WorldWideScience

Sample records for secure safe isotope

  1. SAFE/SNAP application to shipboard security

    International Nuclear Information System (INIS)

    Grady, L.M.; Walker, J.L.; Polito, J.

    1981-11-01

    An application of the combined Safeguards Automated Facility Evaluation/Safeguards Network Analysis Procedure (SAFE/SNAP) modeling technique to a physical protection system (PPS) aboard a generic ship is described. This application was performed as an example of how the SAFE and SNAP techniques could be used. Estimates of probability of interruption and neutralization for the example shipboard PPS are provided by SAFE as well as an adversary scenario, which serves as input to SNAP. This adversary scenario is analyzed by SNAP through four cases which incorporate increasingly detailed security force tactics. Comparisons between the results of the SAFE and SNAP analyses are made and conclusions drawn on the validity of each technique. Feedback from SNAP to SAFE is described, and recommendations for upgrading the ship based on the results of the SAFE/SNAP application are also discussed

  2. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  3. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  4. Keeping Sealed Radioactive Sources Safe and Secure

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Radioactive sources are used in a wide variety of devices in medical, industrial, agricultural and research facilities worldwide. These sources, such as cobalt-60 and caesium-137, emit high levels of ionizing radiation, which can treat cancer, measure materials used in industry and sterilize food and medical appliances. Problems may arise when these sources are no longer needed, or if they are damaged or decayed. If these sources are not properly stored they can be a threat to human health and the environment and pose a security risk. Procedures to secure these spent or 'disused' sources are often highly expensive and need specialized assistance. The IAEA helps its States find long term solutions for the safe and secure storage of disused sealed radioactive sources (DSRSs)

  5. Global Security, Medical Isotopes, and Nuclear Science

    Science.gov (United States)

    Ahle, Larry

    2007-10-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R&D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities.

  6. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  7. Global Security, Medical Isotopes, and Nuclear Science

    International Nuclear Information System (INIS)

    Ahle, Larry

    2007-01-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R and D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities

  8. Ultra Safe And Secure Blasting System

    Energy Technology Data Exchange (ETDEWEB)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  9. Integrated safeguards and security for the INEL Special Isotope Separation Plant

    International Nuclear Information System (INIS)

    Warner, G.F.; Zack, N.R.

    1990-01-01

    This paper describes the development of the safeguards and security system that was to be used for the Special Isotope Separation (SIS) Production Plant. The US Department of Energy has postponed the construction of the SIS Plant that was to be built at the Idaho National Engineering Laboratory (INEL) site near Idaho Falls, Idaho. The Plant was designed to produce weapons grade plutonium from DOE owned fuel grade plutonium by converting off-spec. plutonium dioxide into metal buttons that would meet required chemical and isotopic specifications. Because this was to be a completely new facility there was a unique opportunity to provide an in-depth, ''state-of-the- art'' safeguards and security system without attempting to overlay upon an existing, older system. This facility was being designed to be in complete compliance with the new DOE Orders by integrating safeguards and security into the plant operating system and by providing graded protection to the areas of varying sensitivity within the plant

  10. Safe handling of radioactive isotopes. Handbook 42

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1949-09-15

    With the increasing use of radioactive isotopes by industry, the medical profession, and research laboratories, it is essential that certain minimal precautions be taken to protect the users and the public. The recommendations contained in this handbook represent what is believed to be the best available opinions on the subject as of this date. As our experience with radioisotopes broadens, we will undoubtedly be able to improve and strengthen the recommendations for their safe handling and utilization. Through the courtesy of the National Research Council about a year ago, several hundred draft copies of this report were circulated to all leading workers and authorities in the field for comment and criticism. The present handbook embodies all pertinent suggestions received from these people. Further comment will be welcomed by the committee. One of the greatest difficulties encountered in the preparation of this handbook lay in the uncertainty regarding permissible radiation exposure levels - particularly for ingested radioactive materials. The establishment of sound figures for such exposure still remains a problem of high priority for many conditions and radioactive substances. Such figures as are used in this report represent the best available information today. If, in the future, these can be improved upon, appropriate corrections will be issued. The subject will be under continuous study by the two subcommittees mentioned above. The present Handbook has been prepared by the Subcommittee on the Handling of Radioactive Isotopes and Fission Products.

  11. Safe handling of radioactive isotopes. Handbook 42

    International Nuclear Information System (INIS)

    1949-09-01

    With the increasing use of radioactive isotopes by industry, the medical profession, and research laboratories, it is essential that certain minimal precautions be taken to protect the users and the public. The recommendations contained in this handbook represent what is believed to be the best available opinions on the subject as of this date. As our experience with radioisotopes broadens, we will undoubtedly be able to improve and strengthen the recommendations for their safe handling and utilization. Through the courtesy of the National Research Council about a year ago, several hundred draft copies of this report were circulated to all leading workers and authorities in the field for comment and criticism. The present handbook embodies all pertinent suggestions received from these people. Further comment will be welcomed by the committee. One of the greatest difficulties encountered in the preparation of this handbook lay in the uncertainty regarding permissible radiation exposure levels - particularly for ingested radioactive materials. The establishment of sound figures for such exposure still remains a problem of high priority for many conditions and radioactive substances. Such figures as are used in this report represent the best available information today. If, in the future, these can be improved upon, appropriate corrections will be issued. The subject will be under continuous study by the two subcommittees mentioned above. The present Handbook has been prepared by the Subcommittee on the Handling of Radioactive Isotopes and Fission Products

  12. Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms

    OpenAIRE

    Portnoi, Marcos; Shen, Chien-Chung

    2014-01-01

    This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and securit...

  13. DOES FOOD SAFETY CONFLICT WITH FOOD SECURITY? THE SAFE CONSUMPTION OF FOOD

    OpenAIRE

    Kinsey, Jean D.

    2004-01-01

    This paper concludes by saying no, food safety and security reinforce each other. It combines food safety and food security into the concept of "safe food consumption." Unsafe food consumption occurs when food contains known substances that lead to short or long term illness or death (botulism) and suspect substances that are believed to lead to delayed diseases (pesticides). It also occurs when hunger or over eating contribute to long-term illness and shorter life expectancy. The costs of il...

  14. The experience of the Republic of Belarus in the field of safe and secure transport of radioactive material

    International Nuclear Information System (INIS)

    Astashka, R.; Kronava, Z.; Prykhodzka, A.; Tkachonak, I.

    2016-01-01

    The experience of the safe and secure transport of radioactive material of the Republic of Belarus includes domestic and international movements. Transit is a substantial part of international movements taking into account the location of the country. Legislative and regulatory requirements on safety and security of radioactive material transport being in force in the country include the demands making by such state structures as the Department on Nuclear and Radiation Safety, the Department on supervision for the safe industrial activities, the Ministry of Health of the Republic of Belarus. At the same time response to accidents and security events belongs to the scope of activity of special subdivisions of the Ministry for Emergency Situations and the Ministry of Internal Affairs of the Republic of Belarus. For safety purposes all the above-mentioned structures are executing their duties in close collaboration with each other and are following the IAEA safety and security recommendations. The regulatory infrastructure concerning the safe and secure transport of radioactive material of the Republic of Belarus is the subject of the contributed paper. (author)

  15. Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.

    Science.gov (United States)

    Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y

    2010-05-01

    A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.

  16. Safe Grid

    Science.gov (United States)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote

  17. Stable isotope usage in developing countries: Safe tracer tools to measure human nutritional status

    International Nuclear Information System (INIS)

    Klein, P.D.; Klein, E.R.

    1987-01-01

    How many calories are used when a nursing mother feeds her infant? How much milk does an infant receive in one week? What is the impact of the environment on the energy needs of children? How adequately does dietary protein sustain the synthesis of body constituents? What types of foods best nourish a child recovering from intestinal diseases such as diarrhoea? Quantitative answers to questions such as these can be obtained from the use of stable, non-radioactive isotopic tracers. Answers to these questions are important in assessing the nutritional status of infants, children, pregnant women and nursing mothers, as well as that of individuals who subsist on marginal food supplies. Because stable isotopic tracers are completely safe and without hazard, they can be used freely in health, nutrition, and agriculture studies in all populations

  18. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  19. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  20. Regulatory Framework and Current Practices of the Radioactive Material Safe and Secure Transport in Albania

    International Nuclear Information System (INIS)

    Dollani, K.; Grillo, B.; Telhaj, E.

    2016-01-01

    Attempts for the establishing of a safe and secure radioactive material transport in Albania began a decade ago with formulation of the different regulation in the field of safe and secure handling of the radioactive materials. In 2004 a special regulation for the safe transport of radioactive material was prepared and approved by the National Radiation Protection Commission). This regulation has been based in the IAEA standards for the radioactive material transport and was reviewed periodically. The last regulation of the radioactive material transport was approved by Albanian government through a governmental ordinance. The transport of the radioactive material in Albania is performed by licensed subjects, which fulfill all requirements of the mentioned governmental ordinance. Based in the existing regulation, for each transport of radioactive material, a special permission is issued by NRPC. The issuing of permission allows competent authority to provide necessary information on transport regularity and to have under survey all transports of the radioactive material carried out inside the country. Last year were issued more than 80 permissions for the transport of the different types and categories of the radioactive sources. (author)

  1. Safe and Secure Transportation of Radioactive Materials in Pakistan and Future Challenges

    International Nuclear Information System (INIS)

    Muneer, Muhammad; Ejaz, Asad

    2016-01-01

    PNRA is the sole organization in the country responsible to regulate all matters pertaining to ionizing radiations. For the safety of transport of radioactive material in the country, PNRA has adopted IAEA TS-R-1 as a national regulation. To cover the security aspects and emergency situations, if any, during the transportation of radioactive material, PNRA has issued the regulatory guide on ‘Transportation of Radioactive Material by Road in Pakistan’. In Pakistan, low to medium activity radioactive sources are transported from one place to another by road for the purpose of industrial radiography, well logging, medical application, etc. According to national policy, sealed radioactive sources of half life greater than 1 year and with initial activity of 100 GBq or more imported in the country are required to be returned to country of origin (exported) after its use. Although the activities related to transport of radioactive material remained safe and secure and no major accident/incident has been reported so far, however, the improvement/enhancement in the regulatory infrastructure is a continuous process. In future, more challenges are expected to be faced in the safety of transport packages. This paper will describe the steps taken by PNRA for the safety and security of transport of radioactive material in the country and future challenges. (author)

  2. Definition of the «Economic Security of an Enterprise» and «Safe Development of an Enterprise» Notions

    Directory of Open Access Journals (Sweden)

    Yefimova Ganna V.

    2013-11-01

    Full Text Available The necessity of this study is explained by difference of opinions regarding understanding of the “economic security of an enterprise” notion, on the one hand, and the poorly studied issue of a combination of the process of enterprise development with a necessary task of ensuring a high level of its economic security, on the other hand. Analysing, systemising and generalising results of scientific studies, the article identifies that economic security of an enterprise is an economic category, which characterises the enterprise functioning conditions. Favourable conditions of functioning ensure a high level of stability and steadiness of an enterprise and its ability of self-realisation and expanded self-reproduction. This becomes possible if an enterprise is capable of resisting external threats and preventing internal ones. Since development of an enterprise is an objective process, which takes place under conditions of uncertainty and changeability of external and internal environments, it is accompanied with a system of threats, which the system of economic security should protect an enterprise from. Taking into account the above, safe development of an enterprise is a process of consecutive transitions of the economic system from one state to another, which is not of a poorer quality than a previous one, which envisages producing new goals and creation of safe conditions for transition from one specific goal, achieved in the process of enterprise functioning, to another. The proposed definitions allow consideration of such significant issues of methodology of management of safe development of an enterprise as the diagnostics of its level and planning.

  3. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  4. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  5. How Safe Are Our Libraries?

    Science.gov (United States)

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  6. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo; Lowe, Kathleen M.; Tucker, Mark D; Salerno, Reynolds Mathewson; Souza, Caroline Ann

    2006-11-01

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

  7. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  8. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    Energy Technology Data Exchange (ETDEWEB)

    MCCOY,JAMES A.

    2000-08-29

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  9. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  10. 78 FR 68784 - Cargo Securing Manuals

    Science.gov (United States)

    2013-11-15

    .../Circ.) 1352 (``Cargo Stowage and Securing (CSS Code) Annex 14 Guidance on Providing Safe Working... Providing Safe Working Conditions for the Securing of Containers'') of the IMO 2010 CSS Code. A cargo safe.... Indian Tribal Governments K. Energy Effects L. Technical Standards M. Environment I. Public Participation...

  11. The US national isotope program: Current status and strategy for future success

    International Nuclear Information System (INIS)

    Rivard, Mark J.; Bobek, Leo M.; Butler, Ralph A.; Garland, Marc A.; Hill, David J.; Krieger, Jeanne K.; Muckerheide, James B.; Patton, Brad D.; Silberstein, Edward B.

    2005-01-01

    Since their introduction in the 1940s, peaceful use of stable isotopes and radioisotopes in the United States has expanded continuously. Today, new isotopes for diagnostic and therapeutic uses are not being developed, critical isotopes for national security are in short supply, and demand for isotopes critical to homeland security exceeds supply. While commercial suppliers, both domestic and foreign, can only meet specific needs, the nation needs a consistent, reliable supply of radioactive and stable isotopes for research, medical, security, and space power applications. The national isotope infrastructure, defined as both facilities and trained staff at national laboratories and universities, is in danger of being lost due to chronic underfunding. With the specific recommendations given herein, the US Department of Energy may realign and refocus its Isotope Program to provide a framework for a successful National Isotope Program

  12. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.J.; Bastiaansen, H.J.M.; Berg, J. van den; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two bigchallenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  13. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.; Bastiaansen, H.; Van den Berg, J.; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two big challenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  14. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  15. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  16. Safe actinide disposition in molten salt reactors

    International Nuclear Information System (INIS)

    Gat, U.

    1997-01-01

    Safe molten salt reactors (MSR) can readily accommodate the burning of all fissile actinides. Only minor compromises associated with plutonium are required. The MSRs can dispose safely of actinides and long lived isotopes to result in safer and simpler waste. Disposing of actinides in MSRs does increase the source term of a safety optimized MSR. It is concluded that the burning and transmutation of actinides in MSRs can be done in a safe manner. Development is needed for the processing to handle and separate the actinides. Calculations are needed to establish the neutron economy and the fuel management. 9 refs

  17. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  18. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  19. Safe and secure: transportation of radioactive materials

    International Nuclear Information System (INIS)

    Howe, D.

    2015-01-01

    Western Waste Management Facility is Central Transportation Facility for Low and Intermediate waste materials. Transportation support for Stations: Reactor inspection tools and heavy water between stations and reactor components and single bundles of irradiated fuel to AECL-Chalk River for examination. Safety Track Record: 3.2 million kilometres safely travelled and no transportation accident - resulting in a radioactive release.

  20. Some Questions on the Fixation of Radioisotopes in Connexion with the Problem of their Safe Burial

    Energy Technology Data Exchange (ETDEWEB)

    Zimakov, P. V.; Kulichenko, V. V.

    1960-07-01

    For the safe disposal of radioactive wastes it is essential that they be securely fixed in a suitable material for a long period. This is true regardless of the place or medium chosen for disposal. The chief source of danger in any given 'burial ground' is the threat of possible leakage resulting in the buried radioisotopes being dispersed in the environment. In recent times attention has been primarily directed to the question of disposing of the fission-produced radioisotopes which are formed in large quantities in many-countries during the release of energy through the fission of heavy nuclei in various nuclear power units (reactors). The present paper will discuss certain questions connected with the processing and disposal of wastes containing fission-produced isotopes.

  1. Safeness of radiological machinery

    International Nuclear Information System (INIS)

    Yokoyama, Shun

    1979-01-01

    The human factors affecting the safeness of radiological machinery, which are often very big and complicated machines, are described from the stand point of handling. 20 to 50% of the troubles on equipments seem to be caused by men. This percentage will become even higher in highly developed equipments. Human factors have a great influence on the safeness of radiological equipments. As the human factors, there are sensory factors and knowledge factors as well as psychological factors, and the combination of these factors causes mishandling and danger. Medical services at present are divided in various areas, and consist of the teamwork of the people in various professions. Good human relationship, education and control are highly required to secure the safeness. (Kobatake, H.)

  2. Experiences for the Safe and Secure transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2016-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  3. Experiences for the Safe and Secure Transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2011-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  4. Compelling Research Opportunities using Isotopes

    International Nuclear Information System (INIS)

    2009-01-01

    Isotopes are vital to the science and technology base of the US economy. Isotopes, both stable and radioactive, are essential tools in the growing science, technology, engineering, and health enterprises of the 21st century. The scientific discoveries and associated advances made as a result of the availability of isotopes today span widely from medicine to biology, physics, chemistry, and a broad range of applications in environmental and material sciences. Isotope issues have become crucial aspects of homeland security. Isotopes are utilized in new resource development, in energy from bio-fuels, petrochemical and nuclear fuels, in drug discovery, health care therapies and diagnostics, in nutrition, in agriculture, and in many other areas. The development and production of isotope products unavailable or difficult to get commercially have been most recently the responsibility of the Department of Energy's Nuclear Energy program. The President's FY09 Budget request proposed the transfer of the Isotope Production program to the Department of Energy's Office of Science in Nuclear Physics and to rename it the National Isotope Production and Application program (NIPA). The transfer has now taken place with the signing of the 2009 appropriations bill. In preparation for this, the Nuclear Science Advisory Committee (NSAC) was requested to establish a standing subcommittee, the NSAC Isotope Subcommittee (NSACI), to advise the DOE Office of Nuclear Physics. The request came in the form of two charges: one, on setting research priorities in the short term for the most compelling opportunities from the vast array of disciplines that develop and use isotopes and two, on making a long term strategic plan for the NIPA program. This is the final report to address charge 1. NSACI membership is comprised of experts from the diverse research communities, industry, production, and homeland security. NSACI discussed research opportunities divided into three areas: (1) medicine

  5. Compelling Research Opportunities using Isotopes

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-23

    Isotopes are vital to the science and technology base of the US economy. Isotopes, both stable and radioactive, are essential tools in the growing science, technology, engineering, and health enterprises of the 21st century. The scientific discoveries and associated advances made as a result of the availability of isotopes today span widely from medicine to biology, physics, chemistry, and a broad range of applications in environmental and material sciences. Isotope issues have become crucial aspects of homeland security. Isotopes are utilized in new resource development, in energy from bio-fuels, petrochemical and nuclear fuels, in drug discovery, health care therapies and diagnostics, in nutrition, in agriculture, and in many other areas. The development and production of isotope products unavailable or difficult to get commercially have been most recently the responsibility of the Department of Energy's Nuclear Energy program. The President's FY09 Budget request proposed the transfer of the Isotope Production program to the Department of Energy's Office of Science in Nuclear Physics and to rename it the National Isotope Production and Application program (NIPA). The transfer has now taken place with the signing of the 2009 appropriations bill. In preparation for this, the Nuclear Science Advisory Committee (NSAC) was requested to establish a standing subcommittee, the NSAC Isotope Subcommittee (NSACI), to advise the DOE Office of Nuclear Physics. The request came in the form of two charges: one, on setting research priorities in the short term for the most compelling opportunities from the vast array of disciplines that develop and use isotopes and two, on making a long term strategic plan for the NIPA program. This is the final report to address charge 1. NSACI membership is comprised of experts from the diverse research communities, industry, production, and homeland security. NSACI discussed research opportunities divided into three areas: (1

  6. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  7. Subjective Security in a Volatile Geopolitical Situation: Does Lithuanian Society Feel Safe?

    Directory of Open Access Journals (Sweden)

    Vileikienė Eglė

    2016-12-01

    Full Text Available The geopolitical situation of Lithuania has deteriorated since the annexation of Crimea and the military conflict in Eastern Ukraine. It has affected the objective security of the state as well as subjective security of the Lithuanian population. This article analyses subjective security and deals with the subjective perception of geopolitical and military threats, mainly social attitudes towards national security and the willingness to defend the country. Article is based on theories of securitisation and human security and holds that individuals are the primary referents of security. Empirically, the article relies on the original data of the research project “Subjective Security in a Volatile Geopolitical Context: Traits, Factors and Individual Strategies”, funded by the Research Council of Lithuania. Article shows the dynamics of social attitudes towards security. Over the last 15 years, a clear shift towards the understanding of potential military threats has occurred. Nevertheless, the predominant concern about individual security, overshadowing security of the state and security of the global order, found in previous studies, has persisted. An individual, as a rule, feels most secure in his/her “closest” environment, e.g. family and friends, and least secure in the “farthest” environment, e.g. other continents.

  8. Production Situation and Technology Prospect of Medical Isotopes

    Directory of Open Access Journals (Sweden)

    GAO Feng;LIN Li;LIU Yu-hao;MA Xing-jun

    2016-10-01

    Full Text Available The isotope production technology was overviewed, including traditional and newest technology. The current situation of medical isotope production was introduced. The problems faced by isotope supply and demand were analyzed. The future development trend of medical isotopes and technology prospect were put forward. As the most populous country, nuclear medicine develops rapidly, however, domestic isotope mainly relies on imports. The highly productive and relatively safe MIPR is expected to be an effective way to breakthrough the bottleneck of the development of nuclear medicine. Traditional isotope production technologies with reactor can be improved. It's urgent to research and promote new isotope production technologies with reactor. Those technologies which do not depend on reactor will have a bright market prospects.

  9. Staying Safe on Social Network Sites

    Science.gov (United States)

    ... Tips Security Tip (ST06-003) Staying Safe on Social Networking Sites Original release date: January 26, 2011 | Last revised: ... so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as "friend- ...

  10. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-01-01

    The SAFE procedure is an efficient method of evaluating the physical protection system of a nuclear facility. Since the algorithms used in SAFE for path generation and evaluation are analytical, many paths can be evaluated with a modest investment in computer time. SAFE is easy to use because the information required is well-defined and the interactive nature of this procedure lends itself to straightforward operation. The modular approach that has been taken allows other functionally equivalent modules to be substituted as they become available. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  11. The struggle for safe nuclear expansion in China

    International Nuclear Information System (INIS)

    Xu, Y.C.

