with sodium fires to develop extinguishment techniques are presented. Characteristics, ignition temperature, heat evolution and other aspects of sodium fires are described. Out of the powders tested for extinguishment of 10 Kg sodium fires, sodium bi-carbonate based dry chemical powder has been found to be the best extinguisher followed by large sized vermiculite and then calcium carbonate powders distributed by spray nozzles. Powders, however, do not extinguish large fires effectively due to sodium-concrete reaction. To control large scale fires in a LMFBR, collection trays with protective cover have been found to cause oxygen starvation better than flooding with inert gas. This system has an added advantage in that there is no damage to the sodium facilities as has been in the case of powders which often contain chlorine compounds and cause stress corrosion cracking. (M.G.B.)

  4. Ablative thermal protection systems

    International Nuclear Information System (INIS)

    Vaniman, J.; Fisher, R.; Wojciechowski, C.; Dean, W.

    1983-01-01

    The procedures used to establish the TPS (thermal protection system) design of the SRB (solid rocket booster) element of the Space Shuttle vehicle are discussed. A final evaluation of the adequacy of this design will be made from data obtained from the first five Shuttle flights. Temperature sensors installed at selected locations on the SRB structure covered by the TPS give information as a function of time throughout the flight. Anomalies are to be investigated and computer design thermal models adjusted if required. In addition, the actual TPS ablator material loss is to be measured after each flight and compared with analytically determined losses. The analytical methods of predicting ablator performance are surveyed. 5 references

  5. Radiation protection research

    Energy Technology Data Exchange (ETDEWEB)

    Vanmarcke, H

    2002-04-01

    The objectives of the research in the field of radiation protection research performed at the Belgian Nuclear Research Centre SCK-CEN are (1) to elaborate and to improve methods and guidelines for the evaluation of restoration options for radioactively contaminated sites; (2) to develop, test and improve biosphere models for the performance assessment of radioactive waste disposal in near-surface or geological repositories; (3) to asses the impact of releases from nuclear or industrial installations; (4) to increase capabilities in mapping and surveying sites possibly or likely contaminated with enhanced levels of natural radiation; (5) to identify non nuclear industries producing NORM waste, to make an inventory of occurring problems and to propose feasible solutions or actions when required; (6) to maintain the know-how of retrospective radon measurements in real conditions and to assess radon decay product exposure by combining these techniques. Main achievements in these areas for 2001 are summarised.

  6. Hardware protection through obfuscation

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange o...

  7. Consumer Protection in Cyberspace

    Directory of Open Access Journals (Sweden)

    Oscar H. Gandy, Jr.

    2011-06-01

    Full Text Available This critical essay introduces the problem of discrimination enabled through the use of transaction-generated-information derived from the analysis of user behaviors within the network environment. The essay begins by describing how segments of the population that are already vulnerable become further victimized through the strategic use of discriminatory algorithms in support of identification, classification, segmentation, and targeting. In response, it evaluates a set of policy options that might be used to limit the harm and compensate the victims of these inherently dangerous technologies. Traditional approaches that stress the protection of privacy through restrictions on the collection and use of personal information are compared with alternatives based on individual and class actions under tort law, as well as more traditional regulatory approaches developed in the area of consumer products safety and environmental regulation.

  8. Radiation protection research

    International Nuclear Information System (INIS)

    Vanmarcke, H.

    2002-01-01

    The objectives of the research in the field of radiation protection research performed at the Belgian Nuclear Research Centre SCK-CEN are (1) to elaborate and to improve methods and guidelines for the evaluation of restoration options for radioactively contaminated sites; (2) to develop, test and improve biosphere models for the performance assessment of radioactive waste disposal in near-surface or geological repositories; (3) to asses the impact of releases from nuclear or industrial installations; (4) to increase capabilities in mapping and surveying sites possibly or likely contaminated with enhanced levels of natural radiation; (5) to identify non nuclear industries producing NORM waste, to make an inventory of occurring problems and to propose feasible solutions or actions when required; (6) to maintain the know-how of retrospective radon measurements in real conditions and to assess radon decay product exposure by combining these techniques. Main achievements in these areas for 2001 are summarised

  9. Radiological protection report 2016

    International Nuclear Information System (INIS)

    2017-06-01

    In the radiological protection report 2016, the Swiss Federal Nuclear Safety Inspectorate (ENSI) provides an overview of the radiological protection in its area of supervision. Part A of the report deals with protecting the staff of nuclear power plants from the dangers of ionising radiation. It also includes a list of the personal doses accumulated by the staff, broken down using various parameters. Applying the optimisation imperative, it has been proved possible to significantly reduce the annual collective doses in Switzerland's nuclear power plants since they came on stream thanks to major efforts by the operators. In 2016, a total of 6,153 people measured accumulated 2,877 person-mSv. The collective doses have reached a low level corresponding to the radiological condition of the plants and the scope of the work required to be performed in controlled zones (e.g. non-destructive materials testing). ENSI will continue to follow the trend for collective doses and assess the reasons for local variances as well as for measures initiated. The individual doses for people employed in ENSI's area of supervision in 2016 showed a maximum figure of 10 mSv and a mean value of 0.5 mSv which was significantly below the dose limit of 20 mSv for occupational radiation exposure. The discharge of radioactive substances with the exhaust air and waste water from nuclear power plants are dealt with in Part B of the report. In 2016, nuclear power plant operators again met the admissible release limits set by the authorities, in some cases by a considerable margin. The emissions of Swiss nuclear power plants led to a dose of less than 0.01 mSv per year in the direct neighbourhood. A comparison with the average annual radiation dose for the Swiss population of 5.5 mSv shows that the relevant contribution from nuclear power plants lies in the area of one percent of this figure. Effluents from Swiss nuclear power plants were also below the target of 1 GBq per year set by ENSI