    2014-01-01

    After a temporary halt following the Fukushima nuclear disaster in March 2011, China resumed its fast, yet cautious, expansion of nuclear energy programme. Nuclear energy is considered as part of the general strategy to deal with the challenges of energy security and climate change and to advance with ‘state of the art’ technology in its development. This article briefly discusses recent development in and driving forces behind nuclear industry in China, and several challenges it has been facing: how to adopt, adapt, standardise and indigenise whose technologies, and how to address the shortage of qualified nuclear engineers, scientists, skilled labour force and qualified regulators. More importantly, it argues that safe and secure nuclear development requires consistent policies and effective regulations. Therefore, it is crucial to build policy and regulatory capacities based on coordination, planning and management of government agencies and the industry. - Highlights: • Nuclear energy development in China. • Nuclear technology selection. • Human capital. • Regulatory regime. • Safe and secure development

  12. Cyber Security: Rule of Use Internet Safely?

    OpenAIRE

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  13. Target-fueled nuclear reactor for medical isotope production

    Science.gov (United States)

    Coats, Richard L.; Parma, Edward J.

    2017-06-27

    A small, low-enriched, passively safe, low-power nuclear reactor comprises a core of target and fuel pins that can be processed to produce the medical isotope .sup.99Mo and other fission product isotopes. The fuel for the reactor and the targets for the .sup.99Mo production are the same. The fuel can be low enriched uranium oxide, enriched to less than 20% .sup.235U. The reactor power level can be 1 to 2 MW. The reactor is passively safe and maintains negative reactivity coefficients. The total radionuclide inventory in the reactor core is minimized since the fuel/target pins are removed and processed after 7 to 21 days.

  14. The Safe Transportation of Radioactive Materials

    International Nuclear Information System (INIS)

    Megrahi, Abdulhafeed; Abu-Ali, Giuma; Enhaba; Ahmed

    2008-01-01

    In this paper, we present the essential conditions that should be required for transporting the radioactive materials. We demonstrate the procedure for transporting the radioactive iodine-131 from the Centre of Renewable Energies and Desalination of Water in Tajoura, Libya to Tripoli Medical Center. The safe measures were taken during the process of the transportation of the isotope produced in the centre including dosimetry analysis and the thickness of the container. (author)

  15. Android: Analysis of its architecture and security mechanism

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    As Android operation system platform is widely used in smart phone, one important aspect should not be ignored -its security. As android is an open mobile platform, and also a programmable software framework, is it more safe than his competitor - Iphone, Symbian and so on? This paper will present some security issues on the mobile phones, analyze the security principles and mechanisms based on the architecture and features of Android OS platform, then it will compare Android with some other mobile operation systems like Iphone, Symbian in area of security to make a conclusion that Android is a safe mobile OS to a certain extent.

  16. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... shall have, at a minimum, the following security devices: (1) A means of protecting cash or other liquid assets, such as a vault, safe, or other secure space; (2) A lighting system for illuminating, during the...

  17. Safe, secure, and clean disposal of final nuclear wastes using 'PyroGreen' strategies

    International Nuclear Information System (INIS)

    Jung, HyoSook; Choi, Sungyeol; Hwang, Il Soon

    2011-01-01

    Spent nuclear fuels (SNFs) present global challenges that must be overcome to pave way for safe, secure, peaceful and clean nuclear energy. As one of innovative solutions, we have proposed an innovative partitioning, transmutation, and disposal approach named as 'PyroGreen' that is designed to eliminate the need for high-level waste repositories. A flowsheet of pyrochemical partitioning process with technically achievable values of decontamination factors on long-living radionuclides has been established to enable all the final wastes to be disposed of as low and intermediate level wastes. The long-term performance of a geological repository was assessed by SAFE-ROCK code for the final wastes from the PyroGreen processing of entire 26,000 MTHM of SNFs arising from lifetime operation of 24 pressurized water reactors. The assessment results agree well with an earlier study in the fact that most harmful radionuclides dominating groundwater migration risk are shown to be long-living fission products including C-14, Cl-36, Se-79, I-129, and Cs-135, whereas most actinides including U, Pu, Np, Am, and Cm are shown to remain near the repository. It is shown that the final wastes can meet the radiological dose limit of current Korean regulation on the low and intermediate level waste repository. Long-living actinide concentration in wastes is comparable with those in wastes in Waste Isolation Pilot Plant that has proved adequately low risk of human intrusion. Overall decontamination factors required for PyroGreen are finally determined as 20,000 for uranium and all transuranic elements whereas much lower values in the range of 10-50 are required for important fission products including Se, Tc, I, Sr, and Cs in order to eliminate the need for any high-level waste repository. It has been shown that experimentally demonstrated recovery rate data for key process steps positively support the feasibility of PyroGreen. SAFE-ROCK code was used to evaluate the long-term performance

  18. Architecture of security management unit for safe hosting of multiple agents

    Science.gov (United States)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  19. The Replacement of Safe Assets: Evidence from the U.S. Bond Portfolio

    OpenAIRE

    Bertaut, Carol C.; Tabova, Alexandra M.; Wong, Vivian

    2014-01-01

    The expansion in financial sector "safe" assets, largely in the form of structured products from the U.S. and the Caribbean, in the lead-up to the global financial crisis has by now been fairly well documented. Using a unique dataset derived from security-level data on U.S. portfolio holdings of foreign securities, we show that since the crisis, it is mostly the foreign financial sector that appears to have met U.S. demand for safe and liquid investment assets by expanding its supply of debt ...

  20. Procedures for the Safe Transport of Radioactive Material

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Lyul; Chung, K. K.; Lee, J. I.; Chang, S. Y.; Lee, T. Y

    2007-11-15

    This technical report describes the procedure and work responsibility along with the regulation and standard necessary for the safe transport of radioactive or contaminated materials. This report, therefore, can be effectively used to secure the public safety as well as to prevent the disastrous event which might be resulted from the transport process of radioactive materials by establishing a procedure and method on the safe packing, handling and transport of radioactive materials.

  1. Radioactive cesium isotope ratios as a tool for determining dispersal and re-dispersal mechanisms downwind from the Nevada Nuclear Security Site.

    Science.gov (United States)

    Snyder, Darin C; Delmore, James E; Tranter, Troy; Mann, Nick R; Abbott, Michael L; Olson, John E

    2012-08-01

    Fractionation of the two longer-lived radioactive cesium isotopes ((135)Cs and (137)Cs) produced by above ground nuclear tests have been measured and used to clarify the dispersal mechanisms of cesium deposited in the area between the Nevada Nuclear Security Site and Lake Mead in the southwestern United States. Fractionation of these isotopes is due to the 135-decay chain requiring several days to completely decay to (135)Cs, and the 137-decay chain less than one hour decay to (137)Cs. Since the Cs precursors are gases, iodine and xenon, the (135)Cs plume was deposited farther downwind than the (137)Cs plume. Sediment core samples were obtained from the Las Vegas arm of Lake Mead, sub-sampled and analyzed for (135)Cs/(137)Cs ratios by thermal ionization mass spectrometry. The layers proved to have nearly identical highly fractionated isotope ratios. This information is consistent with a model where the cesium was initially deposited onto the land area draining into Lake Mead and the composite from all of the above ground shots subsequently washed onto Lake Mead by high intensity rain and wind storms producing a layering of Cs activity, where each layer is a portion of the composite. Copyright © 2012 Elsevier Ltd. All rights reserved.

  2. Sacroiliac secure corridor: analysis for safe insertion of iliosacral screws

    Directory of Open Access Journals (Sweden)

    Henrique Alves Cruz

    2013-08-01

    Full Text Available OBJECTIVE: Posterior pelvic lesions, especially of the sacral-iliac joint, have high mortality and morbidity risks. Definitive fixation is necessary for the joint stabilization, and one option is the sacral percutaneous pinning with screws. Proximity to important structures to this region brings risks to the fixation procedure; therefore, it is important to know the tridimensional anatomy of the pelvis posterior region. Deviations of the surgeon's hand of four degrees may target the screws to those structures; dimorphisms of the upper sacrum and a poor lesion reduction may redound in a screw malpositioning. This study is aimed to evaluate the dimensions of a safe surgical corridor for safe sacroiliac screw insertion and relations with age and sex of the patients. METHOD: One hundred randomly selected pelvis CTs of patients with no pelvic diseases, seen at a tertiary care teaching Hospital. Measurements were made by computer and the safest area for screw insertion was calculated by two methods. The results were expressed in mm (not in degrees, in order to be a further surgical reference. RESULTS: There was a significant size difference in the analyzed sacral vertebra, differing on a wider size in men than in women. There was no significant statistical difference between vertebral size and age. By both methods, a safe area for screw insertion could be defined. CONCLUSION: Age does not influence the width of the surgical corridor. The surgeon has a safe corridor considered narrower when inserting screws in a female pelvis than when in a male one. However, as the smallest vertebra found (feminine was considered for statics, it was concluded that this corridor is 20 mm wide in any direction, taking as a reference the centrum of the vertebra.

  3. Shielding container for radioactive isotopes

    International Nuclear Information System (INIS)

    Sumi, Tetsuo; Tosa, Masayoshi; Hatogai, Tatsuaki.

    1975-01-01

    Object: To effect opening and closing bidirectional radiation used particularly for a gamma densimeter or the like by one operation. Structure: This device comprises a rotatable shielding body for receiving radioactive isotope in the central portion thereof and having at least two radiation openings through which radiation is taken out of the isotope, and a shielding container having openings corresponding to the first mentioned radiation openings, respectively. The radioactive isotope is secured to a rotational shaft of the shielding body, and the shielding body is rotated to register the openings of the shielding container with the openings of the shielding body or to shield the openings, thereby effecting radiation and cut off of gamma ray in the bidirection by one operation. (Kamimura, M.)

  4. Plutonium safe handling

    International Nuclear Information System (INIS)

    Tvehlov, Yu.

    2000-01-01

    The abstract, prepared on the basis of materials of the IAEA new leadership on the plutonium safe handling and its storage (the publication no. 9 in the Safety Reports Series), aimed at presenting internationally acknowledged criteria on the radiation danger evaluation and summarizing the experience in the safe management of great quantities of plutonium, accumulated in the nuclear states, is presented. The data on the weapon-class and civil plutonium, the degree of its danger, the measures for provision of its safety, including the data on accident radiation consequences with the fission number 10 18 , are presented. The recommendations, making it possible to eliminate the super- criticality danger, as well as ignition and explosion, to maintain the tightness of the facility, aimed at excluding the radioactive contamination and the possibility of internal irradiation, to provide for the plutonium security, physical protection and to reduce irradiation are given [ru

  5. THE CONSEQUENCES OF GLOBALIZATION UPON SAFE TOURISM

    Directory of Open Access Journals (Sweden)

    Svetlana Mihić

    2009-11-01

    Full Text Available Globalization, a phenomenon on the rise, is characterized by the free cross-bor- der movement of individuals, technologies, and capital. It has far- reaching consequen- ces for tourism, too, as it implies travel for leisure and business, and correspondingly, financial transfers between various nation states. Startinf from the status quo in the field, the current paper sets out to analyze the consequences and implications of globalization upon safe tourism and conduct a marketing research into the perceptions of consumers upon Serbia as a safe vacation destination for the purpose of safe tourism. Finally the research results will be presented and several solutions will be provided for improving security in tourism zones

  6. Surveillance and Maintenance Plan for the 105-C Reactor Safe Storage Enclosure

    International Nuclear Information System (INIS)

    Logan, T. E.

    1998-01-01

    This document provides a plan for implementing surveillance and maintenance activities to ensure that the 105-C Reactor Safe Storage Enclosure is maintained in a safe, environmentally secure, and cost-effective manner until subsequent closure during the final disposition phase of decommissioning

  7. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  8. SMS security system for smart home detectors

    OpenAIRE

    Cekova, Katerina; Gelev, Saso

    2016-01-01

    Security has always been an important problem everywhere. Home security has been a major issue where crime is increasing and everybody wants home security to protect the home. Safety from theft and flame are the most important requirements of a home security system for people. A remote home security system offers many benefits from keeping homeowners, and their property safe. This paper present controlling of the home security system remotely from Android Application. Owners can turn on or...

  9. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  10. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  11. Development of Cyber Security Scheme for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Choi, Y. S.; Cho, J. W. (and others)

    2009-12-15

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures.

  12. Development of Cyber Security Scheme for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Choi, Y. S.; Cho, J. W.

    2009-12-01

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures

  13. Isotopes in Hydrology, Marine Ecosystems and Climate Change Studies, Vol. 2. Proceedings of the International Symposium

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-15

    Humanity is facing many water related challenges, including access to safe water, pollution of continental and coastal waters and ocean acidification, as well as the growing impact of climate change on the hydrological cycle. Many countries are confronted by increasingly stressed water resources due to rapidly growing populations, increasing agricultural and energy production demands, industrial development, and pollution. The greatest issues of the 21st century, including competition for resources and possible related conflicts, may well focus on the role of water in food and energy security. For more than 50 years, the IAEA has played a key role in advancing and promoting the development and use of isotope techniques to address global environmental issues, such as water resources assessment and management, the study of marine ecosystems, and more recently the impact of climate change. This symposium was jointly organized by the Water Resources Programme and IAEA Environment Laboratories to commemorate the 50th anniversary of the establishment of the IAEA laboratory in the Principality of Monaco, and represented the 13th edition of the quadrennial symposium on isotope hydrology and water resources management, which has been regularly organized by the IAEA since 1963. The main objectives of the symposium were to review the state of the art in isotope hydrology, the use of isotopes in the study of climatic systems and in marine ecosystems and to outline recent developments in the application of isotope techniques, as well as to identify future trends and developments for research and applications. The contributions submitted by the authors are included in two volumes of proceedings with editorial corrections. These proceedings are intended to serve as an aid for those using isotopes for applied problems in hydrology as well as for the research community.

  14. Isotopes in Hydrology, Marine Ecosystems and Climate Change Studies. Vol. I. Proceedings of an International Symposium

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-15

    Humanity is facing many water related challenges, including access to safe water, pollution of continental and coastal waters and ocean acidification, as well as the growing impact of climate change on the hydrological cycle. Many countries are confronted by increasingly stressed water resources due to rapidly growing populations, increasing agricultural and energy production demands, industrial development, and pollution. The greatest issues of the 21st century, including competition for resources and possible related conflicts, may well focus on the role of water in food and energy security. For more than 50 years, the IAEA has played a key role in advancing and promoting the development and use of isotope techniques to address global environmental issues, such as water resources assessment and management, the study of marine ecosystems, and more recently the impact of climate change. This symposium was jointly organized by theWater Resources Programme and IAEA Environment Laboratories to commemorate the 50th anniversary of the establishment of the IAEA laboratory in the P rincipality of Monaco, and represented the 13th edition of the quadrennial symposium on isotope hydrology and water resources management, which has been regularly organized by the IAEA since 1963. The main objectives of the symposium were to review the state of the art in isotope hydrology, the use of isotopes in the study of climatic systems and in marine ecosystems and to outline recent developments in the application of isotope techniques, as well as to identify future trends and developments for research and applications. The contributions submitted by the authors are included in two volumes of proceedings with editorial corrections. These proceedings are intended to serve as an aid for those using isotopes for applied problems in hydrology as well as for the research community.

  15. EUROSAFE forum 2013. Safe disposal of nuclear waste

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    The proceedings of the EUROSAFE forum 2013 - safe disposal of nuclear waste include contributions to the following topics: Nuclear installation safety - assessment; nuclear installation safety - research; waste and decommissioning - dismantling; radiation protection, 3nvironment and emergency preparedness; security of nuclear installations and materials.

  16. 75 FR 81556 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2010-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... the public on recommendations for developing new or revised safe harbors and Special Fraud Alerts...

  17. The containment and an absorbent evaluation for a package for a liquid radioactive isotope

    Energy Technology Data Exchange (ETDEWEB)

    Bang, K. S.; Lee, J. C.; Kim, D. H.; Hwang, C. S.; Kim, H. J.; Seo, K. S

    2005-03-01

    Radioactive isotopes must be safely transported from the production centre to the point of use. The shipping package to safely transport radioactive isotopes should be able to withstand the conditions prescribed by law. A type a package, which is used to transport liquid radioactive materials, should have a containment system comprising a primary inner and a secondary outer containment or it should be provided with a sufficiently absorbent material to absorb twice the volume of the liquid contents. Accordingly, an absorbent material for use in a Type A package to transport a liquid radioactive isotope was estimated. To estimate the integrity of containment, the leakage tests for a containment system for a Type A package for domestic and abroad expert were conducted.

  18. Nuclear Resonance Fluorescence and Isotopic Mapping of Containers

    Science.gov (United States)

    Johnson, Micah S.; McNabb, Dennis P.

    2009-03-01

    National security programs have expressed interest in developing systems to isotopically map shipping containers, fuel assemblies, and waste barrels for various materials including special nuclear material (SNM). Current radiographic systems offer little more than an ambiguous density silhouette of a container's contents. In this paper we will present a system being developed at LLNL to isotopically map containers using the nuclear resonance fluorescence (NRF) method. Recent experimental measurements on NRF strengths in SNM are discussed.

  19. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2012-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  20. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2013-12-27

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  1. Disabled Children: The Right to Feel Safe

    Science.gov (United States)

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  2. SECURE nuclear district heating plant

    International Nuclear Information System (INIS)

    Nilsson; Hannus, M.

    1978-01-01

    The role foreseen for the SECURE (Safe Environmentally Clean Urban REactor) nuclear district heating plant is to provide the baseload heating needs of primarily the larger and medium size urban centers that are outside the range of waste heat supply from conventional nuclear power stations. The rationale of the SECURE concept is that the simplicity in design and the inherent safety advantages due to the use of low temperatures and pressures should make such reactors economically feasible in much smaller unit sizes than nuclear power reactors and should make their urban location possible. It is felt that the present design should be safe enough to make urban underground location possible without restriction according to any criteria based on actual risk evaluation. From the environmental point of view, this is a municipal heat supply plant with negligible pollution. Waste heat is negligible, gaseous radioactivity release is negligible, and there is no liquid radwaste release. Economic comparisons show that the SECURE plant is competitive with current fossil-fueled alternatives. Expected future increase in energy raw material prices will lead to additional energy cost advantages to the SECURE plant

  3. Sources of Radioactive Isotopes for Dirty Bombs

    Science.gov (United States)

    Lubenau, Joel

    2004-05-01

    From the security perspective, radioisotopes and radioactive sources are not created equal. Of the many radioisotopes used in industrial applications, medical treatments, and scientific research, only eight, when present in relatively large amounts in radioactive sources, pose high security risks primarily because of their prevalence and physical properties. These isotopes are americium-241, californium-252, cesium-137, cobalt-60, iridium-192, radium-226, plutonium-238, and strontium-90. Except for the naturally occurring radium-226, nuclear reactors produce the other seven in bulk commercial quantities. Half of these isotopes emit alpha radiation and would, thus, primarily pose internal threats to health; the others are mainly high-energy gamma emitters and would present both external and internal health hazards. Therefore, the response to a "dirty bomb" event depends on what type of radioisotope is chosen and how it is employed. While only a handful of major corporations produce the reactor-generated radioisotopes, they market these materials to thousands of smaller companies and users throughout the world. Improving the security of the high-risk radioactive sources will require, among other efforts, cooperation among source suppliers and regulatory agencies.

  4. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  5. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  6. Overview of Accelerator Applications for Security and Defense

    Science.gov (United States)

    Antolak, Arlyn J.

    Particle accelerators play a key role in a broad set of defense and security applications, including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization, and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat to developing a radiological dispersal device, and, can be used to produce isotopes for medical, industrial, and research purposes. An overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security is presented.

  7. The Concepts of Risk, Safety, and Security: Applications in Everyday Language.

    Science.gov (United States)

    Boholm, Max; Möller, Niklas; Hansson, Sven Ove

    2016-02-01

    The concepts of risk, safety, and security have received substantial academic interest. Several assumptions exist about their nature and relation. Besides academic use, the words risk, safety, and security are frequent in ordinary language, for example, in media reporting. In this article, we analyze the concepts of risk, safety, and security, and their relation, based on empirical observation of their actual everyday use. The "behavioral profiles" of the nouns risk, safety, and security and the adjectives risky, safe, and secure are coded and compared regarding lexical and grammatical contexts. The main findings are: (1) the three nouns risk, safety, and security, and the two adjectives safe and secure, have widespread use in different senses, which will make any attempt to define them in a single unified manner extremely difficult; (2) the relationship between the central risk terms is complex and only partially confirms the distinctions commonly made between the terms in specialized terminology; (3) whereas most attempts to define risk in specialized terminology have taken the term to have a quantitative meaning, nonquantitative meanings dominate in everyday language, and numerical meanings are rare; and (4) the three adjectives safe, secure, and risky are frequently used in comparative form. This speaks against interpretations that would take them as absolute, all-or-nothing concepts. © 2015 Society for Risk Analysis.

  8. Modeling, simulation and analysis of a securities settlement system:The case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F; Palacios, Arturo; Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  9. Modeling, simulation and analysis of a securities settlement system: the case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F.; Palacios, Arturo; de Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  10. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  11. Isotopes facilities deactivation project at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Eversole, R.E.

    1997-01-01

    The production and distribution of radioisotopes for medical, scientific, and industrial applications has been a major activity at Oak Ridge National Laboratory (ORNL) since the late 1940s. As the demand for many of these isotopes grew and their sale became profitable, the technology for the production of the isotopes was transferred to private industry, and thus, many of the production facilities at ORNL became underutilized. In 1989, the U.S. Department of Energy (DOE) instructed ORNL to identify and prepare various isotopes production facilities for safe shutdown. In response, ORNL identified 19 candidate facilities for shutdown and established the Isotopes Facilities Shutdown Program. In 1993, responsibility for the program was transitioned from the DOE Office of Nuclear Energy to the DOE Office of Environmental Management and Uranium Enrichment Operation's Office of Facility Transition and Management. The program was retitled the Isotopes Facilities Deactivation Project (IFDP), and implementation responsibility was transferred from ORNL to the Lockheed Martin Energy Systems, Inc. (LMES), Environmental Restoration (ER) Program

  12. Isotopes facilities deactivation project at Oak Ridge National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Eversole, R.E.

    1997-05-01

    The production and distribution of radioisotopes for medical, scientific, and industrial applications has been a major activity at Oak Ridge National Laboratory (ORNL) since the late 1940s. As the demand for many of these isotopes grew and their sale became profitable, the technology for the production of the isotopes was transferred to private industry, and thus, many of the production facilities at ORNL became underutilized. In 1989, the U.S. Department of Energy (DOE) instructed ORNL to identify and prepare various isotopes production facilities for safe shutdown. In response, ORNL identified 19 candidate facilities for shutdown and established the Isotopes Facilities Shutdown Program. In 1993, responsibility for the program was transitioned from the DOE Office of Nuclear Energy to the DOE Office of Environmental Management and Uranium Enrichment Operation`s Office of Facility Transition and Management. The program was retitled the Isotopes Facilities Deactivation Project (IFDP), and implementation responsibility was transferred from ORNL to the Lockheed Martin Energy Systems, Inc. (LMES), Environmental Restoration (ER) Program.

  13. Feeling safe during an inpatient hospitalization: a concept analysis.

    Science.gov (United States)

    Mollon, Deene

    2014-08-01

    This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.

  14. Framework of the NPP I and C Security for Regulatory Guidance

    International Nuclear Information System (INIS)

    Kim, Young Mi; Jeong, Choong Heui

    2013-01-01

    I and C (Instrumentation and control) systems which have computers are a critical part of the safety and security at nuclear facilities. As the use of computers in I and C continue to grow, so does the target for cyber-attack. They include desktop computers, mainframe systems, servers, network devices, embedded systems and programmable logic controllers (PLSs) and other digital computer systems. As the Stuxnet malware shows, I and C systems of the NPPs are no longer safe from the threat of cyber-attacks. These digital I and C systems must be protected from the cyber-attacks. This paper presents framework of the NPP I and C security for regulatory guidance. KINS regulatory guideline 8.22 has been applied to new and operation nuclear power plants. This guideline refers the applicable scope of the cyber security activities, cyber security policies and security plans, and assessments of cyber security and execution of the cyber security activities. Newly developed guideline will be helpful for implement security control to ensure safe operation of NPP I and C systems

  15. Framework of the NPP I and C Security for Regulatory Guidance

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Young Mi; Jeong, Choong Heui [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2013-10-15

    I and C (Instrumentation and control) systems which have computers are a critical part of the safety and security at nuclear facilities. As the use of computers in I and C continue to grow, so does the target for cyber-attack. They include desktop computers, mainframe systems, servers, network devices, embedded systems and programmable logic controllers (PLSs) and other digital computer systems. As the Stuxnet malware shows, I and C systems of the NPPs are no longer safe from the threat of cyber-attacks. These digital I and C systems must be protected from the cyber-attacks. This paper presents framework of the NPP I and C security for regulatory guidance. KINS regulatory guideline 8.22 has been applied to new and operation nuclear power plants. This guideline refers the applicable scope of the cyber security activities, cyber security policies and security plans, and assessments of cyber security and execution of the cyber security activities. Newly developed guideline will be helpful for implement security control to ensure safe operation of NPP I and C systems.

  16. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  17. ORNL Isotopes Facilities Shutdown Program Plan

    International Nuclear Information System (INIS)

    Gibson, S.M.; Patton, B.D.; Sears, M.B.

    1990-10-01

    This plan presents the results of a technical and economic assessment for shutdown of the Oak Ridge National Laboratory (ORNL) isotopes production and distribution facilities. On December 11, 1989, the Department of Energy (DOE), Headquarters, in a memorandum addressed to DOE Oak Ridge Operations Office (DOE-ORO), gave instructions to prepare the ORNL isotopes production and distribution facilities, with the exception of immediate facility needs for krypton-85, tritium, and yttrium-90, for safe shutdown. In response to the memorandum, ORNL identified 17 facilities for shutdown. Each of these facilities is located within the ORNL complex with the exception of Building 9204-3, which is located at the Y-12 Weapons Production Plant. These facilities have been used extensively for the production of radioactive materials by the DOE Isotopes Program. They currently house a large inventory of radioactive materials. Over the years, these aging facilities have inherited the problems associated with storing and processing highly radioactive materials (i.e., facilities' materials degradation and contamination). During FY 1990, ORNL is addressing the requirements for placing these facilities into safe shutdown while maintaining the facilities under the existing maintenance and surveillance plan. The day-to-day operations associated with the surveillance and maintenance of a facility include building checks to ensure that building parameters are meeting the required operational safety requirements, performance of contamination control measures, and preventative maintenance on the facility and facility equipment. Shutdown implementation will begin in FY 1993, and shutdown completion will occur by the end of FY 1994

  18. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  19. LACK OF AWARENESS ABOUT SAFE BLOOD IN PAKISTANI POPULATION

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2014-12-01

    Full Text Available Blood transfusion is a life saving procedure in various transfusion-dependent life threatening conditions and donation of safe blood is a prerequisite for achieving this goal. This study was designed to evaluate the awareness regarding “safe blood” in Pakistani population. This study was conducted at a large scale through a population survey. The test population was divided into two groups i.e. general population and students. The Performa was designed for a general and student population and included 20 questions related to awareness of safe blood. A total of 4900 individuals belonging to different ethnic groups were included in this population survey. Results of social survey were analyzed by using Usman and Moin awareness chart. Results of this study revealed profound unawareness about safe blood in Pakistani population. This study found lack of awareness about safe blood as a major factor that is playing a vital role in the propagation of blood borne diseases in Pakistan. To secure the recipients from blood borne complications through blood donation, it is necessary to create effective awareness about safe blood in Pakistani population.

  20. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  1. Radiation safety aspects in application of isotopes for industrial radiography in Bangladesh

    Energy Technology Data Exchange (ETDEWEB)

    Bakht, D. [Titas Gas Transmission and Distribution Company, Dhaka (Bangladesh)

    1997-10-01

    Industrial Radiography arose out of the widespread applications of X-rays pioneered by Roentgen about 100 years back. It is routinely used in studying the integrity of structural materials and like most countries in the world, its use in Bangladesh is increasing at a faster rate. This is because Bangladesh is a developing country of 3rd world and in the backdrop of agrarian poverty ridden economy, its population may exceed 125 millions by 2000 AD, leaving some 12 millions people unemployed. To support them, therefore, immense activities are activated in different sectors. Accordingly, increasing importance on NDT is given and in most cases particular application of Gamma radiography is preferred using Iridium Isotope Ir-192. Consequently the points of implications of isotopes are in Open Field and Inservice Inspection Radiography, Handling of Radiation Emergencies, Safe Transport of Radioactive Materials and Hazardous Effects and Risk of Ionizing Radiation, etc. Accordingly over exposure of Ir-192 Radionuclides, Accidents and Unusual Occurrences: Case Studies, Training Courses on Safety and Regulation of Sealed Sources, Licenses for Radiography Operation including Safe Disposal of Isotopes are the salient issues to be viewed in appropriate perspectives. The role played by Bangladesh Atomic Energy Commission and Bangladesh Society for NDT in collaboration with other members of the international committee for NDT are furthering the safe industrialization process

  2. Radiation safety aspects in application of isotopes for industrial radiography in Bangladesh

    International Nuclear Information System (INIS)

    Bakht, D.

    1997-01-01

    Industrial Radiography arose out of the widespread applications of X-rays pioneered by Roentgen about 100 years back. It is routinely used in studying the integrity of structural materials and like most countries in the world, its use in Bangladesh is increasing at a faster rate. This is because Bangladesh is a developing country of 3rd world and in the backdrop of agrarian poverty ridden economy, its population may exceed 125 millions by 2000 AD, leaving some 12 millions people unemployed. To support them, therefore, immense activities are activated in different sectors. Accordingly, increasing importance on NDT is given and in most cases particular application of Gamma radiography is preferred using Iridium Isotope Ir-192. Consequently the points of implications of isotopes are in Open Field and Inservice Inspection Radiography, Handling of Radiation Emergencies, Safe Transport of Radioactive Materials and Hazardous Effects and Risk of Ionizing Radiation, etc. Accordingly over exposure of Ir-192 Radionuclides, Accidents and Unusual Occurrences: Case Studies, Training Courses on Safety and Regulation of Sealed Sources, Licenses for Radiography Operation including Safe Disposal of Isotopes are the salient issues to be viewed in appropriate perspectives. The role played by Bangladesh Atomic Energy Commission and Bangladesh Society for NDT in collaboration with other members of the international committee for NDT are furthering the safe industrialization process

  3. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.

  4. Safe and secure at work?: findings from the 2002 Workplace Risk Supplement.

    Science.gov (United States)

    Jenkins, E Lynn; Fisher, Bonnie S; Hartley, Dan

    2012-01-01

    To examine employee's perception of safety and related workplace safety and prevention issues, including their use of self-protection measures and victimization experience. The Workplace Risk Supplement (WRS) to the National Crime Victimization Survey (NCVS) was administered to 55,158 employed respondents who were 16 years or older. Trained U.S. Census Bureau interviewers administered the WRS in all households selected for the NCVS during the 6-month reference period from January through June 2002. Responses from the 55,158 WRS respondents were weighted to obtain national estimates, resulting in 142,410,858 cases. The demographic distribution of WRS respondents is very similar to that of the U.S. labor force. Seven percent of respondents reported that they worried about someone in their workplace attacking them, while nearly 4% experienced victimization. The majority indicated that they felt that their workplace, the neighborhood around their workplace, and places they traveled to as part of their job were either "Very Safe" or "Somewhat Safe" from crime. Six percent carried some type of self protection while at work although this varied by occupation. Employees largely feel safe from violence while working. Differences in victimization by occupation bolster efforts to focus workplace violence prevention in high-risk occupations.

  5. Learning with Security

    Science.gov (United States)

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  6. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  7. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  8. Integrity and security in an Ada runtime environment

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  9. Isotope cloud linked to failed neutrino source

    Science.gov (United States)

    Cartlidge, Edwin

    2018-02-01

    For 2 weeks in the fall of 2017, traces of the isotope ruthenium-106 wafted across Europe. The radioactive cloud was too thin to be dangerous, but it posed a mystery to scientists. Now, researchers at the French Institute of Radioprotection and Nuclear Security say the isotope may have been released from the Mayak nuclear facility in southern Russia. They argue the leak may have happened when technicians botched the fabrication of a cerium-144 source needed in the search for sterile neutrinos at the Gran Sasso National Laboratory in L'Aquila, Italy. The Russian government has vehemently denied that an accident took place, however.

  10. A PC-based system for simulation of processes in the isotopic exchange column of a cryogenic pilot plant

    International Nuclear Information System (INIS)

    Retevoi, Carmen Maria; Stefan, Liviu; Baltateanu, Ovidiu; Stefan, Iuliana

    2001-01-01

    vapor pressure and the heavy water level in the column. The level is controlled via two dosing pumps, which work alternately to feed water to the column. In addition, we employ two monitoring systems for security. The first one monitors the temperature of hydrogen inside the heat exchanger and at the inlet of column and ensures that these are lower than the maximum safe temperatures (90 deg.C and 150 deg.C, respectively). The second security system monitors the pressure of the nitrogen used for cooling the electrical resistance rods inside the heaters. We created a front panel user interface with LabViewTM, which gave us interactive control of the system and a faster way to program instrumentation and data acquisition systems. By using LabViewTM in design, test and implementation we reduced the system development time and increased the productivity. Because LabViewTM has the same development tools and language capabilities as a standard computer language such as C - looping and case structure - it is well suited for modeling and simulation. (authors)

  11. Security Measures to Protect Mobile Agents

    Science.gov (United States)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  12. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  13. Be-safe travel, a web-based geographic application to explore safe-route in an area

    Science.gov (United States)

    Utamima, Amalia; Djunaidy, Arif

    2017-08-01

    In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.

  14. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  15. Australian Experience in Implementing Transport Safety Regulations and Transport Security Recommendations

    International Nuclear Information System (INIS)

    Sarkar, S.

    2016-01-01

    Australian transport safety and security regulatory framework is governed by Commonwealth, State and Territory legislations. There are eleven competent authorities in Australia that includes three Commonwealth authorities, six states and two territory authorities. IAEA Regulations for Safe Transport of Radioactive Material (TS-R-1, 2005 edition) is applied through Australian Radiation Protection and Nuclear Safety Agency (ARPANSA) Code of Practice for Transport of Radioactive Material 2008 by road, rail and waterways not covered by marine legislations. All states and territories apply this Transport Code through their regulatory system. For air transport, the Civil Aviation Act 1988 adopts the requirements of the ICAO Technical Instructions for the Safe Transport of Dangerous Goods by Air DOC 9284, which also adopts TS-R-1. The security of radioactive material in air transport is achieved via the Aviation Transport Security Act 2004. For sea transport Australian Marine Order 41 applies the requirements of IMDG (International Maritime Dangerous Goods) Code which also adopts TS-R-1. The security of radioactive material (nuclear material) is governed by two Commonwealth Agencies namely, ARPANSA and ASNO (Australian Safeguards and Non-proliferation Office) . ARPANSA regulates the security of radioactive sources through ARPANSA Code of Practice for the Security of Radioactive Sources 2007 which is based on the IAEA Draft Security Series. ASNO regulates security of nuclear material including U, Th and Pu through the Nuclear Non-Proliferation (Safeguards) Act, and the object of which is to give effect to certain obligations that Australia has as a party to the NPT, Australia’s safeguards agreement with the IAEA, and other bilateral safeguards agreements and certain obligations that Australia has as a party to the Convention for the Physical Protection of Nuclear Materials (CPPNM). This paper presents the effectiveness of regulatory approaches for safe and secure

  16. Communication of 10 June 2009 received from the Permanent Mission of the United Kingdom with regard to the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power

    International Nuclear Information System (INIS)

    2009-01-01

    The Secretariat has received a communication dated 10 June 2009 from the Permanent Mission of the United Kingdom of Great Britain and Northern Ireland, attaching a note from the United Kingdom and the final remarks of the Chairman of the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power, held in London on 17 and 18 March 2009. As requested in that communication, the note and final remarks are herewith circulated for the information of Member States

  17. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2005-01-01

    .... One avenue of language-based work produced Cyclone, a type-safe variant of C. The Cyclone language retains the familiar syntax and semantics of C code, but provides the strong security guarantees of modem languages such as Java...

  18. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  19. Implementing AORN recommended practices for a safe environment of care, part II.

    Science.gov (United States)

    Kennedy, Lynne

    2014-09-01

    Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  20. Isotope hydrology and its impact in the developing world

    International Nuclear Information System (INIS)

    Verhagen, B.Th.

    2003-01-01

    Ground water has increasingly taken its place in the provision of safe, potable supply in the developing world. Large investments have been made in infrastructural development for rural ground water supply schemes, but far too little attention has been given to assess the sustainability of these supplies. Overexploitation of aquifers, evident in failing boreholes and deteriorating water quality, has become a world-wide concern. Developments in physics half a century ago established the basis of isotope hydrology. Radioactive isotopes give information on ground water dynamics and recharge rates whilst non-radioactive - or stable - isotopes indicate origins of ground water and delineate ground water bodies. Environmental isotope hydrology is increasingly seen as a powerful discipline in assessing ground water systems. This is particularly important in developing environments, where historical data is rarely available. Brief examples are presented of isotope applications to collaborative ground water studies conducted at the University of the Witwatersrand. Recharge estimates based on isotope 'snapshot' data conform well with results from subsequent long-term water level observations in the Kalahari of Botswana. The importance is demonstrated of irrigation return flow and pollution hazard to the Lomagundi dolomite of Zimbabwe. Isotopes suggest the source of high nitrate concentrations to an important ground water supply in Tanzania. Mechanisms of the release of arsenic into millions of tube wells in Bangladesh are put into perspective. Isotope hydrology as appropriate technology is highlighted in terms of its cost-effectiveness and the investigative empowerment of local investigators. (author)

  1. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  2. Value of Cooperative Relationships for Security of a Safer World

    International Nuclear Information System (INIS)

    Malollari, Ilirjan; Civici, Nikolla; Hirsch, Kristin; Randolph, John David

    2010-01-01

    Cooperation of countries for improving security of radioactive and nuclear assets is clearly the key to success in establishing a more safe and secure world. Over the past few years the United States Department of Energy s Global Threat Reduction Initiatives (GTRI) program has been actively engaged with many countries of the world to identify, account for, and support enhancements to security and accounting measures for these materials. The Republic of Albania has demonstrated its willingness and desire to work closely with the United States to achieve and implement the GTRI goals for security of their assets. The GTRI program has assisted the International Atomic Energy Agency (IAEA) in development on a variety of subject areas related to security of sources and nuclear materials. Albania, a Member State of the IAEA, received training and information support from the agency. The leadership of the Albanian nuclear program has changed but the commitment of Albania to work closely with GTRI continues. The GTRI/Albania global partnership made significant accomplishments in security and safe storage of Albania's nuclear assets. This paper will describe a brief history of the Albanian program and the achievements resulting from the cooperative program with GTRI, which have resulted in a more secure Albania.

  3. Analysis of application of different approaches to secure safe drinking water

    Directory of Open Access Journals (Sweden)

    Pendić Zoran

    2017-01-01

    Full Text Available In this analysis, the risk systems include the systems within which services sensitive to risk are executed. The complex service of population supply with safe drinking water is considered to be risky. Guidelines for drinking water quality of the World Health Organization (WHO recommends the use of effective preventive approaches to risk-based management of the safety and quality of drinking water. For example, Food Safety Law of the Republic of Serbia stipulates mandatory application of HACCP system in order to obtain safe drinking water. Different approaches to preventive risk-based management for the sake of the safety and quality of drinking water are applied nowadays. In this paper we consider the following approaches: Original Codex Alimentarius HACCP system and some of its modified versions; International standard ISO 22000: 2005 Food safety management systems - Requirements for any organization in the food chain; Water Safety Plan (WSP of the World Health Organization (WHO; Generalized HACCP system. All of these approaches are based, to a greater or lesser extent, on the original Codex Alimentarius HACCP system. The paper gives a situation analysis (SWOT analysis of considered approaches.

  4. Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy

    Science.gov (United States)

    Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan

    2016-11-01

    Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.

  5. A View of Food Security through A Policy Coherent Lens

    DEFF Research Database (Denmark)

    Robertson, Aileen

    2014-01-01

    Member States “Food and nutrition security exists when all people at all times have physical, social and economic access to food, which is safe and consumed in sufficient quantity and quality to meet their dietary needs and food preferences, and is supported by an environment of adequate sanitation...... by increasing availability, affordability and consumption of biodiverse, safe, nutritious foods aligned with dietary recommendations and environmental sustainability.  Given that the number of chronically undernourished (stunted) could double over next 15 years, the Post-2015 Agenda and its Poverty Reduction......The term “food and nutrition security” reflects the multisector collaboration needed between those working with food security and nutrition security. The term expresses an integrated development goal to help guide implementation of policy and cost-effective programmatic action: As agreed by FAO...

  6. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  7. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  8. Health and safety plan for the Isotopes Facilities Deactivation Project at Oak Ridge National Laboratory, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1996-08-01

    This HASP describes the process for identifying the requirements, written safety documentation, and procedures for protecting personnel involved in the Isotopes Facilities Deactivation Project. Objective of this project is to place 19 former isotope production facilities at ORNL in a safe condition in anticipation of an extended period of minimum surveillance and maintenance

  9. Software Implementation of a Secure Firmware Update Solution in an IOT Context

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2016-01-01

    Full Text Available The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices.

  10. An absorbent for an application to a package for a liquid radioactive isotope for medical usage

    International Nuclear Information System (INIS)

    Bang, K.S.; Lim, S.P.; Lee, J.C.; Seo, K.S.; Han, H.S.

    2004-01-01

    A radioactive isotope has to be safely transport from the producing center to the consuming center. The shipping package to safely transport the radioactive isotope should be able to withstand the prescribed conditions by law. In the field of nuclear medicine, the radioactive isotope is used in a liquid or capsule form. A Type A package, which is to transport liquid radioactive materials, shall be provided with a containment system composed of primary inner and secondary outer containment components or shall be provided with sufficient absorbent material to absorb twice the volume of the liquid contents. Hospitals prefer to use not only convenient but also re-usable packages. To apply an absorbent material to the Type A package, that is to transport liquid radioactive isotope, the free absorbency of the absorbents was estimated. In the case of a liquid with NaOH 0.4%, the free absorbency of the melanine form was the most superior at 91 g/g. In the case of a liquid with Na 0.9%, the free absorbency of the melanine form was the most excellent at 88 g/g also

  11. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-08-01

    An automated approach to facility safeguards effectiveness evaluation has been developed. This automated process, called Safeguards Automated Facility Evaluation (SAFE), consists of a collection of a continuous stream of operational modules for facility characterization, the selection of critical paths, and the evaluation of safeguards effectiveness along these paths. The technique has been implemented on an interactive computer time-sharing system and makes use of computer graphics for the processing and presentation of information. Using this technique, a comprehensive evaluation of a safeguards system can be provided by systematically varying the parameters that characterize the physical protection components of a facility to reflect the perceived adversary attributes and strategy, environmental conditions, and site operational conditions. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  12. Mobile security how to secure, privatize and recover your devices

    CERN Document Server

    Speed, Timothy; Anderson, Joseph; Nampalli, Jaya

    2013-01-01

    Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

  13. Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure

    Science.gov (United States)

    2006-05-04

    Communication Periods Processing Resource Sanitization Minimum Interrupt Servicing Semaphores Multi-Core Synchronization Primitives Timers And nothing else...Communities of Interest Secure Configuration of all Nodes in Enclave Bandwidth provisioning & partitioning Secure Clock Synchronization Suppression of

  14. Isotope production technologies from a regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Murthy, K. [Canadian Nuclear Safety Committee, Ottawa, Ontario (Canada)

    2012-07-01

    This paper discusses isotope production technologies from a regulatory perspective. The regulator is the CNSC which has the mandate to protect the health, safety and security of persons and the environment and to implement Canada's international commitments on the peaceful use of nuclear energy. Nuclear facilities regulated by CNSC include linear accelerator (medical), pool irradiator (industrial) and Pelletron (research) as well as cyclotrons.

  15. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  16. Isotopes in agriculture

    International Nuclear Information System (INIS)

    1983-01-01

    Part 1: The stable isotope of nitrogen 15N has become widely used as tracer in agriculture, medicine and biology research. The film gives an overview of the sample preparation and analytical procedures followed in the analysis of the nitrogen isotopic composition (14N/15N ratio) by optical emission spectrometry at the Seibersdorf Laboratory. The subsampling of plant material and the several steps of chemical pretreatment such as Kjeldahl digestion, distillation, titration and adjustment of the proper N concentration in the extract are demonstrated. The preparation of the discharge tubes is shown in detail. Final measurement of the 14N/15N ratio is carried out with the NOI-5 and JASCO emission spectrometers. Part 2: This training film deals with the use of 32P-labelled materials in field and greenhouse experimentation in soil-plant relationships studies. All technical aspects, including safe handling and radiation protection procedures to be considered in the layout and harvesting of field experiments are documented in detail. Procedures followed up in the evaluation of P fertilizers such as rock phosphates under greenhouse conditions are described. Several soil injection techniques available for determination of the root activity pattern of trees are shown

  17. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-02-06

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.  Created: 2/6/2014 by MMWR.   Date Released: 2/6/2014.