  10. Predicting sun protection behaviors using protection motivation variables.

    Science.gov (United States)

    Ch'ng, Joanne W M; Glendon, A Ian

    2014-04-01

    Protection motivation theory components were used to predict sun protection behaviors (SPBs) using four outcome measures: typical reported behaviors, previous reported behaviors, current sunscreen use as determined by interview, and current observed behaviors (clothing worn) to control for common method bias. Sampled from two SE Queensland public beaches during summer, 199 participants aged 18-29 years completed a questionnaire measuring perceived severity, perceived vulnerability, response efficacy, response costs, and protection motivation (PM). Personal perceived risk (similar to threat appraisal) and response likelihood (similar to coping appraisal) were derived from their respective PM components. Protection motivation predicted all four SPB criterion variables. Personal perceived risk and response likelihood predicted protection motivation. Protection motivation completely mediated the effect of response likelihood on all four criterion variables. Alternative models are considered. Strengths and limitations of the study are outlined and suggestions made for future research.

  11. Information booklet on personal protective equipment: eye and face protection

    International Nuclear Information System (INIS)

    1992-01-01

    In all work places where hazards of various kinds are present and the same cannot be totally controlled by engineering methods, suitable personal protective equipment (PPE) shall be used. There are several types of eye and face protection devices available in the market and it is important that employees use the proper type for the particular job. The main classes of eye and face protection devices required for the industrial operations are as follows: (a) eye protection devices which includes: (i) safety goggles (ii) safety spectacles (iii) safety clipons and eye and face protection devices which are (i) eye shield, (ii) face shield, (iii) wire mesh screen guard. Guide lines for selecting appropriate ear and face protection equipment for nuclear installations are given. (M.K.V.). 4 annexures, 1 appendix

  12. Evaluation of protection factor of respiratory protective equipment using indigenously developed protection factor test facility

    International Nuclear Information System (INIS)

    Patkulkar, D.S.; Ganesh, G.; Tripathi, R.M.

    2018-01-01

    Assigned protection factor (APF) is an indicator representing effectiveness of a respirator and it provides workplace level of respiratory protection for workers in providing protection against exposure to airborne contaminants Occupational Safety and Health Administration (OSHA) specifies 'Respirator APF' and 'Maximum Use Concentration' (MUC - a term derived using APF) shall be an integral part of Respirator Protection Standard. MUC establishes the maximum airborne concentration of a contaminant in which a respirator with a given APF may be used. The use of particulate respirators such as half face mask, full face mask and powered air purifying respirators is essential for radioactive jobs in nuclear facilities to prevent any intake of radionuclide. With this impetus, the Protection Factor Test Facility (PFTF) for testing and evaluation of respiratory protective equipment meeting relevant applicable standards was designed, fabricated and installed in Respiratory Protective Equipment Laboratory of Health Physics Division

  13. Environmental protection: Shifting the focus toward the protected object

    Directory of Open Access Journals (Sweden)

    Cvetić Radenka

    2013-01-01

    Full Text Available This article is an attempt to provide a comprehensive overview of the rationale which led to developments in the law of environmental protection in a direction of an even more efficient protection of environment from human beings. There has been a transformation of the constitutionally protected right to a healthy environment to the Constitutional guarantee which involves both duty and responsibility for its protection. There has also been a shift from declaratory protection toward enforceable prohibitions and orders. These transformations have occurred when the society faced, under dramatic circumstances, the situation which shows that failure to protect the common good could lead to catastrophic consequences. The system of environmental protection, which enables sustainable development, is based on the primacy of the precautionary principle which deals with prevention and reduction of probability of harm, as well as on the no fault liability of the polluter for the environmental harm even in the absence of the claim for damages. The efficacy of the environmental protection could be improved by raising the awareness of the preservation of environment. The understanding that the protection of environment amounts to a survival of a mankind could lead to creating rights for the environment as such.

  14. Field selection of chemical protective clothing and respiratory protection

    International Nuclear Information System (INIS)

    Pinette, S.; Dodgen, C.; Morley, M.

    1991-01-01

    Safety professionals who must choose appropriate personal protective equipment for hazardous substance response or hazardous waste sites require useable information about the effectiveness of the various products available. Each hazardous waste operation involves a unique combination of chemical hazards requiring a unique combination of protective apparel. A chemical protective suit or respirator must be chosen for each site and each operation on the site. No single protective suit is effective against all chemical hazards. No single respirator is the best choice in every situation. Various sources of information on the effectiveness of protective clothing products will be discussed. Site-specific permeation testing of the proposed protective clothing options will also be discussed. It is both possible and practical to obtain specific information about the degree of protection afforded by a particular suit against a particular chemical mixture. It is also important to know how long the suit will last. Choosing adequate respiratory protection is a complex process. Respirator cartridge performance depends on various environmental factors as well as upon the combination and concentration of chemicals in the air. Once characterization of the air at a site has been accomplished, it may be appropriate to select an alternative to airline respirators and SCBAs. Respirator cartridges can be tested against specific chemical mixtures using worse case environmental factors. The results can be used to predict both the effectiveness and duration of protection afforded by respirator cartridges which can reduce costs and worker fatigue

  15. Individual protection of NPP personnel

    International Nuclear Information System (INIS)

    Koshcheev, V.S.; Gol'dshtejn, D.S.; Chetverikova, Z.S.