  18. Overview on recent developments: alternative isotope production methods in Canada

    International Nuclear Information System (INIS)

    Huynh, K.

    2012-01-01

    The purpose of this paper is to provide an update on the Government of Canada's programs in alternative isotope production methods for securing supply of technetium 99m for Canadians. The supply disruptions of isotopes in 2007 and 2009/2010 caused by unplanned outages at AECL's National Research Universal (NRU) reactor highlighted the fragility of the supply chain that delivers medical isotopes, specifically Technetium 99m (Tc99m) to patients in Canada and globally. Tc99m, which is derived from its parent, molybdenum99 (Mo99) is the most widely used medical isotope for imaging, and accounts for 80 percent of nuclear medicine diagnostic procedures. Prior to the outage, nearly all the Mo99 produced for the world market came from five aging government owned research reactors in Canada, France, the Netherlands, Belgium and South Africa. The NRU, the largest of these, produced about 30 to 40 percent of the world supply of isotopes prior to 2009 - since its return to service in 2010, its world market share is estimated at 15 to 20%.

  19. National and international safety, safeguardability and security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    All nuclear power and fuel cycle facility development must comply with the predecided national regulation and security codes which each country's Atomic Energy Commission stipulates. Those codes will basically evolve as technologies and the social system will develop, change and shift. It is also to be noted that the IAEA's international guidelines have been adopted particularly by developing countries as a good reference for their proper establishment of their safety codes. The report first discusses the plant safety regulation of the inherently safe reactors in comparison to the existing code (or licensing guide) of the Japanese government. Then the new trend seen now in a regulatory body (the US NRC) is reviewed and a proposal of the smooth transition into the new philosophy is presented. In the second part of the paper, the fuel safeguarding and facility security (or physical protection) are discussed, because in the case of inherently safe reactors like ISER-PIUS, it seems that safety has much more to do with the safeguard and the security. In the third part, the international relevances to the security of the ISER-PIUS are discussed, because any ISER-PIUS will be meaningless unless they are used extensively and freely in any part of the world precluding the security concerns. In collaborative use of the state and international codes, regulatory guides and practices, it is evident that ISER-PIUS system can clear the requirements on all the aspects by ample margin. (Nogami, K.)

  20. Use of stable isotopes in developing countries: safe markers for nutrition regime study

    International Nuclear Information System (INIS)

    Klein, P.D.; Klein, E.R.

    1987-01-01

    Possible use of stable radioisotopes in studies on nutrition and medicine problems that may be used in investigations of babies, children, pregnant women is shown. Attention is paid to behaviour of limited number of elements: hydrogen, carbon, nitrogen, oxygen. The IAEA plans implementation of a new coordinated research program on use of stable isotopes for studying nutrition problems and related diseases. The program emphasis will be placed on protein metabolism measurements and estimation of energy consumption in control population groups in developing countries

  1. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    Science.gov (United States)

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  2. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  3. As for the Question of the Relationship Between the Concepts of «Security» and «Transport Security»

    Directory of Open Access Journals (Sweden)

    Nikita S. Ryazanov

    2017-08-01

    Full Text Available This article examines the problems of determining transport security, the correlation of this category with a generic notion of security and its other types. This paper examines the formation and development of modern legislative model for transport security. Threats to the safe and sustainable functioning of the transport complex are indicated by their types are also analyzed. In addition, the Author explores the terms «transport security» and «transport safety», which, despite the similarity of language, are the different contents in the regulations, and, consequently, definition. On the results of the analysis of national legislation, the problems of legal regulation of transportation security pointed out are pointed out and suggestions are made on ways to minimize these problems. According to the results of the research, the Author develops a unified definition of transport security and its object, which is relevant today.

  4. Dynamic isotope studies in liver disease

    Energy Technology Data Exchange (ETDEWEB)

    Weits, J

    1978-01-01

    Much information in the field of liver research has been gained by dynamic isotope studies. Clinically, these studies can help to settle selection criteria for different types of surgical shunt, which relieve the complications of portal hypertension. By performing splenoportoscintigraphy, splenic and portal vein thrombosis can be easily and safely excluded. So-called hypoxaemia of cirrhosis can most easily be diagnosed. Suprahepatic caval vein obstruction in a patient with cryptogenic liver disease is easily excluded by a radionuclide cavogram after injection of pertechnetate into a foot vein.

  5. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  6. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  7. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  8. Peaceful nuclear development and the three 'S' ('Safety', 'Security' and 'Safeguards')

    International Nuclear Information System (INIS)

    Julio Gonzalez, Abel; Abel Gonzalez, Martin

    2010-01-01

    We should agree on a comprehensive solution for a commensurate international control of both nuclear and radioactive material designed to ensure that peaceful nuclear developments will not cause harm to humanity. The concept of an international security system is clouded by the confusing semantics of its parts: the English concepts 'safeguards', 'safety' and 'security', on one hand, and nuclear and radioactive materials on the other hand. The objectives should be: to ensure, through appropriate safeguards, that nuclear materials are not diverted to non-peaceful activities; to prevent, through appropriate security, the unauthorized possession or use, illegal or malicious, of nuclear and radioactive materials; and, to ensure, through appropriate safety, that the use of nuclear and radioactive material will not cause harm to people and the environment. Security must be understood as an integral part of safeguards and safety, because materials that are secure are not necessarily safeguarded or safe, and materials may not be safeguarded or safe unless they are secure. Security is a necessary but not sufficient condition for safeguards and safety; security is an important but subsidiary condition of safeguards and safety; security is necessary but not sufficient to ensure nuclear control via safeguards and safety. In conclusion an International Treaty for the Control ('safeguards', 'safety' and 'security') of the Peaceful Development of Nuclear Energy and its Byproducts is proposed. It should clearly regulate the obligations and (non-compliance) penalties of the Parties, and, based on existing agreements, should be clear, logical, rational, fundamental, methodical, systematic, universal, equitable, impartial, fair and non discriminatory. (author)

  9. An evaluation of smartphone communication (in)security

    OpenAIRE

    Brodd-Reijer, Christoffer

    2014-01-01

    The purpose of this study is to examine and evaluate the security of the data traffic sent to and from smartphone devices. Since smartphones are becoming more common, are highly connected, often use cloud based computation, and contain highly personal data, it is important that the communication is secure and safe. This paper examines the Android and iOS platforms and focuses on three key parts: platform, application, and user. The platforms are evaluated on the basis of their libraries, APIs...

  10. Simulation of cloud data security processes and performance

    OpenAIRE

    Chand, K; Ramachandran, M; Kor, AL

    2015-01-01

    In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security ...

  11. Personal security a guide for international travelers

    CERN Document Server

    Spencer, Tanya

    2013-01-01

    Personal Security: A Guide for International Travelers provides the perfect mix of lessons-learned, tools, and recommendations from experts so that readers can personalize their own approach to managing travel risks. If followed, the information provided will allow readers to get out and experience the local culture while still traveling safely.-Bernie Sullivan, Director Global Security, Hanesbrands Inc....a must-have for any traveler. Having worked in South and Southeast Asia, I know the advice provided in the book holds the key to keeping safe, avoiding dangerous situations, and managing threats when they occur. The book's methodological framework, combined with the author's extensive experience and hands-on knowledge, provide very practical and useful advice.-Kathrine Alexandrowiz, Independent consultant at Kathalyst, former coordinator for the "Regional Risk Management Project for NGOs in Asia Pacific" (ECHO)... a go-to guide for all travelers irrespective of mission or purpose. An excellent piece of work...

  12. Safe sex

    Science.gov (United States)

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  13. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions ...

  14. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Centre. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour course designed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  15. CERN Technical Training: new courses on computer security

    CERN Multimedia

    HR Department

    2009-01-01

    Two new trainings are available at CERN concerning computer security. • How to create secure software? The "Developing secure software" course (3.5 hours) is designed for software programmers, both for regular software and Web applications. It covers main aspects of security in different phases of the software development lifecycle. The last, optional hour discusses security issues of Web application developers. This course, although not hands-on, is interactive and full of real-life examples. The first session of this course will take place, in English, on 21 April in the CERN Technical Training Center. More sessions will be scheduled in 2009. • How to safely navigate and send mails? The "Secure e-mail and Web browsing" course is an entry-level 1.5-hour training aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. The first sessions o...

  16. Agricultural Production, Food and Nutrition Security in Rural Benin ...

    African Journals Online (AJOL)

    Agricultural Production, Food and Nutrition Security in Rural Benin, Nigeria. ... that rural-urban migration results in shortage of manpower for agricultural activities. ... to support education, health care, sanitation and safe drinking water supply.

  17. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  18. Ensuring the security and availability of a hospital wireless LAN system.

    Science.gov (United States)

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-01-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  19. ASPECTS OF POLICIES AND STRATEGIES FOR CYBER SECURITY IN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Ilina ARMENCHEVA

    2015-10-01

    Full Text Available Freedom and prosperity of mankind greatly depend on an innovative, safe and reliable Internet that, of course, will keep evolving. Cyber space must be protected from incidents, misuse and abuse. Handling the increasing number of threats to cyber security is a challenge that national security and the trend in the international environment face. This makes taking fast and adequate measures at national, European and international level a must. Changing national security strategies and adopting new cyber security strategies are a part of these measures.

  20. Safety and Security Concerns of Nurses Working in the Intensive Care Unit: A Qualitative Study.

    Science.gov (United States)

    Keys, Yolanda; Stichler, Jaynelle F

    Intensive care units (ICUs) exist to serve as a safe place for critically ill patients to receive care from skilled practitioners. In this qualitative study, ICU nurses shared their perspectives on elements that promote safety and security on their units. After obtaining institutional review board approval, participants participated in telephone interviews with a nurse researcher who has experience as a bedside ICU nurse. Five categories and 14 themes were identified and then confirmed using member checking. Results indicate that participants prefer to provide care in ICUs with no more than 12 to 14 beds and provide the following: visibility of patients and coworkers; more than 1 way to exit; and can be locked in case of emergency or threat. Nearly all respondents mentioned adequate staffing as the most important attribute of a safe, secure care environment for patients and families. More research is needed to identify design features that make the most impact on providing a safe, secure ICU environment.

  1. Modelling the System of Ensuring the Investment Security

    Directory of Open Access Journals (Sweden)

    Moroz Maxim O.

    2017-11-01

    Full Text Available The article explores approaches to modelling the system of ensuring the investment security. Necessity of observance of investment security of Ukraine has been substantiated. The author’s own vision of the modelling essentials has been provided. The eligibility for consideration of the system of ensuring the investment security of Ukraine in the functional, structural, process, formative, and factor aspects has been proved. The target setting and tasks of a functional model of the system of ensuring the investment security have been defined. The functions, subjects, organizational-economic mechanisms of the system of ensuring the investment security of Ukraine have been characterized. A structural model of the system of ensuring the investment security has been presented. Special attention has been given to the definition of objects of direct and indirect influence, control and controlled subsystems, aggregate of indicators, safe levels, principles of formation of the investment security system. The process and formative models of the system of ensuring the investment security, as well as the algorithm of the complex assessment of the level of investment security, were analyzed in detail. Measures to ensure the investment security of Ukraine have been defined.

  2. Safe new reactor for radionuclide production

    International Nuclear Information System (INIS)

    Gray, P.L.

    1995-01-01

    In late 1995, DOE is schedule to announce a new tritium production unit. Near the end of the last NPR (New Production Reactors) program, work was directed towards eliminating risks in current designs and reducing effects of accidents. In the Heavy Water Reactor Program at Savannah River, the coolant was changed from heavy to light water. An alternative, passively safe concept uses a heavy-water-filled, zircaloy reactor calandria near the bottom of a swimming pool; the calandria is supported on a light-water-coolant inlet plenum and has upflow through assemblies in the calandria tubes. The reactor concept eliminates or reduces significantly most design basis and severe accidents that plague other deigns. The proven, current SRS tritium cycle remains intact; production within the US of medical isotopes such as Mo-99 would also be possible

  3. Container for hydrogen isotopes

    Energy Technology Data Exchange (ETDEWEB)

    1976-01-12

    A container is described for storage, shipping and and dispensing of hydrogen isotopes such as hydrogen, deuterium, tritium, or mixtures of the same. The container is compact, safe against fracture or accident, and is reusable. It consists of an outer housing with suitable inlet and outlet openings and electrical feed elements, the housing containing an activated sorber material in the form, for example of titanium sponge or an activated zirconium aluminate cartridge. The gas to be stored is introduced into the chamber under conditions of heat and vacuum and is retained in the sorber material. Subsequently, it may be released by heating the unit to drive off the stored gas at desired rates.

  4. Container for hydrogen isotopes

    International Nuclear Information System (INIS)

    1976-01-01

    A container is described for storage, shipping and and dispensing of hydrogen isotopes such as hydrogen, deuterium, tritium, or mixtures of the same. The container is compact, safe against fracture or accident, and is reusable. It consists of an outer housing with suitable inlet and outlet openings and electrical feed elements, the housing containing an activated sorber material in the form, for example of titanium sponge or an activated zirconium aluminate cartridge. The gas to be stored is introduced into the chamber under conditions of heat and vacuum and is retained in the sorber material. Subsequently, it may be released by heating the unit to drive off the stored gas at desired rates

  5. Container for hydrogen isotopes

    International Nuclear Information System (INIS)

    Solomon, D.E.

    1977-01-01

    A container for the storage, shipping and dispensing of hydrogen isotopes such as hydrogen, deuterium, tritium, or mixtures of the same which has compactness, which is safe against fracture or accident, and which is reusable is described. The container consists of an outer housing with suitable inlet and outlet openings and electrical feed elements, the housing containing an activated sorber material in the form, for example, of titanium sponge or an activated zirconium aluminate cartridge. The gas to be stored is introduced into the chamber under conditions of heat and vacuum and will be retained in the sorber material. Subsequently, it may be released by heating the unit to drive off the stored gas at desired rates

  6. Managing the safe mobility of older road users: How to cope with their diversity?

    DEFF Research Database (Denmark)

    Haustein, Sonja; Marin-Lamellet, Claude

    2014-01-01

    Against the background of an ageing population, the management of older people's safe mobility is becoming an increasingly important issue. Mobility is vital for older people's quality of life and several examples of good practice that support older people's safe mobility already exist. However...... groups who are already users and improve their (safe) use of the preferred transport mode. However, they do not seem to succeed in increasing mobility options, e.g. by encouraging car-reliant users to cycle or use public transport or by helping older women to continue to drive. We advise that existing...... systems, a lack of programmes to increase perceived security, as well as a comprehensive scheme for older drivers who have to stop driving....

  7. Re-designing the PhEDEx security model

    CERN Document Server

    Wildish, Anthony

    2013-01-01

    PhEDEx. the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model was designed to provide a safe working environment for site agents and operators, but provided little more protection than that. CMS data was not sufficiently protected against accidental loss caused by operator error or software bugs or from loss of data caused by deliberate manipulation of the database. Operations staff were given high levels of access to the database, beyond what should have been needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time.In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and r...

  8. Impact analysis of a hydrogen isotopes container

    International Nuclear Information System (INIS)

    Lee, M. S.; Hwang, C. S.; Jeong, H. S.

    2003-01-01

    The container used for the radioactive materials, containing hydrogen isotopes is evaluated in a view of hypothetical accident. The computational analysis is a cost effective tool to minimize testing and streamline the regulatory procedures, and supports experimental programs to qualify the container for the safe transport of radioactive materials. The numerical analysis of 9m free-drop onto a flat unyielding, horizontal surface has been performed using the explicit finite element computer program ABAQUS. Especially free-drop simulations for 30 .deg. C tilted condition are precisely estimated

  9. CSIR eNews: Defence peace safety and security

    CSIR Research Space (South Africa)

    CSIR

    2008-03-01

    Full Text Available At the CSIR, science and technology (S&T) is hard at work for a peaceful, safe and prosperous South Africa. The organisation has developed strong S&T capabilities through its associations with key players in defence, safety and security...

  10. CSIR eNews: Defence, peace, safety and security

    CSIR Research Space (South Africa)

    CSIR

    2007-12-01

    Full Text Available At the CSIR, science and technology (S&T) is hard at work for a peaceful, safe and prosperous South Africa. The organisation has developed strong S&T capabilities through its associations with key players in defence, safety and security...

  11. Re-designing the PhEDEx Security Model

    Science.gov (United States)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  12. Re-designing the PhEDEx security model

    International Nuclear Information System (INIS)

    Huang C-H; Wildish, T; Zhang X

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  13. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  14. Intra-site Secure Transport Vehicle test and evaluation

    International Nuclear Information System (INIS)

    Scott, S.

    1995-01-01

    In the past many DOE and DoD facilities involved in handling nuclear material realized a need to enhance the safely and security for movement of sensitive materials within their facility, or ''intra-site''. There have been prior efforts to improve on-site transportation; however, there remains a requirement for enhanced on-site transportation at a number of facilities. The requirements for on-site transportation are driven by security, safety, and operational concerns. The Intra-site Secure Transport Vehicle (ISTV) was designed to address these concerns specifically for DOE site applications with a standardized vehicle design. This paper briefly reviews the ISTV design features providing significant enhancement of onsite transportation safety and security, and also describes the test and evaluation activities either complete of underway to validate the vehicle design and operation

  15. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    Science.gov (United States)

    Jung, Jaewoo; Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  16. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  17. MINING SECURITY PIPE© (TSM© WITH UNDERGROUND GPS GLOBAL© (RSPG© ESCAPE SECURITY DEVICE IN UNDERGROUND MINING

    Directory of Open Access Journals (Sweden)

    Rafael Barrionuevo GIMÉNEZ

    2016-04-01

    Full Text Available TSM is escape pipe in case of collapse of terrain. The TSM is a passive security tool placed underground to connect the work area with secure area (mining gallery mainly. TSM is light and hand able pipe made with aramid (Kevlar, carbon fibre, or other kind of new material. The TSM will be placed as a pipe line network with many in/out entrances/exits to rich and connect problem work areas with another parts in a safe mode. Different levels of instrumentation could be added inside such as micro-led escape way suggested, temperature, humidity, level of oxygen, etc.. The open hardware and software like Arduino will be the heart of control and automation system.

  18. Cyber security evaluation of II&C technologies

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ken [Idaho National Laboratory (INL), Idaho Falls, ID (United States)

    2014-11-01

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a

  19. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Science.gov (United States)

    2010-04-01

    ... of No. 10 gauge steel fabric on a metal door frame in a metal door flange, and in all other respects... secured areas: (1) Where small quantities permit, a safe or steel cabinet; (i) Which safe or steel cabinet... radiological techniques; (ii) Which safe or steel cabinet, if it weighs less than 750 pounds, is bolted or...

  20. The Theoretical Aspects of the Security of Human Development

    Directory of Open Access Journals (Sweden)

    Markova Natalia S.

    2017-10-01

    Full Text Available The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethinking it as a new theory of global security. A cross-categorical analysis of the concepts of «human development» and of «human security» was carried out by the main criteria: characteristics, time frames, main purpose and objectives. As a result, the human security is complementary to the concept of human development in the part of safe variants of choice (freedom from needs; it further facilitated the security provision at the level of prosperity and progress, not at the level of survival. It has been determined that the conception of human security is at the same time an element of the conception of human development as well as of human security.

  1. Hydrochemical and Isotopic Assessment of Ground Water in Eastern Desert, Egypt

    International Nuclear Information System (INIS)

    Atiti, S.Y.; Ali, M.M.; Yousef, L.A.; Dessouki, H.A.

    2011-01-01

    The recharge rate is the most critical factor to ground water resources especially in semi- arid and arid areas. Fourteen representative ground water samples were collected from South Eastern Desert of Egypt and subjected to chemical and isotopic composition. The chemical data reported that, the alkalinity (ph) ranges between 6.5 and 8.5, the salinity of water ranges between 396 and 7874 ppm, sodium is the most dominant cation and chloride is the most dominant anion. The concentration of trace elements (Fe, Pb, Cd, Ni, Cu, Zn, and Mn) was analyzed to evaluate the suitability for drinking and irrigation. Uranium and thorium concentrations were found within the safe limit. Most of ground water was found suitable for drinking water, laundry, irrigation, building, industrial, livestock and poultry. The environmental stable isotopes (D and 18 O) and the radioactive isotope 3 H were evaluated for water samples of the investigated area to focus on the origin of the ground water, sources of recharging and the water rock interaction between aquifers and water. The isotopic compositions of these ground water samples indicated that, there are three different sources of recharge; paleo-water, local precipitation and rain water

  2. Organising a safe space for navigating social-ecological transformations to sustainability

    OpenAIRE

    Pereira, L.; Karpouzoglou, T.D.; Doshi, S.; Frantzeskaki, N.

    2015-01-01

    textabstractThe need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. Howeve...

  3. Radio-isotopic tracers

    International Nuclear Information System (INIS)

    Wolfangel, R.G.

    1976-01-01

    The invention concerns the dispersions that may be used for preparing radio-isotopic tracers, technetium labelled dispersions, processes for preparing these dispersions and their use as tracers. Technetium 99m sulphur colloids are utilized as scintillation tracers to give a picture of the reticulo-endothelial system, particularly the liver and spleen. A dispersion is provided which only requires the addition of a radioactive nuclide to form a radioactively labelled dispersion that can be injected as a tracer. It is formed of a colloid of tin sulphur dispersed in an aqueous buffer solution. Such a reagent has the advantage of being safe and reliable and is easier to use. The colloid can be prepared more quickly since additions of several different reagents are avoided. There is no need to heat up and no sulphuretted hydrogen, which is a toxic gas, is used [fr

  4. Research and development studies into isotope production using the Harwell Variable Energy Cyclotron

    International Nuclear Information System (INIS)

    Nichols, A.L.; Bett, R.; Cuninghame, J.G.; Goodall, J.A.B.; Hill, J.I.S.; Sims, H.E.; Willis, H.H.