    1983-01-01

    Specific features of NPP personnel individual protection are considered, mainly with respect to maintenance and repair works on various type reactors. The major concern is given to the selection and application reglamentations of the individual protection system (IPS), employment of sanitary locks, the organization of individual protection under the conditions of a heating microclimate. The ways are specified to the development and introduction of the most effective IPS and improvement of the entire NPP personnel individual protection system with respect to providing the necessary protection effect for maintaining high working capability of the personnel and minimizing the IPS impact on human organism functional systems. The accumulated experience in the personnel individual protection can be applied during construction and operation of NPP's in CMEA member-countries [ru

  16. The physics of radiation protection

    International Nuclear Information System (INIS)

    Doerschel, B.; Schuricht, V.; Steuer, J.

    1996-01-01

    The book is aimed at both practising specialists and scientists wishing to learn about the fundamental science of radiation protection. The first part of the book, 'Physical Fundamentals of Radiation Protection', presents a concise description of radiation sources and radiation fields, interaction of radiation with matter, radiation effects and radiation damage, basic concept of radiation protection, radiation exposure of man, radiation protection measuring techniques and physical fundamentals for limiting radiation exposure. The second part, 'Calculational Exercises for Radiation Protection' is intended to supplement the first part by carrying out relevant calculations, amending and adding special aspects and to give guidance in solving practical problems. The book is written for scientists as well as for students and staff working in nuclear facilities, hospitals and institutions responsible for radiation and environmental protection. (UK)

  17. Computer Security: transparent monitoring for your protection

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Computer security can be handled in one of two ways: in secrecy, behind a black curtain; or out in the open, subject to scrutiny and with full transparency. We believe that the latter is the only right way for CERN, and have always put that belief into practice. In keeping with this spirit, here is a reminder of how we monitor (your) CERN activities in order to guarantee timely responses to computer security incidents.   We monitor all network traffic coming into and going out of CERN. Automatic tools look for suspicious patterns like connections to known malicious IP addresses, web pages or domains. They check for malicious files being downloaded and make statistical analyses of connections in order to identify unusual behaviour. The automatic analysis of the logs from the CERN Domain Name Servers complements this and provides a redundant means of detection. We also constantly scan the CERN office network and keep an inventory of the individual network services running on each device: w...

  18. Protection of electricity distribution networks

    CERN Document Server

    Gers, Juan M

    2004-01-01

    Written by two practicing electrical engineers, this second edition of the bestselling Protection of Electricity Distribution Networks offers both practical and theoretical coverage of the technologies, from the classical electromechanical relays to the new numerical types, which protect equipment on networks and in electrical plants. A properly coordinated protection system is vital to ensure that an electricity distribution network can operate within preset requirements for safety for individual items of equipment, staff and public, and the network overall. Suitable and reliable equipment sh

  19. National Sessions of Radiation Protection

    International Nuclear Information System (INIS)

    Sociedad Argentina de Radioproteccion

    2012-01-01

    The Radioprotection Argentine Society (SAR) was organized the National Sessions on Radiation Protection 2012 in order to continue the exchange in the radiation protection community in the country, on work areas that present a challenge to the profession. The new recommendations of the ICRP and the IAEA Safety Standards (2011), among others, includes several topics that are necessary to develop. The SAR wants to encourage different organizations from Argentina, to submit projects that are developing in order to strengthen radiation protection.

  20. Optical Fiber Protection

    Science.gov (United States)

    1999-01-01

    F&S Inc. developed and commercialized fiber optic and microelectromechanical systems- (MEMS) based instrumentation for harsh environments encountered in the aerospace industry. The NASA SBIR programs have provided F&S the funds and the technology to develop ruggedized coatings and coating techniques that are applied during the optical fiber draw process. The F&S optical fiber fabrication facility and developed coating methods enable F&S to manufacture specialty optical fiber with custom designed refractive index profiles and protective or active coatings. F&S has demonstrated sputtered coatings using metals and ceramics and combinations of each, and has also developed techniques to apply thin coatings of specialized polyimides formulated at NASA Langley Research Center. With these capabilities, F&S has produced cost-effective, reliable instrumentation and sensors capable of withstanding temperatures up to 800? C and continues building commercial sales with corporate partners and private funding. More recently, F&S has adapted the same sensing platforms to provide the rapid detection and identification of chemical and biological agents

  1. Plowshare radiation protection guidance

    International Nuclear Information System (INIS)

    Parker, H.M.

    1969-01-01

    The recommendations of the ICRP and the NCRP were developed primarily for occupational radiation exposures. They were later modified and applied to non-occupational exposures of populations. These, with appropriate interpretations, can be used to provide Plowshare radiation protection guidance. Exposures from Plowshare operations will tend to be acute, arising from radionuclides of relatively short half-life, but will have some chronic aspects due to small amounts of long-lived radionuclides generated. In addition, the neutron activation process of Plowshare technology will produce radionuclides not commonly encountered in routine nuclear energy programs. How these radionuclides contribute to personnel exposure is known for only a few situations that may not be representative of Plowshare exposure. Further complications arise from differences in radionuclide deposition and physiological sensitivity among individuals of different ages and states of health in the exposed population. All parameters necessary to evaluate such exposures are not available, even for good quantitative approximations, resulting in the need for interpretive experience. (author)

  2. Plowshare radiation protection guidance

    Energy Technology Data Exchange (ETDEWEB)

    Parker, H M [Environmental and Life Sciences Division, Battelle Memorial Institute, Pacific Northwest Laboratory, Richland, WA (United States)

    1969-07-01

    The recommendations of the ICRP and the NCRP were developed primarily for occupational radiation exposures. They were later modified and applied to non-occupational exposures of populations. These, with appropriate interpretations, can be used to provide Plowshare radiation protection guidance. Exposures from Plowshare operations will tend to be acute, arising from radionuclides of relatively short half-life, but will have some chronic aspects due to small amounts of long-lived radionuclides generated. In addition, the neutron activation process of Plowshare technology will produce radionuclides not commonly encountered in routine nuclear energy programs. How these radionuclides contribute to personnel exposure is known for only a few situations that may not be representative of Plowshare exposure. Further complications arise from differences in radionuclide deposition and physiological sensitivity among individuals of different ages and states of health in the exposed population. All parameters necessary to evaluate such exposures are not available, even for good quantitative approximations, resulting in the need for interpretive experience. (author)

  3. Ethics in radiation protection

    International Nuclear Information System (INIS)

    Corbett, R.H.

    2002-01-01

    Ethics is a branch of philosophy. Its object is the study of both moral and immoral behaviour in order to make well founded judgements and to arrive at adequate recommendations. The Collins English Dictionary provides the following definitions of the word ethic: Ethic: a moral principle or set of moral values held by an individual or group; Ethics(singular): the philosophical study of the moral value of human conduct and of the rules and principles that ought to govern it; Ethics(pleural): a social, religious or civil code of behaviour considered correct, especially that of a particular group, profession or individual; Ethics(pleural): the moral fitness of a decision, course of action, etc. Ethics has a two-fold objective: Firstly it evaluates human practices by calling upon moral standards; it may give prescriptive advice on how to act morally in a specific kind of situation. This implies analysis and evaluation. Sometimes this is known as Normative ethics. The second is to provide therapeutic advice, suggesting solutions and policies. It must be based on well-informed opinions and requires a clear understanding of the vital issues. In the medical world, we are governed by the Hippocratic Oath. Essentially this requires medical practitioners (doctors) to do good, not harm. There is great interest and even furore regarding ethics in radiation protection

  4. Critique of protective measurements

    International Nuclear Information System (INIS)

    Hari Dass, N.D.; Qureshi, T.

    1999-01-01

    The recently proposed idea of open-quotes protectiveclose quotes measurement of a quantum state is critically examined, and generalized. Earlier criticisms of the idea are discussed, and their relevance to the proposal assessed. Several constraints on measuring apparatus required by open-quotes protectiveclose quotes measurements are discussed, with emphasis on how they may restrict their experimental feasibility. Though open-quotes protectiveclose quotes measurements result in an unchanged system state and a shift of the pointer proportional to the expectation value of the measured observable in the system state, the actual reading of the pointer position gives rise to several subtleties. We propose several schemes for reading the pointer position, both when the apparatus is treated as a classical system as well as when its quantum aspects are taken into account, that address these issues. The tiny entanglement which is always present due to deviation from extreme adiabaticity in realistic situations is argued to be the weakest aspect of the proposal. Because of this, one can never perform a protective measurement on a single quantum system with absolute certainty. This clearly precludes an ontological status for the wave function. Several other conceptual issues are also discussed. copyright 1999 The American Physical Society

  5. Radiation protective clothing

    International Nuclear Information System (INIS)

    Watanabe, Choshin; Takaura, Katsutoshi

    1998-01-01

    An external clothing as a main portion of the radiation protective clothing of the present invention is adapted to cover substantially the entire body of a wearer, comprises a moisture permeable material partially or entirely, and has an air supply device equipped with a filter for feeding air to a head portion of the wearer in the external clothing. Cleaned air filtered by the filter is supplied to the head portion of a wearer in the external clothing. The air passes through remarkably perspiratory head, face, shoulder, chest and back portions to remove heat and sweat at sensitively important upper portions of a body, so that humidity is released to remove fatigues and improve workability. In addition, since some extent of internal pressure is exerted to the inside of the external clothing by the air supply, contaminated air does not intrude from the outside to the external clothing. Since the air supply device is attached and carried to the external clothing, there is no air line hose which disturbs operation. (I.S.)

  6. Obligatory Radiation Protection Course

    CERN Multimedia

    SC Unit

    2008-01-01

    Since February 2008, participation in the radiation protection course has been a prerequisite for obtaining a CERN personal dosimeter for all Staff Members and Users. All Staff and Users holding a personal dosimeter were informed by the Bulletin and by a personal e-mail sent in February 2008 that they were required to participate in the course before the annual exchange of their dosimeter. Many people had not done so by that time and the Dosimetry Service exceptionally classified them for 2 months as short-term visitors (VCT), a category of monitored personnel to whom the training requirement does not presently apply. As all personnel concerned have since had time to participate in an RP course, this "grace period" will no longer be granted as of 1 October 2008 and the RP course must be completed before the personal dosimeter is exchanged. For newcomers to CERN, and for those returning to CERN after an absence of more than 1 year, one registration as a VCT for two months ...

  7. Emerging radiation protection

    International Nuclear Information System (INIS)

    Allard, D.J.