    1979-11-01

    Many useful radioisotopes can be produced by means of the Harwell Chemistry Division's Variable Energy Cyclotron. This report describes the preliminary preparation of a number of these neutron deficient isotopes (i.e. F18, S38, Fe52, Sr82-Rb82, Nb92m, Rh99, I123, Xe125, Tl201, Pu236, Pu237). Recently a targetry development programme has been initiated to optimise isotope yields. Gas, liquid and solid targets have been designed that can be quickly and safely removed from the cyclotron beam-line so that the target activity can be rapidly processed after the irradiation, if necessary. (author)

  5. A Hard Month's Work in Manila. Securing Radioactive Sources

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  6. The Effects of Prompting and Reinforcement on Safe Behavior of Bicycle and Motorcycle Riders

    Science.gov (United States)

    Okinaka, Takeru; Shimazaki, Tsuneo

    2011-01-01

    A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was…

  7. Synthesis of isotopically modified ZnO nanoparticles and their potential as nanotoxicity tracers

    International Nuclear Information System (INIS)

    Dybowska, Agnieszka D.; Croteau, Marie-Noele; Misra, Superb K.; Berhanu, Deborah; Luoma, Samuel N.; Christian, Paul; O'Brien, Paul; Valsami-Jones, Eugenia

    2011-01-01

    Understanding the behavior of engineered nanoparticles in the environment and within organisms is perhaps the biggest obstacle to the safe development of nanotechnologies. Reliable tracing is a particular issue for nanoparticles such as ZnO, because Zn is an essential element and a common pollutant thus present at elevated background concentrations. We synthesized isotopically enriched (89.6%) with a rare isotope of Zn ( 67 Zn) ZnO nanoparticles and measured the uptake of 67 Zn by L. stagnalis exposed to diatoms amended with the particles. Stable isotope technique is sufficiently sensitive to determine the uptake of Zn at an exposure equivalent to lower concentration range ( -1 ). Without a tracer, detection of newly accumulated Zn is significant at Zn exposure concentration only above 5000 μg g -1 which represents some of the most contaminated Zn conditions. Only by using a tracer we can study Zn uptake at a range of environmentally realistic exposure conditions. - ZnO nanoparticles with distinct isotopic composition can be tailor synthesized to be used as tracers of environmental fate and uptake by organisms.

  8. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  9. DESIGN MODELING OF A UNIVERSITY’S COMPREHENSIVE-INTEGRATED SECURITY SYSTEM

    Directory of Open Access Journals (Sweden)

    Marina V. Dulyasova

    2017-03-01

    Full Text Available Introduction: the safety of higher education institutions is considered to be of great importance nowadays. Security challenges need to be addressed through a comprehensive and integrative approach. This approach provides neutralisation of various threats systemically, risk prevention, minimisation of the tangible and moral harm. The project concept of “safe university” is proposed and substantiated for the above-mentioned purposes. Materials and Methods: the authors used a special literature survey on the issue, which is divided into three main groups of publications, where the complex security of educational institutions is considered in the context of the general theory of security, in the educational-methodical plan and within the framework of sociological, psychological and pedagogical approaches. The legislative and regulatory sources also indicated, legislative and regulatory legal acts reviews, “Safe City” concept, National standard “Information security technologies: complex and integrated ones. Standard requirements to architecture and technologies of intellectual systems of monitoring for safety of the companies and the territories” (State standard specification P 56875-2016, documents of higher education institutions, media reports. The analysis and generalisation of information was coupled with project modeling of the new comprehensive system of higher education institution security. Results: the authors introduce the concept, architecture and model of the comprehensive integrated higher education institution security, monitoring based on measures and indicators pertaining to implementation of standard requirements and level of satisfaction with safety, evaluation of the taken measures in terms of efficiency. Discussion and Conclusions: the main contours of the model for comprehensive integrated security system in a higher education institution and algorithm of interaction between the subjects are determined. These

  10. Project management plan for the isotopes facilities deactivation project at Oak Ridge National Laboratory, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1996-08-01

    Purpose of the deactivation project is to place former isotopes production facilities at ORNL in a safe, stable, and environmentally sound condition suitable for an extended period of minimum surveillance and maintenance. This management plan was prepared to document project objectives, define organizational relationships and responsibilities, and outline the management control systems. The project has adopted the strategy of deactivating the simple facilities first. The plan provides a road map for the quality assurance program and identifies other documents supporting the Isotopes Facilities Deactivation Project

  11. A Secure Simplification of the PKMv2 Protocol in IEEE 802.16e-2005

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielsen, Christoffer Rosenkilde

    2007-01-01

    Static analysis is successfully used for automatically validating security properties of classical cryptographic protocols. In this paper, we shall employ the same technique to a modern security protocol for wireless networks, namely the latest version of the Privacy and Key Management protocol...... for IEEE 802.16e, PKMv2. This protocol seems to have an exaggerated mixture of security features. Thus, we iteratively investigate which components are necessary for upholding the security properties and which can be omitted safely. This approach is based on the LySa process calculus and employs...

  12. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    Energy Technology Data Exchange (ETDEWEB)

    Poling, Jeanne; Arnold, Pat [National Security Technologies, LLC (NSTec), P.O. Box 98521, Las Vegas, NV 89193-8521 (United States); Saad, Max [Sandia National Laboratories, P.O. Box 5800, Albuquerque, NM 87185 (United States); DiSanza, Frank [E. Frank DiSanza Consulting, 2250 Alanhurst Drive, Henderson, NV 89052 (United States); Cabble, Kevin [U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office, P.O. Box 98518, Las Vegas, NV 89193-8518 (United States)

    2013-07-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  13. Classified Component Disposal at the Nevada National Security Site (NNSS) - 13454

    International Nuclear Information System (INIS)

    Poling, Jeanne; Arnold, Pat; Saad, Max; DiSanza, Frank; Cabble, Kevin

    2013-01-01

    The Nevada National Security Site (NNSS) has added the capability needed for the safe, secure disposal of non-nuclear classified components that have been declared excess to national security requirements. The NNSS has worked with U.S. Department of Energy, National Nuclear Security Administration senior leadership to gain formal approval for permanent burial of classified matter at the NNSS in the Area 5 Radioactive Waste Management Complex owned by the U.S. Department of Energy. Additionally, by working with state regulators, the NNSS added the capability to dispose non-radioactive hazardous and non-hazardous classified components. The NNSS successfully piloted the new disposal pathway with the receipt of classified materials from the Kansas City Plant in March 2012. (authors)

  14. 76 FR 12719 - Safe Schools/Healthy Students Program; Office of Safe and Drug-Free Schools; Safe Schools/Healthy...

    Science.gov (United States)

    2011-03-08

    ... DEPARTMENT OF EDUCATION Safe Schools/Healthy Students Program; Office of Safe and Drug- Free Schools; Safe Schools/Healthy Students Program; Catalog of Federal Domestic Assistance (CFDA) Numbers: 84... priorities, requirements, and definitions under the Safe Schools/Healthy Students (SS/HS) program. Since...

  15. 75 FR 23212 - Security Zone; U.S. Coast Guard BSU Seattle, Pier 36, Seattle, WA

    Science.gov (United States)

    2010-05-03

    ... reason: Vessel traffic can pass safely around the security zone. If you think that your business... its effects on them and participate in the rulemaking. If the rule would affect your small business... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2010-0021] RIN 1625...

  16. Isotope Fuels Impact Tester (IFIT)

    International Nuclear Information System (INIS)

    Frantz, C.E.; Taylor, J.W.; Court, D.B.

    1975-07-01

    The Isotope Fuels Impact Tester (IFIT) is used for safely impacting 238 PuO 2 heat sources that have been heated to 2000 0 C. Impact velocities reach 300 m/s (1000 ft/s). A gas gun with a 178-mm (7-in.) bore is used to accelerate the heat source, which is heated by a furnace built into the projectile. Double containment of the impacted heat source is obtained by two vessels that are sealed directly to the gun muzzle. The impact occurs in the inner vessel, and parts of the projectile jam into and thereby close each vessel. The inner vessel, containing the impacted heat source, is removed from the gun and is placed inside a glovebox for disassembly and heat-source recovery. IFIT's modular structure makes it versatile and adaptable to many types of tests. Many applications have demonstrated its versatility and, more important, its capability for impacting 238 PuO 2 heat sources safely. An approximate theoretical relation is used to predict proper conditions for achieving desired impact velocities. Bore lubricants and projectile-seal design are also important for achieving proper impact velocities

  17. 29 CFR 2550.404a-3 - Safe harbor for distributions from terminated individual account plans.

    Science.gov (United States)

    2010-07-01

    ... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-3 Safe... rate of return, whether or not such return is guaranteed, consistent with liquidity (except that... liquidity; (v) A statement explaining what fees, if any, will be paid from the participant or beneficiary's...

  18. Weapons-grade nuclear material - open questions of a safe disposal

    International Nuclear Information System (INIS)

    Closs, K.D.; Giraud, J.P.; Grill, K.D.; Hensing, I.; Hippel, F. von; Holik, J.; Pellaud, B.

    1995-01-01

    There are suitable technologies available for destruction of weapons-grade uranium and plutonium. Weapons-grade uranium, consisting to 90% of the isotope U-235, can be diluted with the uranium isotope U-238 to make it non-weapons-grade, but it will then still be a material that can be used as a fuel in civil nuclear reactors. For safe plutonium disposal, several options are under debate. There is for instance a process called ''reverse reprocessing'', with the plutonium being blended with high-level radioactive fission products and then being put into a waste form accepted for direct ultimate disposal. The other option is to convert weapons-grade plutonium into MOX nuclear fuel elements and then ''burn'' them in civil nuclear power reactors. This is an option favoured by many experts. Such fuel elements should stay for a long time in the reactor core in order to achieve high burnups, and should then be ready for ultimate disposal. This disposal pathway offers essential advantages: the plutonium is used up or depleted as a component of reactor fuel, and thus is no longer available for illegal activities, and it serves as an energy source for power generation. (orig./HP) [de

  19. Versatile Endpoint Storage Security with Trusted Integrity Modules

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe

    2014-01-01

    . To counter such threats, and to remain trustworthy, personal devices should enforce storage security. State-of-the-art storage security solutions rely on hardware protected encryption. They cannot be deployed, as such, on personal devices either because they require additional hardware (e.g., NetApp’s Safe...... system and applications, that guarantee the durability, confidentiality and integrity of a configurable subset of the filesystem data and meta-data. While, we detail our design with the Linux virtual file system, we expect that our results can be applied to a range of different file systems. As Trusted...

  20. Installation of secure, always available wireless LAN systems as a component of the hospital communication infrastructure.

    Science.gov (United States)

    Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku

    2013-06-01

    Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. In addition, insuring that the network is always available is important. Herein, we discuss security countermeasures and points to insure availability that must be taken to insure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at Shimane University Hospital. Security countermeasures differ according to their purpose, such as for preventing illegal use or insuring availability, both of which are discussed. It is our hope that this information will assist others in their efforts to insure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.

  1. Reducing Maternal Mortality in Papua New Guinea: Contextualizing Access to Safe Surgery and Anesthesia.

    Science.gov (United States)

    Dennis, Alicia T

    2018-01-01

    Papua New Guinea has one of the world's highest maternal mortality rates with approximately 215 women dying per 100,000 live births. The sustainable development goals outline key priority areas for achieving a reduction in maternal mortality including a focus on universal health coverage with safe surgery and anesthesia for all pregnant women. This narrative review addresses the issue of reducing maternal mortality in Papua New Guinea by contextualizing the need for safe obstetric surgery and anesthesia within a structure of enabling environments at key times in a woman's life. The 3 pillars of enabling environments are as follows: a stable humanitarian government; a safe, secure, and clean environment; and a strong health system. Key times, and their associated specific issues, in a woman's life include prepregnancy, antenatal, birth and the postpartum period, childhood, adolescence and young womanhood, and the postchildbearing years.

  2. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  3. THE ROLE OF TEENAGEERS’ LIFE EXPERIENCE ACTUALIZATION IN THE FRAMEWORK OF THE SAFE SOCIAL ENVIRONMENT FORMATION

    Directory of Open Access Journals (Sweden)

    O. A. Selivanov

    2013-01-01

    Full Text Available The paper looks at the problem of social security and emphasizes the urgent need for developing the general theory of social security, its concepts and models designed to meet the requirements of time and specify different aspects and levels of socialization process – federal, regional and municipal. The author regards actualization of teenagers’ life experience as a promising direction for exploring the opportunities for creating the safe social environment.The individual socio-psychological functioning is delineated as a multilevel correlation of internal and external human resources used for resolving difficult situations. According to the author, the prompt mobilization of internal resources of a teenager, training the ability to apply the external resources for solving the problem and developing the safe behavior can improve the quality of life in the modern society. Along with the risks of modern information society, the author emphasizes a number of dangerous social trends: disruption of social institutions, ifantilization of education, distortion of historical cultural channels, and devaluation of the collectivism idea.In author’s opinion, teenagers should get some special knowledge and individual training to develop the skills of safe behavior in actual situations; and the prospects of the modern society considerably depend on the above procedures. 

  4. 29 CFR 2550.404a-2 - Safe harbor for automatic rollovers to individual retirement plans.

    Science.gov (United States)

    2010-07-01

    ... retirement plans. 2550.404a-2 Section 2550.404a-2 Labor Regulations Relating to Labor (Continued) EMPLOYEE... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-2 Safe..., whether or not such return is guaranteed, consistent with liquidity; (ii) For purposes of paragraph (c)(3...

  5. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    Science.gov (United States)

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  6. Task team approach to safeguards and security designs

    International Nuclear Information System (INIS)

    Zack, N.R.; Wilkey, D.D.

    1991-01-01

    In 1987, a U.S. department of Energy (DOE) supported task team was organized at the request of the DOE Idaho Field Office (DOE-ID) to provide support for safeguards and security (S and S) designs of the Special Isotope Separation (SIS) facility. Prior to deferral of the project, the SIS facility was to be constructed at the Idaho National Engineering Laboratory (INEL) to produce weapons grade plutonium from DOE owned fuel grade plutonium. The task team was assembled to provide the resources necessary to assure that S and S considerations were included as an integral part of the design of the facility, and that SIS designs would take advantage of available technology in the areas of physical security, measurements, accountability, and material and personnel tracking. The task team included personnel from DOE/Office of Safeguards and Security (DOE-OSS), DOE-ID, DOE contractors, and the national laboratories providing a wide range of expertise and experience. This paper reports that the team reviewed proposed designs and provided recommendations for safeguards and security features in each stage of the design process. The value of this approach to safeguards and security designs will be discussed with respect to benefits, lessons learned, and recommendations for future applications

  7. Integrating Safety and Security in the EU: Past developments and suggested ways forward

    International Nuclear Information System (INIS)

    Rossi, Loris

    2016-01-01

    The Framework provided by the UN Model Regulation for the Transport of Dangerous Goods is the core of the legislation on transport of radioactive material (and all classes of dangerous goods) in the EU. This has resulted in European agreements ADR, RID and ADN for international transport as well as a single directive for land transport within the EU. In addition the EU has adopted a range of directives and regulations dealing specifically with several aspects of safety of nuclear and radioactive material. While the overall safety framework is now well developed and fairly stable, a security framework is evolving, based on the IAEA recommendations. In the EU, several initiatives such as the CBRN action plan and the review of the application of telematics for the transport of dangerous goods will most likely result in more developments coming on stream in the near future. This suggests that an integrated approach would be beneficial to avoid divergent developments and to keep track of new developments in an orderly fashion. An integrated approach for a safe and secure supply chain for radioactive material is proposed. The framework for a supply chain can be built around the extensive corpus of legislation/recommendations and concepts that are already existing (such as the “Known Consignor” in the framework of the EU aviation security or the “Authorised Economic Operator” in the EU Community Custom Code). This would allow for the need to maintain control of the numerous proposals that are taking place. Advantages and drawbacks are outlined. More generally, the development of an integrated safe and secure supply chain would bring clarity and transparency to the overall system of provisions for a safe and secure management of radioactive material. (author)

  8. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  9. Computer Security: “Heartbleed” - a disaster for privacy

    CERN Multimedia

    Computer Security Team

    2014-01-01

    "On a scale of 1 to 10, this is an 11,” claimed the famous security expert Bruce Schneier (see here). Indeed, the serious vulnerability dubbed “Heartbleed” affects everyone who relies on secure and private Internet communication. You cannot avoid it, so let’s see how it affects you.   “Heartbleed” is the name that's been given to a vulnerability for OpenSSL (CVE-2014-0160). This software implements “the Secure Socket Layer (SSL v2/v3) and Transport Layer Security (TLS) protocols as well as a full-strength general purpose cryptography library”. SSL and TLS protocols are used to encrypt any communication between a client and a server, and to ensure that your communication is safe from eavesdropping or spying - that is, until 2012, when this bug was introduced. It allows the extraction of the first 64 kB from the memory of a server or client using OpenSSL (not necessarily web servers), and can potent...

  10. Cool and Safe: Multiplicity in Safe Innovation at Unilever

    Science.gov (United States)

    Penders, Bart

    2011-01-01

    This article presents the making of a safe innovation: the application of ice structuring protein (ISP) in edible ices. It argues that safety is not the absence of risk but is an active accomplishment; innovations are not "made safe afterward" but "safe innovations are made". Furthermore, there are multiple safeties to be accomplished in the…

  11. Security in Cloud Computing For Service Delivery Models: Challenges and Solutions

    OpenAIRE

    Preeti Barrow; Runni Kumari; Prof. Manjula R

    2016-01-01

    Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with almost no investment in new framework, training new staff, or authorizing new software. Though today everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security assurance to its customers and therefore, businesses are h...

  12. μRTZVisor: A Secure and Safe Real-Time Hypervisor

    Directory of Open Access Journals (Sweden)

    José Martins

    2017-10-01

    Full Text Available Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target. Microkernel-based approaches to virtualization have been shown to bridge the gap between traditional and embedded virtualization. This notwithstanding, existent microkernel-based solutions follow a highly para-virtualized approach, which inherently requires a significant software engineering effort to adapt guest operating systems (OSes to run as userland components. In this paper, we present μ RTZVisor as a new TrustZone-assisted hypervisor that distinguishes itself from state-of-the-art TrustZone solutions by implementing a microkernel-like architecture while following an object-oriented approach. Contrarily to existing microkernel-based solutions, μ RTZVisor is able to run nearly unmodified guest OSes, while, contrarily to existing TrustZone-assisted solutions, it provides a high degree of functionality and configurability, placing strong emphasis on the real-time support. Our hypervisor was deployed and evaluated on a Xilinx Zynq-based platform. Experiments demonstrate that the hypervisor presents a small trusted computing base size (approximately 60KB, and a performance overhead of less than 2% for a 10 ms guest-switching rate.

  13. Diagnosing water security in the rural North with an environmental security framework.

    Science.gov (United States)

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. The essential role of isotopes in studies of water resources

    International Nuclear Information System (INIS)

    1977-01-01

    In studies of surface water, isotope techniques are used to measure water runoff from rain and snow, flow rates of streams and rivers, leakage from lakes, reservoirs and canals and the dynamics of various bodies of water. Studies of groundwater resources (springs, wells) today are virtually unthinkable without isotope techniques. Basically, these techniques are simple and relatively quick. Among the many questions which may be asked of hydrologists about a given groundwater supply, often the most critical one concerns the safe yield so that the source will not run dry, or for a source to be 'mined', the total yield. Isotope techniques can be used to solve such problems as: identification of the origin of groundwater, determination of its age, flow velocity and direction, interrelations between surface waters and ground waters, possible connections between different aquifers, local porosity, transmissivity and dispersivity of an aquifer. The cost of such investigations is often small in comparison to the cost of classical hydrological techniques, and in addition they are able to provide information which sometimes cannot be obtained by other techniques. The IAEA provides assistance to countries in the application of isotope techniques in water resources studies and other hydrology field projects. The examples given of field studies are intended to give some idea of how these techniques are being applied to specific problems in various regions of the world. Most are discussed briefly, but in some cases a more detailed description has been given in order to demonstrate the application of environmental isotope techniques

  15. Synthesis of isotopically modified ZnO nanoparticles and their potential as nanotoxicity tracers.

    Science.gov (United States)

    Dybowska, Agnieszka D; Croteau, Marie-Noele; Misra, Superb K; Berhanu, Deborah; Luoma, Samuel N; Christian, Paul; O'Brien, Paul; Valsami-Jones, Eugenia

    2011-01-01

    Understanding the behavior of engineered nanoparticles in the environment and within organisms is perhaps the biggest obstacle to the safe development of nanotechnologies. Reliable tracing is a particular issue for nanoparticles such as ZnO, because Zn is an essential element and a common pollutant thus present at elevated background concentrations. We synthesized isotopically enriched (89.6%) with a rare isotope of Zn (67Zn) ZnO nanoparticles and measured the uptake of 67Zn by L. stagnalis exposed to diatoms amended with the particles. Stable isotope technique is sufficiently sensitive to determine the uptake of Zn at an exposure equivalent to lower concentration range (<15 μg g(-1)). Without a tracer, detection of newly accumulated Zn is significant at Zn exposure concentration only above 5000 μg g(-1) which represents some of the most contaminated Zn conditions. Only by using a tracer we can study Zn uptake at a range of environmentally realistic exposure conditions. Copyright © 2010 Elsevier Ltd. All rights reserved.

  16. Synthesis of isotopically modified ZnO nanoparticles and their potential as nanotoxicity tracers

    Science.gov (United States)

    Dybowska, A.D.; Croteau, M.-N.; Misra, S.K.; Berhanu, D.; Luoma, S.N.; Christian, P.; O'Brien, P.; Valsami-Jones, E.

    2011-01-01

    Understanding the behavior of engineered nanoparticles in the environment and within organisms is perhaps the biggest obstacle to the safe development of nanotechnologies. Reliable tracing is a particular issue for nanoparticles such as ZnO, because Zn is an essential element and a common pollutant thus present at elevated background concentrations. We synthesized isotopically enriched (89.6%) with a rare isotope of Zn (67Zn) ZnO nanoparticles and measured the uptake of 67Zn by L. stagnalis exposed to diatoms amended with the particles. Stable isotope technique is sufficiently sensitive to determine the uptake of Zn at an exposure equivalent to lower concentration range (<15 ??g g-1). Without a tracer, detection of newly accumulated Zn is significant at Zn exposure concentration only above 5000 ??g g-1 which represents some of the most contaminated Zn conditions. Only by using a tracer we can study Zn uptake at a range of environmentally realistic exposure conditions. ?? 2010 Elsevier Ltd. All rights reserved.