    1993-01-01

    In recent years, a number of radiation protection issues have emerged into the public forum. The perceived high risks associated with radiation exposure, and disproportionate media attention to such issues, have contributed to heightened concerns by the public and the individual occupationally exposed worker. This paper examines the new and controversial radiation risk estimates of the National Research Council's BEIR V committee, which are based on the most current atomic-bomb survivor data and a revised dosimetry model. These risk estimates are somewhat higher than past values, and may eventually impact the legal framework in the United States through the regulations of the EPA, NRC, DOE, OSHA, and other agencies that set radiation exposure standards. Additionally, present regulations and standards are often based upon differing levels of acceptable risk, which have led to conflicting exposure and effluent release criteria. Further, due to inherent boundaries in legal authority, many potentially significant sources of radiation exposure to the public remain unregulated Radiation exposure scenarios such as medical x-ray, radon, and other technology enhanced sources have no legal limits. These issues and others are examined and analyzed with respect to regulatory policy

  8. Public health protection priorities

    International Nuclear Information System (INIS)

    Alexander, R.E.

    1990-01-01

    Although the inhalation and ingestion of small quantities of radioactive material are not known to be hazardous, tradition, popular demand and governmental directives are imposing costly standards of cleanliness normally associated with confirmed, highly dangerous biological and chemical agents. Examination of the radiation risk data base discloses that these standards are unnecessarily stringent, even if the risks (only hypothesized at low doses) were real. The justifications given are the persuasive axioms that no level of radiation is without risk and that more is known about radiation than any other carcinogen. Actually, the knowledge of this risk to humans does not extend to low doses or even to high doses if the exposure is protracted. Permitted levels are orders of magnitude below those known to be carcinogenic. With the costs of compliance now sufficiently large to cause national tax increases, federal program cuts, or both, an ethical question arises. Should taxes be increased and beneficial programs cut to pay for protection against risks that are trivial at worst and possibly imaginary, when additional resources are needed to combat dangers known to be real?

  9. "Magia sexualis": sex, secrecy, and liberation in modern western esotericism.

    Science.gov (United States)

    Urban, Hugh B

    2004-01-01

    Although the forces of Eros and Magic have long been linked in western esoteric traditions, it is really not until the nineteenth century that we see the emergence of a large and sophisticated body of literature on the art of sexual magic. This article examines the rise of sexual magic in the late nineteenth and early twentieth centuries, placing it in the context of the larger discourse surrounding sexuality in American and British society of the Victorian era. Specifically, I focus on the teachings of the American spiritualist Paschal Beverly Randolph; the infamous "Great Beast 666," Aleister Crowley; and the founder of the first Tantrik Order in America, Pierre Bernard. Following the lead of Michel Foucault, I argue that this new literature on sexual magic was part of the larger interest in sex that pervaded Victorian culture. Far from being a period of repression and prudery, the Victorian era witnessed an unprecedented explosion of discourse on sex, particularly in its "deviant" and nonproductive forms. The rise of sexual magic at once reflects and yet also subverts many of the sexual values of mainstream Victorian culture. At the same time, however, I argue that Randolph, Crowley, and Bernard were all in their own ways somewhat ahead of their times and foreshadowed much of the obsession with sex and its liberation in contemporary America at the turn of the millennium.

  10. Financial Secrecy and Its Impact on Cross-Border Deposits

    OpenAIRE

    Džmuráň, Daniel

    2017-01-01

    The role of tax havens in the global issue of tax evasion has been illustrated by numerous studies. In 2009, a major international initiative has been launched by G20 and OECD with a purpose to put an end to offshore tax evasion. Yet the outcomes of this tax haven crackdown are often contested. This thesis brings new findings to the empirical research that has been done on the field of crackdown's evaluation. First, I confirm the results of earlier academic papers and I find a negative impact...

  11. Contexts of vulnerability: Sex, secrecy and HIV/AIDS | Preston ...

    African Journals Online (AJOL)

    comforting AIDS infected and affected family and community members. The paper ends with a call for researchers to be aware that AIDS stigma may render the very act of research a source of danger to those affected by HIV and AIDS. African Journal of AIDS Research 2003, 2(2): 89–94. Keywords: community, communitas ...

  12. Staff accuse bosses of secrecy over British synchrotron plans

    CERN Multimedia

    Loder, N

    1999-01-01

    Scientific staff at Daresbury who have worked on the Diamond project for many years, believe senior management has kept them in the dark over discussions about the possible siting of the synchrotron at RAL (1 page).

  13. Secrecy and persistent problems in sexual assault victims.

    NARCIS (Netherlands)

    Ensink, B.J.; Winkel, F.W.; Berlo, van W.

    2001-01-01

    A substantial number of victims of sexual assault refrain from disclosing to others the victimizing episode and its emotional consequences. A prospective study (n = 36 rape victims reporting theirvictimization to the police) and a retrospective study (n = 33) were conducted to examine the

  14. 40 CFR 350.7 - Substantiating claims of trade secrecy.

    Science.gov (United States)

    2010-07-01

    ... publications or other information sources available to the public or your competitors (of which you are aware... of the chemical claimed as trade secret and explain why it is a secret of interest to competitors... competitors could deduce this use from disclosure of the chemical identity together with other information on...

  15. Environment protection and energy politics

    International Nuclear Information System (INIS)

    Grawe, J.