  17. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  18. Application of the isotopic index in isotope geochemical investigation

    International Nuclear Information System (INIS)

    Schuetze, H.

    1982-06-01

    A method is described which allows to calculate approximately isotope exchange equilibria between different crystalline silicates. The algorithm uses a newly introduced isotopic index. It is defined using isotopic increments of the variant types of silicatic bonds. This isotopic index gives a quantitative measure of the ability to enrich 18 O or 30 Si, respectively. The dependence of isotopic fractionations on temperature can be calculated approximately by means of the isotopic index, too. On this theoretical base some problems of magmatism and two varieties of an isotope geochemical model of the evolution of the Earth's crust are treated. Finally, the possibility is demonstrated to give prognostic statements about the likelihood of ore bearing of different granites. (author)

  19. The isotopic contamination in electromagnetic isotope separators; La contagion isotopique dans les separateurs electromagnetiques d'isotopes

    Energy Technology Data Exchange (ETDEWEB)

    Cassignol, Ch [Commissariat a l' Energie Atomique, Saclay (France).Centre d' Etudes Nucleaires

    1959-07-01

    In the early years of isotope separation, and in particular electromagnetic isotope separation, needs for rapid results have conducted to empiric research. This paper describes fundamental research on the electromagnetic isotope separation to a better understanding of isotope separators as well as improving the performances. Focus has been made on the study of the principle of isotope contamination and the remedial action on the separator to improve the isotope separation ratio. In a first part, the author come back to the functioning of an electromagnetic separator and generalities on isotope contamination. Secondly, it describes the two stages separation method with two dispersive apparatus, an electromagnetic separation stage followed by an electrostatic separation stage, both separated by a diaphragm. The specifications of the electrostatic stage are given and its different settings and their consequences on isotope separation are investigated. In a third part, mechanisms and contamination factors in the isotope separation are discussed: natural isotope contamination, contamination by rebounding on the collector, contamination because of a low resolution, contamination by chromatism and diffusion effect, breakdown of condenser voltage. Analysis of experimental results shows the diffusion as the most important contamination factor in electromagnetic isotope separation. As contamination factors are dependent on geometric parameters, sector angle, radius of curvature in the magnetic field and clearance height are discussed in a fourth part. The better understanding of the mechanism of the different contamination factors and the study of influential parameters as pressure and geometric parameters lead to define a global scheme of isotope contamination and determinate optima separator design and experimental parameters. Finally, the global scheme of isotope contamination and hypothesis on optima specifications and experimental parameters has been checked during a

  20. The development of a small inherently safe homogeneous reactor for the production of medical isotopes

    Energy Technology Data Exchange (ETDEWEB)

    Carlin, G.E.; Bonin, H.W., E-mail: george.carlin@rmc.ca [Royal Military College of Canada, Kingston, Ontario (Canada)

    2013-07-01

    The use of radioisotopes for various procedures in the health care industry has become one of the most important practices in medicine. New interest has been found in the use of liquid fueled nuclear reactors to produce these isotopes due to the ease of fuel processing and ability to efficiently use LEU as the fuel source. A version of this reactor is being developed at the Royal Military College of Canada to act as a successor to the SLOWPOKE-2 platform. The thermal hydraulic and transient characteristics of a 20 kWt version are being studied to verify inherent safety abilities. (author)

  1. Isotopically modified compounds

    International Nuclear Information System (INIS)

    Kuruc, J.

    2009-01-01

    In this chapter the nomenclature of isotopically modified compounds in Slovak language is described. This chapter consists of following parts: (1) Isotopically substituted compounds; (2) Specifically isotopically labelled compounds; (3) Selectively isotopically labelled compounds; (4) Non-selectively isotopically labelled compounds; (5) Isotopically deficient compounds.

  2. The Model-Driven openETCS Paradigm for Secure, Safe and Certifiable Train Control Systems

    DEFF Research Database (Denmark)

    Peleska, Jan; Feuser, Johannes; Haxthausen, Anne Elisabeth

    2012-01-01

    -driven openETCS approach, a threat analysis is performed, identifying both safety and security hazards that may be common to all model-based development paradigms for safety-critical railway control systems, or specific to the openETCS approach. In the subsequent sections state-of-the-art methods suitable...

  3. Informatics in Radiology (infoRAD): personal computer security: part 2. Software Configuration and file protection.

    Science.gov (United States)

    Caruso, Ronald D

    2004-01-01

    Proper configuration of software security settings and proper file management are necessary and important elements of safe computer use. Unfortunately, the configuration of software security options is often not user friendly. Safe file management requires the use of several utilities, most of which are already installed on the computer or available as freeware. Among these file operations are setting passwords, defragmentation, deletion, wiping, removal of personal information, and encryption. For example, Digital Imaging and Communications in Medicine medical images need to be anonymized, or "scrubbed," to remove patient identifying information in the header section prior to their use in a public educational or research environment. The choices made with respect to computer security may affect the convenience of the computing process. Ultimately, the degree of inconvenience accepted will depend on the sensitivity of the files and communications to be protected and the tolerance of the user. Copyright RSNA, 2004

  4. A Novel Cloud Computing Algorithm of Security and Privacy

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chen

    2013-01-01

    Full Text Available The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and quite relevant case in the deployment construction security of cloud computing by fit and unfit quality, and proposed finally an optimization safe deployment construction of cloud computing and security mechanism of material protection calculating method, namely, Global Authentication Register System (GARS, to reduce cloud material outflow risk. We implemented a system simulation to test the GARS algorithm of availability, security and performance. By experimental data analysis, the solutions of cloud computing security, and privacy derived from the research can be effective protection in cloud information security. Moreover, we have proposed cloud computing in the information security-related proposals that would provide related units for the development of cloud computing security practice.

  5. Synthesis of isotopically modified ZnO nanoparticles and their potential as nanotoxicity tracers

    Energy Technology Data Exchange (ETDEWEB)

    Dybowska, Agnieszka D., E-mail: a.dybowska@nhm.ac.u [Department of Mineralogy, Natural History Museum London, Cromwell Road, London, SW7 5BD (United Kingdom); Croteau, Marie-Noele [U.S. Geological Survey, 345 Middlefield Road, MS 496, Menlo Park, CA 94025 (United States); Misra, Superb K.; Berhanu, Deborah [Department of Mineralogy, Natural History Museum London, Cromwell Road, London, SW7 5BD (United Kingdom); Luoma, Samuel N. [Department of Mineralogy, Natural History Museum London, Cromwell Road, London, SW7 5BD (United Kingdom); U.S. Geological Survey, 345 Middlefield Road, MS 496, Menlo Park, CA 94025 (United States); Christian, Paul; O' Brien, Paul [School of Chemistry, University of Manchester, M13 9PL, Manchester (United Kingdom); Valsami-Jones, Eugenia [Department of Mineralogy, Natural History Museum London, Cromwell Road, London, SW7 5BD (United Kingdom)

    2011-01-15

    Understanding the behavior of engineered nanoparticles in the environment and within organisms is perhaps the biggest obstacle to the safe development of nanotechnologies. Reliable tracing is a particular issue for nanoparticles such as ZnO, because Zn is an essential element and a common pollutant thus present at elevated background concentrations. We synthesized isotopically enriched (89.6%) with a rare isotope of Zn ({sup 67}Zn) ZnO nanoparticles and measured the uptake of {sup 67}Zn by L. stagnalis exposed to diatoms amended with the particles. Stable isotope technique is sufficiently sensitive to determine the uptake of Zn at an exposure equivalent to lower concentration range (<15 {mu}g g{sup -1}). Without a tracer, detection of newly accumulated Zn is significant at Zn exposure concentration only above 5000 {mu}g g{sup -1} which represents some of the most contaminated Zn conditions. Only by using a tracer we can study Zn uptake at a range of environmentally realistic exposure conditions. - ZnO nanoparticles with distinct isotopic composition can be tailor synthesized to be used as tracers of environmental fate and uptake by organisms.

  6. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  7. Isotope effect and isotope separation. A chemist's view

    International Nuclear Information System (INIS)

    Ishida, Takanobu

    2002-01-01

    What causes the isotope effects (IE)? This presentation will be centered around the equilibrium isotope effects due to the differences in the nuclear masses. The occurrence of the equilibrium constant, K, of isotope exchange reactions which differ from the values predicted by the classical theory of statistical mechanics, K cl , is explored. The non-classical K corresponds to the unit-stage separation factor, α, that is different from unity and forms a basis of an isotope separation process involving the chemical exchange reaction. Here, the word 'chemical exchange' includes not only the isotope exchange chemical reactions between two or more chemical species but also the isotope exchanges involving the equilibria between liquid and vapor phases and liquid-gas, liquid solution-gas, liquid-liquid, and solid-liquid phases. In Section I, origins of the isotope effect phenomena will be explored and, in the process, various quantities used in discussions of isotope effect that have often caused confusions will be unambiguously defined. This Section will also correlate equilibrium constant with separation factor. In Section II, various forms of temperature-dependence of IE and separation factor will be discussed. (author)

  8. Coulomb excitation of neutron-rich odd-$A$ Cd isotopes

    CERN Multimedia

    Reiter, P; Kruecken, R; Gernhaeuser, R A; Kroell, T; Leske, J; Marginean, N M

    We propose to study excited states in the odd-${A}$ isotopes $^{123,125,127}$Cd by ${\\gamma}$-ray spectroscopy following "safe" Coulomb excitation. The experiment aims to determine the B(E2) values connecting excited states with the ground state as well as the long-lived (11/2$^{-}$) isomer. The proposed study profits from the unique capability of ISOLDE to produce beams containing Cd in the ground state or in the isomeric state. Our recent results on the neutron-rich even-A Cd nuclei appear to show that these nuclei may possess some collectivity beyond that calculated by modern shell-model predictions. Beyond-mean-field calculations also predict these nuclei to be weakly deformed. These facets are surprising considering their proximity to the doubly magic $^{132}$Sn. Coulomb-excitation studies of odd-${A}$ Cd isotopes may give a unique insight into the deformation-driving roles played by different orbits in this region. Such studies of the onset of collectivity become especially important in light of recent...

  9. Current status of securing Category 1 and 2 radioactive sources in Taiwan

    Energy Technology Data Exchange (ETDEWEB)

    Cheng, Y-F.; Tsai, C-H. [Atomic Energy Council of Executive Yuan of Taiwan (China)

    2014-07-01

    For enhancing safe and secure management of Category 1 and 2 radioactive sources against theft or unauthorized removal, AEC (Atomic Energy Council) of Taiwan have been regulating the import/export of the sources ever since 2005, in compliance with the IAEA's (International Atomic Energy Agency) 'Guidance on the Import and Export of Radioactive Sources'. Furthermore in consulting the IAEA Nuclear Security Series No.11 report, administrative regulations on the program of securing the sources have been embodied into AECL's regulatory system since 2012, for the purpose of enforcing medical and non-medical licensees and industrial radiographers to establish their own radioactive source security programs. Regulations require that security functions such as access control, detection, delay, response and communication and security management measures are to be implemented within the programs. This paper is to introduce the current status in implementing the security control measures in Taiwan. (author)

  10. Governing food security. Law, politics and the right to food

    NARCIS (Netherlands)

    Hospes, O.; Hadiprayitno, I.

    2010-01-01

    With only five years left until the 2015 deadline to achieve the Millennium Development Goals, food security still is a dream rather than reality: 'a situation that exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their dietary

  11. Secure Programming Cookbook for C and C++ Recipes for Cryptography, Authentication, Input Validation & More

    CERN Document Server

    Viega, John

    2009-01-01

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

  12. A conversion development program to LEU targets for medical isotope production in the MAPLE Facilities

    International Nuclear Information System (INIS)

    Malkoske, G.R.

    2000-01-01

    Historically, the production of molybdenum-99 in the NRU research reactors at Chalk River, Canada has been extracted from reactor targets employing highly enriched uranium (HEU). The molybdenum extraction process from the HEU targets provided predictable, consistent yields for our high-volume molybdenum production process. A reliable supply of HEU for the NRU research reactor targets has enabled MDS Nordion to develop a secure chain of medical isotope supply for the international nuclear medicine community. Each link of the isotope supply chain, from isotope production to patient application, has been established on a proven method of HEU target irradiation and processing. To ensure a continued reliable and timely supply of medical isotopes, the design of the MAPLE facilities was based on our established process - extraction of isotopes from HEU target material. However, in concert with the global trend to utilize low enriched uranium (LEU) in research reactors, MDS Nordion has launched a program to convert the MAPLE facilities to LEU targets. An initial feasibility study was initiated to identify the technical issues to convert the MAPLE targets from HEU to LEU. This paper will present the results of the feasibility study. It will also describe future challenges and opportunities in converting the MAPLE facilities to LEU targets for large scale, commercial medical isotope production. (author)

  13. Organising a safe space for navigating social-ecological transformations to sustainability.

    Science.gov (United States)

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-05-28

    The need for developing socially just living conditions for the world's growing population whilst keeping human societies within a 'safe operating space' has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a 'safe space' to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation.

  14. Reviews on Security Issues and Challenges in Cloud Computing

    Science.gov (United States)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  15. The isotopic contamination in electromagnetic isotope separators; La contagion isotopique dans les separateurs electromagnetiques d'isotopes

    Energy Technology Data Exchange (ETDEWEB)

    Cassignol, Ch. [Commissariat a l' Energie Atomique, Saclay (France).Centre d' Etudes Nucleaires

    1959-07-01

    In the early years of isotope separation, and in particular electromagnetic isotope separation, needs for rapid results have conducted to empiric research. This paper describes fundamental research on the electromagnetic isotope separation to a better understanding of isotope separators as well as improving the performances. Focus has been made on the study of the principle of isotope contamination and the remedial action on the separator to improve the isotope separation ratio. In a first part, the author come back to the functioning of an electromagnetic separator and generalities on isotope contamination. Secondly, it describes the two stages separation method with two dispersive apparatus, an electromagnetic separation stage followed by an electrostatic separation stage, both separated by a diaphragm. The specifications of the electrostatic stage are given and its different settings and their consequences on isotope separation are investigated. In a third part, mechanisms and contamination factors in the isotope separation are discussed: natural isotope contamination, contamination by rebounding on the collector, contamination because of a low resolution, contamination by chromatism and diffusion effect, breakdown of condenser voltage. Analysis of experimental results shows the diffusion as the most important contamination factor in electromagnetic isotope separation. As contamination factors are dependent on geometric parameters, sector angle, radius of curvature in the magnetic field and clearance height are discussed in a fourth part. The better understanding of the mechanism of the different contamination factors and the study of influential parameters as pressure and geometric parameters lead to define a global scheme of isotope contamination and determinate optima separator design and experimental parameters. Finally, the global scheme of isotope contamination and hypothesis on optima specifications and experimental parameters has been checked during a

  16. Middleware-based Security for Hyperconnected Applications in Future In-Car Networks

    Directory of Open Access Journals (Sweden)

    Alexandre Bouard

    2013-12-01

    Full Text Available Today’s cars take advantage of powerful electronic platforms and provide more and more sophisticated connected services. More than just ensuring the role of a safe transportation mean, they process private information, industrial secrets, communicate with our smartphones, Internet and will soon host thirdparty applications. Their pervasive computerization makes them vulnerable to common security attacks, against which automotive technologies cannot protect. The transition toward Ethernet/IP-based on-board communication could be a first step to respond to these security and privacy issues. In this paper, we present a security framework leveraging local and distributed information flow techniques in order to secure the on-board network against internal and external untrusted components. We describe the implementation and integration of such a framework within an IP-based automotive middleware and provide its evaluation.

  17. A Hard Month's Work in Manila. Securing Radioactive Sources (Arabic Edition)

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  18. A Hard Month's Work in Manila. Securing Radioactive Sources (Chinese Edition)

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  19. A Hard Month's Work in Manila. Securing Radioactive Sources (Spanish Edition)

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  20. A Hard Month's Work in Manila. Securing Radioactive Sources (Russian Edition)

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Security managers keep a watchful eye on spent radioactive sources. These disused sources, which served myriad purposes in medicine, industry and research, present a potential security threat; they could be obtained by terrorists to construct a dirty bomb. To ensure nuclear security and safety, it is essential to package, store and eventually dispose of these spent sources safely and securely. In some cases, that is easier said than done. For instance, removing an old and highly radioactive source from a medical device is difficult and dangerous. Imagine doing this remotely, using manipulators, in temperatures of up to 35 degrees and over 20 times. This is exactly what the IAEA, together with the South African Nuclear Energy Corporation (Necsa), successfully achieved in March and April 2013 at the Philippine Nuclear Research Institute (PNRI) in Manila. (author)

  1. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  2. OverView of Space Applications for Environment (SAFE) initiative

    Science.gov (United States)

    Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki

    2014-06-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.

  3. OverView of Space Applications for Environment (SAFE) initiative

    International Nuclear Information System (INIS)

    Hamamoto, Ko; Fukuda, Toru; Nukui, Tomoyuki; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi

    2014-01-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes

  4. Safety, security, hygiene and privacy in migrant farmworker housing.

    Science.gov (United States)

    Arcury, Thomas A; Weir, Maria M; Summers, Phillip; Chen, Haiying; Bailey, Melissa; Wiggins, Melinda F; Bischoff, Werner E; Quandt, Sara A

    2012-01-01

    Safety, security, hygiene, and privacy in migrant farmworker housing have not previously been documented, yet these attributes are important for farmworker quality of life and dignity. This analysis describes the safety, security, hygiene, and privacy of migrant farmworker housing and delineates camp characteristics that are associated with these attributes, using data collected in 183 eastern North Carolina migrant farmworker camps in 2010. Migrant farmworker housing is deficient. For example, 73.8 percent of housing had structural damage and 52.7 percent had indoor temperatures that were not safe. Farmworkers in 83.5 percent of the housing reported that they did not feel they or their possessions were secure. Bathing or toileting privacy was absent in 46.2 percent of the housing. Camps with residents having H-2A visas or North Carolina Department of Labor certificates of inspection posted had better safety, security, and hygiene. Regulations addressing the quality of migrant farmworker housing are needed.

  5. Is safe surgery possible when resources are scarce?

    Science.gov (United States)

    O'Hara, Nathan N

    2015-07-01

    The greatest burden of surgical disease exists in low- and middle-income countries, where the quality and safety of surgical treatment cause major challenges. Securing necessary and appropriate medical supplies and infrastructure remains a significant and under-recognised limitation to providing safe and high-quality surgical care in these settings. The majority of surgical instruments are sold in high-income countries. Limited market pressures lead to superfluous designs and inflated costs for these devices. This context creates an opportunity for frugal innovation-the search for designs that will enable low-cost care without compromising quality. Although progressive examples of frugal surgical innovations exist, policy innovation is required to augment design pathways while fostering appropriate safety controls for prospective devices. Many low-cost, high-quality medical technologies will increase access to safe surgical care in low-income countries and have widespread applicability as all countries look to reduce the cost of providing care, without compromising quality. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  6. 360 PORT MDA - A Strategy to Improve Port Security

    Science.gov (United States)

    2006-09-01

    Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than

  7. MELTER: A model of the thermal response of cargos transported in the Safe-Secure Trailer subject to fire environments for risk assessment applications

    International Nuclear Information System (INIS)

    Larsen, M.E.

    1994-08-01

    MELTER is an analysis of cargo responses inside a fire-threatened Safe-Secure Trailer (SST) developed for the Defense Program Transportation Risk Assessment (DPTRA). Many simplifying assumptions are required to make the subject problem tractable. MELTER incorporates modeling which balances the competing requirements of execution speed, generality, completeness of essential physics, and robustness. Input parameters affecting the analysis include those defining the fire scenario, those defining the cargo loaded in the SST, and those defining properties of the SST. For a specified fire, SST, and cargo geometry MELTER predicts the critical fire duration that will lead to a failure. The principal features of the analysis include: (a) Geometric considerations to interpret fire-scenario descriptors in terms of a thermal radiation boundary condition, (b) a simple model of the SST's wall combining the diffusion model for radiation through optically-thick media with an endothermic reaction front to describe the charring of dimensional, rigid foam in the SST wall, (c) a transient radiation enclosure model, (d) a one-dimensional, spherical idealization of the shipped cargos providing modularity so that cargos of interest can be inserted into the model, and (e) associated numerical methods to integrate coupled, differential equations and find roots

  8. Safe Environment Training: Effects on Catholic Schoolteachers' and Administrators' School Security and Satisfaction

    Science.gov (United States)

    Teague, James Brian

    2013-01-01

    In 2002, in light of the sexual abuse crisis in the Catholic church, The United States Conference of Catholic Bishops established "The charter for the Protection of Children and Young People" that mandated safe environment training for clergy personnel, and volunteers working in the Catholic church. In this study, under the auspices of a…

  9. Isotopic shift in even-even barium isotopes

    International Nuclear Information System (INIS)

    Karim, Afaque; Naz, Tabassum; Ahmad, Shakeb

    2017-01-01

    We have discussed the correlation between a nuclear shape and its matter distribution. Here, we present the root-mean-square radii (r rms ) and rms charge radius (r ch ). We have also discussed the isotopic shift in terms of the observable ‹Δr 2 c › N,82 and its differential ‹Δr 2 c › N-2,N . We present nuclear radii evaluated using different interactions. Neutron radii and charge radii for all the isotopic chains are shown. Neutron radii for Ba isotopes show an increasing trend with the neutron number for all isotopic chains. One can observe a clear kink about magic number N=82

  10. From food production to food security: developing interdisciplinary, regional-level research

    NARCIS (Netherlands)

    Ingram, J.S.I.

    2011-01-01

    Food security is a condition whereby “all people, at all times, have physical and economic access to sufficient, safe, and nutritious food to meet their dietary needs and food preferences for an active and healthy life” (FAO World Food Summit, 1996). Globally, food production has kept

  11. Collaborative Proposal. Development of an Isotope-Enabled CESM for Testing Abrupt Climate Changes

    Energy Technology Data Exchange (ETDEWEB)

    Otto-Bliesner, Bette [National Center for Atmospheric Research, Boulder, CO (United States)

    2015-12-10

    We have made significant landmarks in our proposed work in the last 4 years (3 years plus 1 year of no cost extension). We have developed the simulation capability of the major isotopes in CESM. In particular, we have completed the implementation of the stable water isotopes18O, δD) into the components for the atmosphere, ocean, land surface, runoff transport, sea ice, and coupler. In addition, the carbon isotopes (abiotic and biotic radiocarbon, δ13 C) have been implemented into the CESM ocean and land models, and long spinup simulations have been completed (Jahn et al., 2015). Furthermore, we have added abiotic Neodymium to the CESM ocean model as a tracer of ocean circulation, also measured by the proxy data community. Fullycoupled simulations with the stable water isotopes and ocean radiocarbon are currently being run for the preindustrial and also the Last Glacial Maximum. We have secured 19 million core-hours on the NWSC Yellowstone supercomputer for 12 months. Together with some CESM Paleoclimate Working Group CSL Yellowstone core hours, we are guaranteed sufficient computing for the spin-up experiments and deglaciation simulations for 21 to 15ka.

  12. METHODOLOGICAL APPROACHES TO ORGANIZATION OF SAFE INFORMATION AND EDUCATIONAL ENVIRONMENT OF THE UNIVERSITY

    Directory of Open Access Journals (Sweden)

    A. N. Privalov

    2017-01-01

    Full Text Available Introduction. One of the tendencies of modern higher education is the ubiquitous use of information and communication technologies. At the same time, the functioning of the electronic information and educational environment (IEE of the university should be based on the means of IEE and the condition of its information security.The aim of the research is conceptualization of a problem of the rational organization of the safe information and education environment of higher education institution wherein reliable protection of its infrastructure, the personal and unique information of a pupil and teacher and virtual space of their educational interaction is provided.Methodology and research methods. System-based approach is a key approach to organization of safe educational environment of the university. From the point of view of authors, personal-activity and functional approaches are expedient while designing and development of a safe IEE. Socio-historical and theoretical-methodological analysis, modeling, research and synthesis of experience of effective application of the systems approach in educational professional organizations are used.Results and scientific novelty. The concept «safe information educational environment of the university» is specified wherein the first word has to express a predominant quality of the system. Creating a safe information environment in educational professional organizations provides a convenient and safe educational environment in the process of professional training of university students. The components and directions for the organization of the safe IEE are highlighted. Practical recommendations for its design and successful functioning are given.Practical significance. The materials of the present research can be demanded by managers and administrative employees of educational organizations. 

  13. Stable isotopes

    International Nuclear Information System (INIS)

    Evans, D.K.

    1986-01-01

    Seventy-five percent of the world's stable isotope supply comes from one producer, Oak Ridge Nuclear Laboratory (ORNL) in the US. Canadian concern is that foreign needs will be met only after domestic needs, thus creating a shortage of stable isotopes in Canada. This article describes the present situation in Canada (availability and cost) of stable isotopes, the isotope enrichment techniques, and related research programs at Chalk River Nuclear Laboratories (CRNL)

  14. Safe Kids Worldwide

    Science.gov (United States)

    ... Blog Videos Newsletter facebook twitter instagram pinterest gplus youtube Search Menu Why It Matters Who We Are What We Do Find Your Safe Kids Safe Kids Day Main menu Keeping All Kids Safe Safety Tips Get Involved 4 Star Charity Donate Text Burns and Scalds 4 tips ...

  15. Shape coexistence measurements in even-even neutron-deficient polonium isotopes by Coulomb excitation, using REX-ISOLDE and the Ge MINIBALL array

    CERN Multimedia

    Butler, P; Bastin, B; Kruecken, R; Voulot, D; Rahkila, P J; Orr, N A; Srebrny, J; Grahn, T; Clement, E; Paul, E S; Gernhaeuser, R A; Dorsival, A; Diriken, J V J; Huyse, M L; Iwanicki, J S

    The neutron-deficient polonium isotopes with two protons outside the closed Z=82 shell represent a set of nuclei with a rich spectrum of nucleus structure phenomena. While the onset of the deformation in the light Po isotopes is well established experimentally, questions remain concerning the sign of deformation and the magnitude of the mixing between different configurations. Furthermore, controversy is present with respect to the transition from the vibrational-like character of the heavier Po isotopes to the shape coexistence mode observed in the lighter Po isotopes. We propose to study this transition in the even-mass neutron-deficient $^{198,200,202}$Po isotopes by using post-accelerated beams from REX-ISOLDE and "safe"-energy Coulomb excitation. $\\gamma$- rays will be detected by the MINIBALL array. The measurements of the Coulomb excitation differential cross section will allow us to deduce both the transition and diagonal matrix elements for these nuclei and, combined with lifetime measurements, the s...

  16. The right to adequate and safe working conditions in Ukraine

    Directory of Open Access Journals (Sweden)

    Едуард Валентинович Гаврилов

    2016-06-01

    Full Text Available The special attention is given to the rights of the citizens for independent and safe working conditions. The rights secured by law and guaranteed of each among workers and employers have been considered. The court case on infliction of harm to health in the performance of job duties has been analyzed. Taking this case as an example one can see different possible ways of its solution that cause controversy and contradictions. The Court of First Instance takes the side of the employer, Court of Appeal – on the side of the victim and consideration of the case on cassation appeal - shows only that the state taking the role of the judge is on the employer side not on the side of the worker as a victim. So, one can see that course of the state policy secured by legislators in the numerous normative acts and being reflection of the constitutional principle of the recognition by the state of  the human being, his or her life and health, honour and dignity, inviolability and security as the highest social value that is foreseen by Article 3 and by the provision of Part 4 Article 43 of the Basic Law does not correspond to the realities of life.

  17. Uranium Isotopic Analysis with the FRAM Isotopic Analysis Code

    International Nuclear Information System (INIS)

    Vo, D.T.; Sampson, T.E.

    1999-01-01

    FRAM is the acronym for Fixed-Energy Response-Function Analysis with Multiple efficiency. This software was developed at Los Alamos National Laboratory originally for plutonium isotopic analysis. Later, it was adapted for uranium isotopic analysis in addition to plutonium. It is a code based on a self-calibration using several gamma-ray peaks for determining the isotopic ratios. The versatile-parameter database structure governs all facets of the data analysis. User editing of the parameter sets allows great flexibility in handling data with different isotopic distributions, interfering isotopes, and different acquisition parameters such as energy calibration and detector type

  18. Free-drop analysis of the transport container for hydrogen isotopes

    International Nuclear Information System (INIS)

    Lee, M. S.; Hong, C. S.; Baek, S. W.; Ahn, D. H.; Kim, K. R.; Lee, S. H.; Lim, S. P.; Jung, H. S.

    2002-01-01

    The vessel used for the transport of radioactive materials, containing hydrogen isotopes is evaluated for hypothetical accident conditions according to national regulations. The computational analysis is a cost effective tool to minimize testing and streamline the regulatory procedures, and supports experimental programs to qualify the container for the safe transport of radioactive materials. The numerical analysis of 9m free-drop onto a flat unyielding, horizontal surface has been performed using the explicit finite element computer program ABAQUS. Especially free-drop simulations for 30.deg. C tilted condition is precisely estimated

  19. FINANCIAL SECURITY OF FOOD INDUSTRY ENTERPRISES IN POLAND

    Directory of Open Access Journals (Sweden)

    Anna Bieniasz

    2016-06-01

    Full Text Available The aim of the study was to evaluate the fi nancial security of food industry enterprises in Poland in 2009–2013, with particular emphasis on the processing industry of milk and cheese production, including those operating in the form of dairy cooperatives. The analysis was conducted using unpublished data of GUS, as well as individual fi nancial data on dairy cooperatives. The study indicates that the manufacturing sector of food and beverage production, as well as milk processing and cheese making, according to the established measures of fi nancial security, can be considered safe. This assessment, however, is varied and results from the specifi c industries, especially in relation to capital management.

  20. Autonomous Highway Systems Safety and Security

    OpenAIRE

    Sajjad, Imran

    2017-01-01

    Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, t...

  1. Isotope enrichment

    International Nuclear Information System (INIS)

    Garbuny, M.

    1979-01-01

    The invention discloses a method for deriving, from a starting material including an element having a plurality of isotopes, derived material enriched in one isotope of the element. The starting material is deposited on a substrate at less than a critical submonatomic surface density, typically less than 10 16 atoms per square centimeter. The deposit is then selectively irradiated by a laser (maser or electronic oscillator) beam with monochromatic coherent radiation resonant with the one isotope causing the material including the one istope to escape from the substrate. The escaping enriched material is then collected. Where the element has two isotopes, one of which is to be collected, the deposit may be irradiated with radiation resonant with the other isotope and the residual material enriched in the one isotope may be evaporated from the substrate and collected

  2. No evidence of reduced collectivity in Coulomb-excited Sn isotopes

    Science.gov (United States)

    Kumar, R.; Saxena, M.; Doornenbal, P.; Jhingan, A.; Banerjee, A.; Bhowmik, R. K.; Dutt, S.; Garg, R.; Joshi, C.; Mishra, V.; Napiorkowski, P. J.; Prajapati, S.; Söderström, P.-A.; Kumar, N.; Wollersheim, H.-J.

    2017-11-01

    In a series of Coulomb excitation experiments the first excited 2+ states in semimagic Sn 112 ,116 ,118 ,120 ,122 ,124 isotopes were excited using a 58Ni beam at safe Coulomb energy. The B (E 2 ; 0+→2+) values were determined with high precision (˜3 %) relative to 58Ni projectile excitation. These results disagree with previously reported B (E 2 ↑) values [A. Jungclaus et al., Phys. Lett. B 695, 110 (2011)., 10.1016/j.physletb.2010.11.012] extracted from Doppler-shift attenuation lifetime measurements, whereas the reported mass dependence of B (E 2 ↑) values is very similar to a recent Coulomb excitation study [J. M. Allmond et al., Phys. Rev. C 92, 041303(R) (2015), 10.1103/PhysRevC.92.041303]. The stable Sn isotopes, key nuclei in nuclear structure, show no evidence of reduced collectivity and we, thus, reconfirm the nonsymmetric behavior of reduced transition probabilities with respect to the midshell A =116 .

  3. Isotope anomalies in oxygen isotope exchange equilibrium systems

    International Nuclear Information System (INIS)

    Kotaka, M.

    1997-01-01

    The purpose of the present work is to elucidate the isotope anomalies in oxygen isotope exchange equilibrium systems, according to the calculations of the equilibrium constants for oxygen isotopic exchange reactions, and the calculations of the oxygen isotope separation factors between two phases. The equilibrium constants (K65, K67, K68 and K69) of 16 O- 15 O, 16 O 17 O, 16 O- 18 O, and 16 O- 19 O exchange reactions between diatomic oxides were calculated in a wide temperature range on the basis of quantum statistical mechanics. Many equilibrium constants showed the anomalous mass effects, and then had the crossover temperatures and the mass independent fractionation (MIF) temperatures which held K67 = K65, K67 = K68, or K67 = K69, etc. For example, the equilibrium constants for the reactions between OH and the other diatomic oxides (MO) showed the anomalous mass effects, when M was Li, Na, Mg, K, Fe, Al, Ge, Zr, Pt, etc. The 16 O 15 O, 16 O 17 O, 16 O- 18 O, and 16 O- 19 O oxygen isotope separation factors (S65, S67, S68 and S69) between two phases were calculated, when OH and CO were in the first phase, and SiO was in the second phase. Although the oxygen isotopic exchange equilibria in the two phases had no MIF and crossover temperatures, the separation factors showed the anomalous mass effects and had the temperatures. According to what is called the normal mass effects for the equilibrium constant of isotopic exchange reaction, the value of InK68/InK67 is 1.885. Therefore, the value of InS68/InS67 should be 1.885 too. The value calculated, however, widely changed. It can be concluded from the results obtained in the present work that some oxygen isotopic exchange equilibria cause the anomalous mass effects, the anomalous oxygen isotope separation factors, and then isotope anomalies

  4. Safety and security considerations for the transport of spent teletherapy units

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Paez, Jose; Huatay, Luis; Cruz, Walter

    2008-01-01

    Among the applications of nuclear technology, a practice widely used and generates many benefits to society are teletherapy applications. Many of the teletherapy units used contain a source of cobalt-60 and after their useful life they have to be dismantled and transported to a safe place. In this case were transported two units with an activity of more than 75 TBq . This paper presents safety and security considerations for the transport of the teletherapy units according to the recommendations of actual state of art. It is described all facets of safe transport by means of a set of technical and administrative safety requirements and controls, including the actions required by the consignor and carrier. The main emphasis was put on the stages of transport operations that give rise to exposure to radiation like packing, preparation, loading, handling, storage in transit and movement of packages of radioactive material. On the other side some security actions were considered in order to prevent theft, sabotage or other malicious acts during the transport of the packages. As a conclusion it must be mentioned that both safety and security considerations are very important aspects that must be taking in account for the transport of high activity radioactive material. (author)

  5. Coulomb excitation of neutron-rich $^{134-136}$Sn isotopes

    CERN Multimedia

    We propose to study excited states in the isotopes $^{134,136}$Sn by $\\gamma$-ray spectroscopy following "safe" Coulomb excitation. The experiment aims to investigate the evolution of quadrupole collectivity beyond the magic shell closure at N = 82 by the determination of B(E2) values and electric quadrupole moments $\\mathcal{Q}_2$. Recent shell-model calculations using realistic interactions predict possible enhanced collectivity in neutron-rich regions. Evidence for this could be obtained by this experiment. Furthermore, the currently unknown excitation energies of the 2$^+_{1}$ and 4$^+_{1}$ states in $^{136}$Sn will be measured for the first time.

  6. On Using TPM for Secure Identities in Future Home Networks

    Directory of Open Access Journals (Sweden)

    Georg Carle

    2011-01-01

    Full Text Available Security should be integrated into future networks from the beginning, not as an extension. Secure identities and authentication schemes are an important step to fulfill this quest. In this article, we argue that home networks are a natural trust anchor for such schemes. We describe our concept of home networks as a universal point of reference for authentication, trust and access control, and show that our scheme can be applied to any next generation network. As home networks are no safe place, we apply Trusted Computing technology to prevent the abuse of identities, i.e., identity theft.

  7. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    Science.gov (United States)

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  8. Methane clumped isotopes: Progress and potential for a new isotopic tracer

    Energy Technology Data Exchange (ETDEWEB)

    Douglas, Peter M. J.; Stolper, Daniel A.; Eiler, John M.; Sessions, Alex L.; Lawson, Michael; Shuai, Yanhua; Bishop, Andrew; Podlaha, Olaf G.; Ferreira, Alexandre A.; Santos Neto, Eugenio V.; Niemann, Martin; Steen, Arne S.; Huang, Ling; Chimiak, Laura; Valentine, David L.; Fiebig, Jens; Luhmann, Andrew J.; Seyfried, William E.; Etiope, Giuseppe; Schoell, Martin; Inskeep, William P.; Moran, James J.; Kitchen, Nami

    2017-11-01

    The isotopic composition of methane is of longstanding geochemical interest, with important implications for understanding hydrocarbon systems, atmospheric greenhouse gas concentrations, the global carbon cycle, and life in extreme environments. Recent analytical developments focusing on multiply substituted isotopologues (‘clumped isotopes’) are opening a potentially valuable new window into methane geochemistry. When methane forms in internal isotopic equilibrium, clumped isotopes can provide a direct record of formation temperature, making this property particularly valuable for identifying different methane origins. However, it has also become clear that in certain settings methane clumped isotope measurements record kinetic rather than equilibrium isotope effects. Here we present a substantially expanded dataset of methane clumped isotope analyses, and provide a synthesis of the current interpretive framework for this parameter. We review different processes affecting methane clumped isotope compositions, describe the relationships between conventional isotope and clumped isotope data, and summarize the types of information that this measurement can provide in different Earth and planetary environments.

  9. Isotope separation

    International Nuclear Information System (INIS)

    Eerkens, J.W.

    1979-01-01

    A method of isotope separation is described which involves the use of a laser photon beam to selectively induce energy level transitions of an isotope molecule containing the isotope to be separated. The use of the technique for 235 U enrichment is demonstrated. (UK)

  10. Application of GelGreen™ in Cesium Chloride Density Gradients for DNA-Stable Isotope Probing Experiments.

    Directory of Open Access Journals (Sweden)

    Jingfeng Gao

    Full Text Available In this study, GelGreen™ was investigated as a replacement for SYBR® Safe to stain DNA in cesium chloride (CsCl density gradients for DNA-stable isotope probing (SIP experiments. Using environmental DNA, the usage of GelGreen™ was optimized for sensitivity compared to SYBR® Safe, its optimal concentration, detection limit for environmental DNA and its application in environmental DNA-SIP assay. Results showed that GelGreen™ was more sensitive than SYBR® Safe, while the optimal dosage (15X concentration needed was approximately one-third of SYBR® Safe, suggesting that its sensitivity was three times more superior than SYBR® Safe. At these optimal parameters, the detection limit of GelGreen™-stained environmental DNA was as low as 0.2 μg, but the usage of 0.5 μg environmental DNA was recommended to produce a more consistent DNA band. In addition, a modified needle extraction procedure was developed to withdraw DNA effectively by fractionating CsCl density gradients into four or five fractions. The successful application of GelGreen™ staining with 13C-labeled DNA from enriched activated sludge suggests that this stain was an excellent alternative of SYBR® Safe in CsCl density gradients for DNA-SIP assays.

  11. "Same Room, Safe Place".

    Science.gov (United States)

    Keene Woods, Nikki

    2017-04-01

    There are many different professional stances on safe sleep and then there is the reality of caring for a newborn. There is a debate among professionals regarding safe sleep recommendations. The continum of recommendations vary from the American Academy of Pediatrics (AAP) Safe Sleep Guidelines to the bed-sharing recommendations from the Mother-Baby Behavioral Sleep Laboratory. The lack of consistent and uniform safe sleep recommendations from health professionals has been confusing for families but has more recently raised a real professional ethical dilemma. Despite years of focused safe sleep community education and interventions, sleep-related infant deaths are on the rise in many communities. This commentary calls for a united safe sleep message from all health professionals to improve health for mothers and infants most at-risk, "Same Room, Safe Place."

  12. Infrastructure for thulium-170 isotope power systems for autonomous underwater vehicle fleets

    International Nuclear Information System (INIS)

    Walter, C.E.

    1991-07-01

    The radioisotope thulium-170 is a safe and environmentally benign heat source for providing the high endurance and energy densities needed by advanced power systems for autonomous underwater vehicles (AUV). Thulium Isotope Power (TIP) systems have an endurance of ∼3000 h, and gravimetric and volumetric energy densities of 3 x 10 4 Wh/kg and 3 x 10 8 Wh/m 3 , respectively. These energy densities are more than 200 times higher than those currently provided by Ag-Zn battery technology. In order to capitalize on these performance levels with about one hundred AUVs in continuous use, it will be necessary to establish an infrastructure for isotope production and heat-source refurbishment. The infrastructure cost is not trivial, and studies are needed to determine its optimum configuration. The major component of the projected infrastructure is the nuclear reactor used to produce Tm- 170 by neutron absorption in Tm-169. The reactor design should ideally be optimized for TM-170 production. Using the byproduct ''waste'' heat beneficially would help defray the cost of isotope production. However, generating electric power with the reactor would compromise both the cost of electricity and the isotope production capacity. A coastal location for the reactor would be most convenient from end-use considerations, and the ''waste'' heat could be used to desalinate seawater in water-thirsty states. 13 refs., 6 figs., 2 tabs

  13. Provably Secure Password-based Authentication in TLS

    Energy Technology Data Exchange (ETDEWEB)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  14. Building a Successful Security Infrastructure: What You Want vs. What You Need vs. What You Can Afford

    Science.gov (United States)

    Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)

    1995-01-01

    With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.

  15. Development of an Internet Security Policy for health care establishments.

    Science.gov (United States)

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  16. Organising a Safe Space for Navigating Social-Ecological Transformations to Sustainability

    Directory of Open Access Journals (Sweden)

    Laura Pereira

    2015-05-01

    Full Text Available The need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access, economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a ‘safe space’ to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation.

  17. Organising a Safe Space for Navigating Social-Ecological Transformations to Sustainability

    Science.gov (United States)

    Pereira, Laura; Karpouzoglou, Timothy; Doshi, Samir; Frantzeskaki, Niki

    2015-01-01

    The need for developing socially just living conditions for the world’s growing population whilst keeping human societies within a ‘safe operating space’ has become a modern imperative. This requires transformative changes in the dominant social norms, behaviours, governance and management regimes that guide human responses in areas such as urban ecology, public health, resource security (e.g., food, water, energy access), economic development and biodiversity conservation. However, such systemic transformations necessitate experimentation in public arenas of exchange and a deepening of processes that can widen multi-stakeholder learning. We argue that there is an emergent potential in bridging the sustainability transitions and resilience approaches to create new scientific capacity that can support large-scale social-ecological transformations (SETs) to sustainability globally, not just in the West. In this article, we elucidate a set of guiding principles for the design of a ‘safe space’ to encourage stronger interactions between these research areas and others that are relevant to the challenges faced. We envisage new opportunities for transdisciplinary collaboration that will develop an adaptive and evolving community of practice. In particular, we emphasise the great opportunity for engaging with the role of emerging economies in facilitating safe space experimentation. PMID:26030471

  18. Evolution of quadrupole and octupole collectivity north-east of $^{132}$ Sn: the even Te and Xe isotopes

    CERN Multimedia

    We propose to study excited states in isotopes north-east of the doubly-magic $^{132}$Sn by $\\gamma$-ray spectroscopy following "safe" Coulomb excitation. The experiment aims to the determine B(E2) and B(E3) values to follow the evolution of quadrupole and octupole collectivity when going away from the shell closures at Z = 50 and N = 82. The B(E2; 0$^+_{gs}$ $\\rightarrow$ 2$^+_{1}$) values in the even isotopes $^{138-144}$Xe have been measured at REX-ISOLDE and the systematic trend towards neutron-rich nuclei is well described even by an empirical Grodzins-type formula. An increasing dipole moment observed for $^{140,142}$Xe is interpreted as indirect signature of increasing octupole correlations peaking at N = 88. So far, no B(E3) values are known. In contrast to the Xe isotopes, the Te ones, in particular $^{136}$Te, are known for their notoriously irregular behaviour. In order to understand the nuclear structure also on a microscopic basis, the isotope $^{136}$Te with just one pair of protons and neutrons...

  19. Isotopic separation

    International Nuclear Information System (INIS)

    Castle, P.M.