    1993-01-01

    The lecture first deals with the aims and legal basis in German and European law of environment protection with regard to energy politics. It then goes to deal with European regulations for environment protection and their effects on the energy supply: Air pollution abatement, tax for the protection of the climate, internalisation of external costs. The following European energy-political measures impinge on environment protection: Sponsored projects, least-cost planning, third-party access to the public electricity supply. The discrepancy between European and national policies can be lessened or resolved by the following means: Harmonisation, subsidiarity principle, and scope for entrepreneurial solutions. (orig.) [de

  16. Radiological protection in dental practice

    Energy Technology Data Exchange (ETDEWEB)

    1975-01-01

    Intended to be complementary to the more comprehensive document, ''Code of Practice for the protection of persons against ionizing radiations arising from medical and dental use'' (CIS 74-423), the purpose of this booklet is to give dentists some basic information on the safe use of X-rays. Contents: why protection from X-rays; responsibility for radiation protection; protection during a dental examination; ensuring a safe installation; sources of further information. Appendices: maximum permissible doses; useful addresses; summary of relevant recommendations from the Code of Practice; notes on film processing.

  17. Phosphorus-32: practical radiation protection

    International Nuclear Information System (INIS)

    Ballance, P.E.; Morgan, J.

    1987-01-01

    This monograph offers practical advice to Radiation Protection Advisors, Radiation Protection Supervisors and Research Supervisors, together with research workers, particularly those in the field of molecular biological research. The subject is dealt with under the following headings: physical properties, radiation and measurement methods, radiation units, phosphorus metabolism and health risks, protection standards and practical radiation protection, administrative arrangements, accidents, decontamination, emergency procedures, a basic written system for radiochemical work, with specialised recommendations for 32 P, and guidance notes of accident situations involving 32 P. (U.K.)

  18. Protection of industrial power systems

    CERN Document Server

    DAVIES, T

    2006-01-01

    The protection which is installed on an industrial power system is likely to be subjected to more difficult conditions than the protection on any other kind of power system. Starting with the many simple devices which are employed and covering the whole area of industrial power system protection, this book aims to help achieve a thorough understanding of the protection necessary.Vital aspects such as the modern cartridge fuse, types of relays, and the role of the current transformer are covered and the widely used inverse definite-minimum time overcurrent relay, the theory of the M

  19. Mains protection. 4. ed.; Netzschutztechnik

    Energy Technology Data Exchange (ETDEWEB)

    Schossig, Thomas [Omicron Electronics GmbH, Klaus (Austria); Schossig, Walter

    2013-06-01

    Besides the description of the function of the line equipment, transformer protection functions and protection equipments, selective earth fault detection, voltage regulation, the control of the detuning information for the selection, commissioning and business management will be given. Special emphasis is put on a general adjustment standards and audit recommendations. Also transducers, auxiliary power supply and switching fault detection as well as classifications for equipment and circuit documents are mentioned. Updates affect particularly error clarification times, stimulation reliability, protection of SF6 switchgear, power directional frequency load shedding, protection of decentralized power plants, selective earth fault detection and communication in switch boards.

  20. CEBAF - environmental protection program plan

    International Nuclear Information System (INIS)

    1995-01-01

    An important objective in the successful operation of the Continuous Electron Beam Accelerator Facility (CEBAF) is to ensure protection of the public and the environment. To meet this objective, the Southeastern Universities Research Association, Inc., (SURA) is committed to working with the US Department of Energy (DOE) to develop, implement, and manage a sound and workable environmental protection program at CEBAF. This environmental protection plan includes information on environmental monitoring, long-range monitoring, groundwater protection, waste minimization, and pollution prevention awareness program plan

  1. Systematic approach in protection and ergonomics testing personal protective equipment

    NARCIS (Netherlands)

    Hartog. E.A. den

    2009-01-01

    In the area of personal protection against chemical and biological (CB) agents there is a strong focus on testing the materials against the relevant threats. The testing programs in this area are elaborate and are aimed to guarantee that the material protects according to specifications. This

  2. Combined group ECC protection and subgroup parity protection

    Science.gov (United States)

    Gara, Alan G.; Chen, Dong; Heidelberger, Philip; Ohmacht, Martin

    2013-06-18

    A method and system are disclosed for providing combined error code protection and subgroup parity protection for a given group of n bits. The method comprises the steps of identifying a number, m, of redundant bits for said error protection; and constructing a matrix P, wherein multiplying said given group of n bits with P produces m redundant error correction code (ECC) protection bits, and two columns of P provide parity protection for subgroups of said given group of n bits. In the preferred embodiment of the invention, the matrix P is constructed by generating permutations of m bit wide vectors with three or more, but an odd number of, elements with value one and the other elements with value zero; and assigning said vectors to rows of the matrix P.

  3. Optimization and radiation protection culture

    International Nuclear Information System (INIS)

    Jeon, In Young; Shin, Hyeong Ki; Lee, Chan Mi

    2013-01-01

    Safety culture or radiation protection culture is based in common on the term, 'culture'. Culture is defined as the learned, shared set of symbols and patterns of basic assumptions, which is invented, discovered, or developed by a given group as it learns to cope with its problem of external adaptation and internal integration. Safety culture generally refers to the attitude and behaviors affecting safety performance. The concept of 'Safety Culture' was introduced after the Chernobyl accident in 1986. For the accident, nuclear society reached the conclusion that the cause was the wrong management attitude of the NPP, that is, deficient 'Safety Culture'. Recently, 'Radiation Protection Culture' was introduced as the core concept of nuclear safety culture. There have been many efforts to establish definition and develop assessment tool for radiation protection culture in international level such as ICRP and IRPA as well as NRC. In the same context with the safety culture, radiation protection culture is defined as 'the core values and behaviors resulting from a collective commitment by leaders and individual's to emphasize safety over competing goals to ensure protection of people and the environment.' It is worthwhile to recognize that regulatory enforcement in establishing healthy radiation protection culture of operators should be minimized because culture is not in the domain of regulatory enforcement. However, as 'ALARA', the most important concept in radiation protection, may be successfully achieved only in well established radiation protection culture, the least regulatory intervention would be needed in promoting and nurturing radiation protection culture in licensee. In addition, the concept of radiation protection culture should be addressed in plant operational policy to achieve the goals of ALARA. The pre-condition of the successful radiation protection culture is a healthy organizational

  4. Optimization and radiation protection culture

    Energy Technology Data Exchange (ETDEWEB)

    Jeon, In Young; Shin, Hyeong Ki; Lee, Chan Mi [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2013-04-15

    Safety culture or radiation protection culture is based in common on the term, 'culture'. Culture is defined as the learned, shared set of symbols and patterns of basic assumptions, which is invented, discovered, or developed by a given group as it learns to cope with its problem of external adaptation and internal integration. Safety culture generally refers to the attitude and behaviors affecting safety performance. The concept of 'Safety Culture' was introduced after the Chernobyl accident in 1986. For the accident, nuclear society reached the conclusion that the cause was the wrong management attitude of the NPP, that is, deficient 'Safety Culture'. Recently, 'Radiation Protection Culture' was introduced as the core concept of nuclear safety culture. There have been many efforts to establish definition and develop assessment tool for radiation protection culture in international level such as ICRP and IRPA as well as NRC. In the same context with the safety culture, radiation protection culture is defined as 'the core values and behaviors resulting from a collective commitment by leaders and individual's to emphasize safety over competing goals to ensure protection of people and the environment.' It is worthwhile to recognize that regulatory enforcement in establishing healthy radiation protection culture of operators should be minimized because culture is not in the domain of regulatory enforcement. However, as 'ALARA', the most important concept in radiation protection, may be successfully achieved only in well established radiation protection culture, the least regulatory intervention would be needed in promoting and nurturing radiation protection culture in licensee. In addition, the concept of radiation protection culture should be addressed in plant operational policy to achieve the goals of ALARA. The pre-condition of the successful radiation protection culture is a healthy organizational

  5. Protecting the ozone layer.

    Science.gov (United States)

    Munasinghe, M; King, K

    1992-06-01

    Stratospheric ozone layer depletion has been recognized as a problem by the Vienna Convention for the Protection of the Ozone Layer and the 1987 Montreal Protocol (MP). The ozone layer shields the earth from harmful ultraviolet radiation (UV-B), which is more pronounced at the poles and around the equator. Industrialized countries have contributed significantly to the problem by releasing chlorofluorocarbons (CFCs) and halons into the atmosphere. The effect of these chemicals, which were known for their inertness, nonflammability, and nontoxicity, was discovered in 1874. Action to deal with the effects of CFCs and halons was initiated in 1985 in a 49-nation UN meeting. 21 nations signed a protocol limiting ozone depleting substances (ODS): CFCs and halons. Schedules were set based on each country's use in 1986; the target phaseout was set for the year 2000. The MP restricts trade in ODSs and weights the impact of substances to reflect the extent of damage; i.e., halons are 10 times more damaging than CFCs. ODS requirements for developing countries were eased to accommodate scarce resources and the small fraction of ODS emissions. An Interim Multilateral Fund under the Montreal Protocol (IMFMP) was established to provide loans to finance the costs to developing countries in meeting global environmental requirements. The IMFMP is administered by the World Bank, the UN Environmental Program, and the UN Development Program. Financing is available to eligible countries who use .3 kg of ODS/person/year. Rapid phaseout in developed countries has occurred due to strong support from industry and a lower than expected cost. Although there are clear advantages to rapid phaseout, there were no incentives included in the MP for rapid phaseout. Some of the difficulties occur because the schedules set minimum targets at the lowest possible cost. Also, costs cannot be minimized by a country-specific and ODS-specific process. The ways to improve implementation in scheduling and

  6. Protecting Sudan’s children

    Directory of Open Access Journals (Sweden)

    Julia Freedson

    2007-07-01

    Full Text Available The protection and well-being of children in Sudan are at a crucial juncture. While children in the South are enjoying improved security and access to services, those in Darfur continue to face appalling levels of violence and denial of basic services. Protection of children must be at the forefront of efforts to bring peace and stability to Sudan.

  7. Crop Protection in Medieval Agriculture

    NARCIS (Netherlands)

    Zadoks, J.C.

    2013-01-01

    Mediterranean and West European pre-modern agriculture (agriculture before 1600) was by necessity ‘organic agriculture’. Crop protection is part and parcel of this agriculture, with weed control in the forefront. Crop protection is embedded in the medieval agronomy text books but specialised

  8. Bioassay programs for radiation protection

    International Nuclear Information System (INIS)

    1979-01-01

    This report discusses the rationale for the establishment of bioassay programs as a means of protection for radiation workers in the nuclear industry. The bioassay program of the Radiation Protection Bureau is described for the years 1966-1978 and plans for future changes are outlined. (auth)

  9. Google and personal data protection

    NARCIS (Netherlands)

    van der Sloot, B.; Zuiderveen Borgesius, F.; Lopez-Tarruella, A.

    2012-01-01

    This chapter discusses the interplay between the European personal data protection regime and two specific Google services, Interest-Based Advertising and Google Street View. The chapter assesses first the applicability of the Data Protection Directive, then jurisdictional issues, the principles

  10. Adaptive protection algorithm and system

    Science.gov (United States)

    Hedrick, Paul [Pittsburgh, PA; Toms, Helen L [Irwin, PA; Miller, Roger M [Mars, PA

    2009-04-28

    An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

  11. Micrometeorological principles of protected cultivation

    Science.gov (United States)

    Protected cultivation is a broad term commonly used among producers of specialty crops. Techniques can range from complex fixed structures to field site selection, to straightforward cultural practices in the field. This introduction to the ASHS workshop "Protected cultivation for fruit crops" consi...

  12. Groundwater protection management program plan

    International Nuclear Information System (INIS)

    1992-06-01

    US Department of Energy (DOE) Order 5400.1 requires the establishment of a groundwater protection management program to ensure compliance with DOE requirements and applicable Federal, state, and local laws and regulations. The Uranium Mill Tailings Remedial Action (UMTRA) Project Office has prepared a ''Groundwater Protection Management Program Plan'' (groundwater protection plan) of sufficient scope and detail to reflect the program's significance and address the seven activities required in DOE Order 5400.1, Chapter 3, for special program planning. The groundwater protection plan highlights the methods designed to preserve, protect, and monitor groundwater resources at UMTRA Project processing and disposal sites. The plan includes an overview of the remedial action status at the 24 designated processing sites and identifies project technical guidance documents and site-specific documents for the UMTRA groundwater protection management program. In addition, the groundwater protection plan addresses the general information required to develop a water resources protection strategy at the permanent disposal sites. Finally, the plan describes ongoing activities that are in various stages of development at UMTRA sites (long-term care at disposal sites and groundwater restoration at processing sites). This plan will be reviewed annually and updated every 3 years in accordance with DOE Order 5400.1

  13. Freeze Protection in Gas Holders

    DEFF Research Database (Denmark)

    Hjorth, Poul G.; Duursma, Gail

    In cold weather, the water seals of gasholders need protection from freez- ing to avoid compromising the seal. These holders have a large reservoir of “tank water” at the base which is below ground. At present freeze- protection is achieved by external heating of the seal water which...

  14. Radiation protection - thirty years after

    International Nuclear Information System (INIS)

    Ninkovic, M.M.

    1989-01-01

    In this paper is discussed some questions in the field of Radiation Protection as like: historical prologue of radiations discovery and it's systematics; radiation and radiation protection; ALARA principle and 'de minimis' approach; radiation risks and dose limits and radiation and chemicals a risk comparison (author)

  15. Radiation protection - thirty years after

    Energy Technology Data Exchange (ETDEWEB)

    Ninkovic, M M [Institute of Nuclear Sciences Boris Kidric, Vinca, Beograd (Serbia and Montenegro)

    1989-07-01

    In this paper is discussed some questions in the field of Radiation Protection as like: historical prologue of radiations discovery and it's systematics; radiation and radiation protection; ALARA principle and 'de minimis' approach; radiation risks and dose limits and radiation and chemicals a risk comparison (author)

  16. Radiation protection - quality and metrology

    International Nuclear Information System (INIS)

    Broutin, J.P.

    2002-01-01

    The radiation protection gathers three occupations: radiation protection agents; environment agents ( control and monitoring); metrology agents ( activities measurement and calibration). The quality and the metrology constitute a contribution in the technique competence and the guarantee of the service quality. This article, after a historical aspect of quality and metrology in France explains the advantages of such a policy. (N.C.)

  17. Eye Protection in Kansas Schools.

    Science.gov (United States)

    Hay, Kenneth M.; And Others

    A law passed by a state legislature requires that students in industrial arts shops and science laboratories must wear eye protective devices. Explanatory material presents the text of the bill and guidelines for implementation, including--(1) types of eye hazards, (2) types of protective devices, (3) administrating eye safety equipment, (4)…

  18. GEOGRAPHY AND ENVIRONMENTAL PROTECTION AGENCY

    Science.gov (United States)

    The US Environmental Protection Agency helps state and local governments protect the environment by encouraging good environmental management and by regulating human activities to ensure clean air and water. At the Corvallis research laboratory for the EPA, we improve the ways t...

  19. Radiation protection, optimization and justification

    International Nuclear Information System (INIS)

    Cordoliani, Y.S.; Brisse, H.; Foucart, J.M.; Clement, J.P.; Ribeiro, A.; Gomes, H.; Marcus, C.; Rehel, J.L.; Talbot, A.; Aubert, B.; Scanff, P.; Roudier, C.; Donadieu, J.; Pirard, P.; Bar, O.; Maccia, C.; Benedittini, M.; Bouziane, T.; Brat, H.; Bricoult, M; Heuga, O.; Hauger, O.; Bonnefoy, O.; Diard, F.; Chateil, J.F.; Schramm, R.; Reisman, J.; Aubert, B.

    2005-01-01

    Nine articles in the field of radiation protection relative to the medical examinations concern the new legislation in radiation protection, the optimization of this one in order to reduce the radiation doses delivered to the patients, the side effects induced by irradiation and to give an evaluation of the medical exposure of french population to ionizing radiations. (N.C.)

  20. 187 DISPLACEMENT AND ENVIRONMENTAL PROTECTION

    African Journals Online (AJOL)

    Fr. Ikenga

    The national and international communities are confronted with the monumental task of ... displacement and environmental protection present a vicious cycle which today has ... Thus, issues of environmental protection viz-a-viz investment and .... out the conditions for product or process standards, the use of best available ...