    1979-01-01

    This invention relates to molecular and atomic isotope separation and is particularly applicable to the separation of 235 U from other uranium isotopes including 238 U. In the method described a desired isotope is separated mechanically from an atomic or molecular beam formed from an isotope mixture utilising the isotropic recoil momenta resulting from selective excitation of the desired isotope species by radiation, followed by ionization or dissociation by radiation or electron attachment. By forming a matrix of UF 6 molecules in HBr molecules so as to collapse the V 3 vibrational mode of the UF 6 molecule the 235 UF 6 molecules are selectively excited to promote reduction of UF 6 molecules containing 235 U and facilitate separation. (UK)

  20. Application of heavy stable isotopes in forensic isotope geochemistry: A review

    International Nuclear Information System (INIS)

    Aggarwal, Jugdeep; Habicht-Mauche, Judith; Juarez, Chelsey

    2008-01-01

    Light stable isotopes have been used for many years to characterize the source and transport of materials. More recently heavy isotope systems such as Sr, Nd and Pb have been added to this list in order to aid source identification. With the advent of multiple collector ICP-MS, the range of isotopic tools now available has increased considerably, however, until the isotope systematics of these new non-traditional isotope systems have become better understood, they will not be as useful in characterizing material source and transportation. Applications using heavy metal stable isotopes (mostly traditional heavy isotopes) have reached most avenues in science, including earth sciences, archaeology, anthropology, animal physiology, ecology and toxicology. This field will continue to grow as new applications are developed and techniques become simpler and quicker. This paper provides a review of how this field has grown and presents two new applications using Pb and Sr isotopes in glazes to determine the source of ore used in glazes, and using Sr isotopes to determine the origin of undocumented deceased Mexican border crossers

  1. Application of heavy stable isotopes in forensic isotope geochemistry: A review

    Energy Technology Data Exchange (ETDEWEB)

    Aggarwal, Jugdeep [W.M. Keck Isotope Laboratory, Department of Earth Sciences, University of California, Santa Cruz, CA 95064 (United States)], E-mail: jaggarwal@pmc.ucsc.edu; Habicht-Mauche, Judith; Juarez, Chelsey [Department of Anthropology, University of California, Santa Cruz, CA 95064 (United States)

    2008-09-15

    Light stable isotopes have been used for many years to characterize the source and transport of materials. More recently heavy isotope systems such as Sr, Nd and Pb have been added to this list in order to aid source identification. With the advent of multiple collector ICP-MS, the range of isotopic tools now available has increased considerably, however, until the isotope systematics of these new non-traditional isotope systems have become better understood, they will not be as useful in characterizing material source and transportation. Applications using heavy metal stable isotopes (mostly traditional heavy isotopes) have reached most avenues in science, including earth sciences, archaeology, anthropology, animal physiology, ecology and toxicology. This field will continue to grow as new applications are developed and techniques become simpler and quicker. This paper provides a review of how this field has grown and presents two new applications using Pb and Sr isotopes in glazes to determine the source of ore used in glazes, and using Sr isotopes to determine the origin of undocumented deceased Mexican border crossers.

  2. Production of Medical Isotopes with Electron Linacs

    Energy Technology Data Exchange (ETDEWEB)

    Rotsch, D A; Alford, K.; Bailey, J. L.; Bowers, D. L.; Brossard, T.; Brown, M. A.; Chemerisov, S. D.; Ehst, D.; Greene, J.; Gromov, R. G.; Grudzinski, J.J.; Hafenrichter, L.; Hebden, A. S.; Henning, W.; Heltemes, T. A.; Jerden, J.; Jonah, C. D.; Kalensky, M.; Krebs, J. F.; Makarashvili, V.; Micklich, B.; Nolen, J.; Quigley, K. J.; Schneider, J. F.; Smith, N. A.; Stepinski, D. C.; Sun, Z.; Tkac, P.; Vandegrift, G. F.; Virgo, M J; Wesolowski, K. A.; Youker, A. J.

    2017-06-01

    Radioisotopes play important roles in numerous areas ranging from medical treatments to national security and basic research. Radionuclide production technology for medical applications has been pursued since the early 1900s both commercially and in nuclear science centers. Many medical isotopes are now in routine production and are used in day-to-day medical procedures. Despite these advancements, research is accelerating around the world to improve the existing production methodologies as well as to develop novel radionuclides for new medical appli-cations. Electron linear accelerators (linacs) represent a unique method for the production of radioisotopes. Even though the basic technology has been around for decades, only recently have electron linacs capable of producing photons with sufficient energy and flux for radioisotope production become available. Housed in Argonne Nation-al Laboratory’s Low Energy Accelerator Facility (LEAF) is a newly upgraded 55 MeV/25-kW electron linear ac-celerator, capable of producing a wide range of radioiso-topes. This talk will focus on the work being performed for the production of the medical isotopes 99Mo (99Mo/99mTc generator), 67Cu, and 47Sc.

  3. Neutron resonance analysis for nuclear safeguards and security applications

    Science.gov (United States)

    Paradela, Carlos; Heyse, Jan; Kopecky, Stefan; Schillebeeckx, Peter; Harada, Hideo; Kitatani, Fumito; Koizumi, Mitsuo; Tsuchiya, Harufumi

    2017-09-01

    Neutron-induced reactions can be used to study the properties of nuclear materials of interest in the fields of nuclear safeguards and security. The elemental and isotopic composition of these materials can be determined by using the presence of resonance structures. This idea is the basis of two non-destructive analysis techniques which have been developed at the GELINA neutron time-of-flight facility at JRC-Geel: Neutron Resonance Capture Analysis (NRCA) and Neutron Resonance Transmission Analysis (NRTA). A combination of NRTA and NRCA has been proposed for the characterisation of particle-like debris of melted fuel formed in severe nuclear accidents. In this work, we present a quantitative validation of the NRTA technique which was used to determine the areal densities of Pu enriched reference samples used for safeguards applications. Less than 2% bias has been obtained for the fissile isotopes, with well-known total cross sections.

  4. Food Safety as a contributor to Food Security: global policy concerns & challenges

    Directory of Open Access Journals (Sweden)

    Vijay Kumar Chattu

    2015-12-01

    Full Text Available The theme for World Health Day campaign for this year 2015 is “Food safety: from farm to plate, make food safe”. The day focuses on demonstrating the importance of food safety along the whole length of the food chain in a globalized world, from production and transport, to preparation and consumption (1. Everyone needs food and needs it every day either plant sources or animal sources or both. The food we eat must be nutritious and safe but we often ignore or overlook the issue of food safety. Many cases of food borne diseases either acute poisoning or chronic exposure are largely under reported. In this globalized world, though the food chain extends over thousands of miles from different continents, an error or contamination in one country can affect the health of consumers on the other part of the world. To ensure full impact, these actions must build on principles of government stewardship, engagement of civil society, (2.According to UN, access to a safe and secure food supply is a basic human right. Food safety and food security are interrelated concepts which have an impact on the health outcomes and quality of human lives. As per Food and Agricultural Organization (FAO, Food security is a situation that exists when all people, at all times, have physical, social and economic access to sufficient, safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life, (3. Based on the definition of Food security, four food security dimensions can be identified: food availability, economic and physical access to food, food utilization and stability over time. Apart from that food security is also affected by Poverty and Climate change.Food safety is an umbrella term that encompasses many aspects like food items handling, preparation and storage of food to prevent illness and injury. The other important issues are chemical, microphysical and microbiological aspects of food safety, (4. Control of

  5. The Security Analysis of Two-Step Quantum Direct Communication Protocol in Collective-Rotation Noise Channel

    International Nuclear Information System (INIS)

    Li Jian; Sun Feng-Qi; Pan Ze-Shi; Nie Jin-Rui; Chen Yan-Hua; Yuan Kai-Guo

    2015-01-01

    To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein–Podolsky–Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003) 042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Q 0 (M : (Q 0 , 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ϵ is, the larger the error rate Q is. When the noise level ϵ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q < 0.153. Similarly, if error rate Q > 0.153 = Q 0 , eavesdropping information I > 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore. (paper)

  6. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    Science.gov (United States)

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  7. Stable isotope studies

    International Nuclear Information System (INIS)

    Ishida, T.

    1992-01-01

    The research has been in four general areas: (1) correlation of isotope effects with molecular forces and molecular structures, (2) correlation of zero-point energy and its isotope effects with molecular structure and molecular forces, (3) vapor pressure isotope effects, and (4) fractionation of stable isotopes. 73 refs, 38 figs, 29 tabs

  8. A security framework for nationwide health information exchange based on telehealth strategy.

    Science.gov (United States)

    Zaidan, B B; Haiqi, Ahmed; Zaidan, A A; Abdulnabi, Mohamed; Kiah, M L Mat; Muzamel, Hussaen

    2015-05-01

    This study focuses on the situation of health information exchange (HIE) in the context of a nationwide network. It aims to create a security framework that can be implemented to ensure the safe transmission of health information across the boundaries of care providers in Malaysia and other countries. First, a critique of the major elements of nationwide health information networks is presented from the perspective of security, along with such topics as the importance of HIE, issues, and main approaches. Second, a systematic evaluation is conducted on the security solutions that can be utilized in the proposed nationwide network. Finally, a secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy. The outcome of this analysis indicates that a complete security framework for a global structure of HIE is yet to be defined and implemented. Our proposed framework represents such an endeavor and suggests specific techniques to achieve this goal.

  9. Current Methods for Evaluation of Physical Security System Effectiveness.

    Science.gov (United States)

    1981-05-01

    nuclear fuel system installation in a - articular way. These entities are thereby identified as more or less significant targets for the security...These publications use non-standard definitions for some safe- guards terms, which is an unfortunate distraction . None of the publications we...when the participant reaches his objective. If this requires more than one time step, he may be distracted by changed circumstances before he completes

  10. One Health in food safety and security education: Subject matter outline for a curricular framework.

    Science.gov (United States)

    Angelos, John A; Arens, Amanda L; Johnson, Heather A; Cadriel, Jessica L; Osburn, Bennie I

    2017-06-01

    Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.

  11. One Health in food safety and security education: Subject matter outline for a curricular framework

    Directory of Open Access Journals (Sweden)

    John A. Angelos

    2017-06-01

    Full Text Available Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.

  12. Preparation of electrodeless discharge lamps for emission studies of uranium isotopes at trace level

    International Nuclear Information System (INIS)

    Bhowmick, G.K.; Verma, R.; Verma, M.K.; Raman, V.A.; Joshi, A.R.; Deo, M.N.; Gantayet, L.M.; Tiwari, A.K.; Ramakumar, K.L.; Kumar, Navin

    2010-01-01

    A simplified method for preparation of electrodeless discharge lamp for uranium isotopes with specific concerns for 232 U is described. Micro-gram quantities of solid uranium oxides and aqueous solution of uranium nitrate have been used as a starting material for in situ synthesis of uranium tetraiodide. High temperature iodination reaction is carried out in the presence of inert gas neon. By careful design, the preparation time and surface area of quartz reaction tubes have been reduced considerably. The latter decreases the level of contamination which has a direct bearing on the operational lifetime of the lamps. Incorporation of steps to purify the product from an unwanted material improved the stability of the lamps. The procedure provides a safe and convenient way of handling 232 U in particular but can be extended in general to any actinides having radioactivity similar to that of freshly separated 232 U. Characteristic emission of uranium isotopes have been recorded by Fourier Transform Spectrometer to show the satisfactory operation of the lamps as well as their usage for studying emission spectra of the specific isotope.

  13. Raman scattering method and apparatus for measuring isotope ratios and isotopic abundances

    International Nuclear Information System (INIS)

    Harney, R.C.; Bloom, S.D.

    1978-01-01

    Raman scattering is used to measure isotope ratios and/or isotopic abundances. A beam of quasi-monochromatic photons is directed onto the sample to be analyzed, and the resulting Raman-scattered photons are detected and counted for each isotopic species of interest. These photon counts are treated mathematically to yield the desired isotope ratios or isotopic abundances

  14. DroidSafe

    Science.gov (United States)

    2016-12-01

    Massachusetts Avenue, Build E19-750 Cambridge , MA 02139-4307 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS...Activity objects illustrating the challenges of points-to and information flow analysis...measure how many malicious flows Droid- Safe was able to detect). As these results illustrate , DroidSafe implements an analysis of unprece- dented

  15. Implementation of a security system in the radiotherapy process

    International Nuclear Information System (INIS)

    Orellana Salas, A.; Melgar Perez, J.; Arrocha Aceveda, J. F.

    2011-01-01

    Systems of work within the field of health are complex. Even the most routine activities involving chain and coordinate a number of actions to be developed by different professionals of different specialties. These systems often fail due to a combination of small errors along the process, each insufficient to cause an accident. We must ensure safe systems of work for each process we are involved, so it is essential to implement security systems to evaluate and find the vulnerabilities in all phases of the process. In the Service of Radio Physics and Radiation Protection of Punta de Europa Hospital has implemented a security system for radiotherapy process after the analysis and evaluation of the safety culture of the Service.

  16. Simple steps to data encryption a practical guide to secure computing

    CERN Document Server

    Loshin, Peter

    2013-01-01

    Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what

  17. Isotope separation

    International Nuclear Information System (INIS)

    Bartlett, R.J.; Morrey, J.R.

    1978-01-01

    A method and apparatus is described for separating gas molecules containing one isotope of an element from gas molecules containing other isotopes of the same element in which all of the molecules of the gas are at the same electronic state in their ground state. Gas molecules in a gas stream containing one of the isotopes are selectively excited to a different electronic state while leaving the other gas molecules in their original ground state. Gas molecules containing one of the isotopes are then deflected from the other gas molecules in the stream and thus physically separated

  18. Isotopic separation

    International Nuclear Information System (INIS)

    Chen, C.L.

    1979-01-01

    Isotopic species in an isotopic mixture including a first species having a first isotope and a second species having a second isotope are separated by selectively exciting the first species in preference to the second species and then reacting the selectively excited first species with an additional preselected radiation, an electron or another chemical species so as to form a product having a mass different from the original species and separating the product from the balance of the mixture in a centrifugal separating device such as centrifuge or aerodynamic nozzle. In the centrifuge the isotopic mixture is passed into a rotor where it is irradiated through a window. Heavier and lighter components can be withdrawn. The irradiated mixture experiences a large centrifugal force and is separated in a deflection area into lighter and heavier components. (UK)

  19. Safe havens in Europe

    DEFF Research Database (Denmark)

    Paldam, Martin

    2013-01-01

    Eleven safe havens exist in Europe providing offshore banking and low taxes. Ten of these states are very small while Switzerland is moderately small. All 11 countries are richer than their large neighbors. It is shown that causality is from small to safe haven to wealth, and that theoretically...... equilibriums are likely to exist where a certain regulation is substantially lower in a small country than in its big neighbor. This generates a large capital inflow to the safe havens. The pool of funds that may reach the safe havens is shown to be huge. It is far in excess of the absorptive capacity...... of the safe havens, but it still explains, why they are rich. Microstates offer a veil of anonymity to funds passing through, and Switzerland offers safe storage of funds....

  20. Traveling Safely with Medicines

    Science.gov (United States)

    ... Medications Safely My Medicine List How to Administer Traveling Safely with Medicines Planes, trains, cars – even boats ... your trip, ask your pharmacist about how to travel safely with your medicines. Make sure that you ...

  1. Traceability of different apple varieties by multivariate analysis of isotope ratio mass spectrometry data.

    Science.gov (United States)

    Mimmo, Tanja; Camin, Federica; Bontempo, Luana; Capici, Calogero; Tagliavini, Massimo; Cesco, Stefano; Scampicchio, Matteo

    2015-11-15

    The awareness of customers of the origin of foods has become an important issue. The growing demand for foods that are healthy, safe and of high quality has increased the need for traceability and clear labelling. Thus, this study investigates the capability of C and N stable isotope ratios to determine the geographical origin of several apple varieties grown in northern Italy. Four apple varieties (Cripps Pink, Gala, Golden Delicious, Granny Smith) have been sampled in orchards located in the Districts of Bolzano, Ferrara, Verona and Udine (northern Italy). Carbon (δ(13) C) and nitrogen (δ(15) N) isotope values of the whole apple fruits and three sub-fractions (peel, pulp and seed) have been determined simultaneously by isotope ratio mass spectrometry. The δ(13) C and δ(15) N values of apples and apple sub-fractions, such as peel, seed and pulp, were significantly affected by the geographical origin and the fruit variety. The four varieties could be distinguished to a certain extent only within each district. A 99% correct identification of the samples according to their origin was, however, achieved by cross validation with the 'leave-one-out' method. This study proves the potential of stable isotopes to discriminate the geographical origin of apples grown in orchards located only a few hundreds of kilometres apart. Stable isotopes were also able to discriminate different apple varieties, although only within small geographical areas. Copyright © 2015 John Wiley & Sons, Ltd.

  2. ENTERPRISE ECONOMIC SECURITY: ESSENTIAL CHARACTERISTICS OF THE CONCEPT

    Directory of Open Access Journals (Sweden)

    Nina Avanesova

    2017-09-01

    Full Text Available The subjectmatter of the study is determining the essence of economic security. The aim is to systematize the approaches to the interpretation of the concept "enterprise economic security". The immediacy of the study is motivated by the lack of consistency, co-ordination and common views on the discourse in this area, as well as insufficiently substantiated offers for implementing modern methods and models of economic security management at all levels of economy. At the same time, despite a large number of publications, there remain many unsolved problems in the management of economic security, which is the main component of protection against threats, both at the state level and at the level of business entities such as enterprises and organizations. The following methods of theoretical and empirical research were used: logical generalization – to substantiate the relevance of the topic, the goals and objectives of the study, to determine the essential features of the problem; analysis and synthesis – to describe the theories of economic security. Economic security of an enterprise gives rise to a company’s capability to develop, increase its competitiveness and the competitiveness of its products, sustain its position on competitive markets, and characterizes the strength and economic potential of enterprises to counteract the negative impact of the external and internal environment. At the same time, the company’s economic security mirrors the conditions of its protection against any threats which are achieved due to the use of existing and potential resources of the company in order to ensure its safe operation in the long run.

  3. Towards the Development of a Methodology for the Cyber Security Analysis of Safety Related Nuclear Digital I and C Systems

    International Nuclear Information System (INIS)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun

    2007-01-01

    In nuclear power plants the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. In case of an event, the failure of these systems has catastrophic consequences. The tendency in the industry over the past 10 years has been to use of commercial of the shelf (COTS) technologies in these systems. COTS software was written with attention to function and performance rather than security. COTS hardware usually designed to fail safe, but security vulnerabilities could be exploited by an attacker to disable the fail safe mechanisms. Moreover, the use of open protocols and operating systems in these technologies make the plants to become vulnerable to a host of cyber attacks. An effective security analysis process is required during all life cycle phases of these systems in order to ensure the security from cyber attacks. We are developing a methodology for the cyber security analysis of safety related nuclear digital I and C Systems. This methodology will cover all phases of development, operation and maintenance processes of software life cycle. In this paper, we will present a security analysis process for the concept stage of software development life cycle

  4. Chromium isotope variations

    DEFF Research Database (Denmark)

    D'Arcy, Joan Mary

    the δ53Cr value of continental runoff into the ocean. The major findings were that river water is characterised by heavy δ53Cr values (+0.1‰ to +1.6‰), while soils are characterised by light δ53Cr values (-0.3‰), relative to the catchment bedrock (-0.17‰ to -0.21‰), indicating that Cr isotopes......, and the quantification the Cr isotope composition of major Cr fluxes into and out of ocean. This thesis adds to the current knowledge of the Cr isotope system and is divided into two studies. The focus of the first study was to determine what processes control the Cr isotopic compositionof river water and to quantify......Chromium (Cr) stable isotopes are a useful tracer of changes in redox conditions because changes in its oxidation state are accompanied by an isotopic fractionation. For this reason the Cr isotope system is being developed as a potential tool for paleo-redox reconstruction. Dissolved Cr in seawater...

  5. Environmental isotope hydrology

    International Nuclear Information System (INIS)

    1973-01-01

    Environmental isotope hydrology is a relatively new field of investigation based on isotopic variations observed in natural waters. These isotopic characteristics have been established over a broad space and time scale. They cannot be controlled by man, but can be observed and interpreted to gain valuable regional information on the origin, turnover and transit time of water in the system which often cannot be obtained by other techniques. The cost of such investigations is usually relatively small in comparison with the cost of classical hydrological studies. The main environmental isotopes of hydrological interest are the stable isotopes deuterium (hydrogen-2), carbon-13, oxygen-18, and the radioactive isotopes tritium (hydrogen-3) and carbon-14. Isotopes of hydrogen and oxygen are ideal geochemical tracers of water because their concentrations are usually not subject to change by interaction with the aquifer material. On the other hand, carbon compounds in groundwater may interact with the aquifer material, complicating the interpretation of carbon-14 data. A few other environmental isotopes such as 32 Si and 238 U/ 234 U have been proposed recently for hydrological purposes but their use has been quite limited until now and they will not be discussed here. (author)

  6. Safe management of waste from health-care activities

    International Nuclear Information System (INIS)

    Pruess, A.; Giroult, E.; Rushbrook, P.

    1999-01-01

    The waste produced in the course of health-care activities, from contaminated needles to radioactive isotopes, carries a greater potential for causing infection and injury than any other type of waste, and inadequate or inappropriate management is likely to have serious public health consequences and deleterious effects on the environment. This handbook - the result of extensive international consultation and collaboration - provides comprehensive guidance on safe, efficient, and environmentally sound methods for the handling and disposal of health-care wastes. The various categories of waste are clearly defined and the particular hazards that each poses are described. Considerable prominence is given to the careful planning that is essential for the success of waste management; workable means of minimizing waste production are outlined and the role of reuse and recycling of waste is discussed. Most of the text, however, is devoted to the collection, segregation, storage, transport, and disposal of wastes. Details of containers for each category of waste, labelling of waste packages, and storage conditions are provided, and the various technologies for treatment of waste and disposal of final residues are discussed at length. Advice is given on occupational safety for all personnel involved with waste handling, and a separate chapter is devoted to the closely related topic of hospital hygiene and infection control. The handbook pays particular attention to basic processes and technologies that are not only safe but also affordable, sustainable, and culturally appropriate. For health-care settings in which resources are severely limited there is a separate chapter on minimal programmes; this summarizes all the simplest and least costly techniques that can be employed for the safe management of health-care wastes. The guide is aimed at public health managers and policy-makers, hospital managers, environmental health professionals, and all administrators with an

  7. Remote secure observing for the Faulkes Telescopes

    Science.gov (United States)

    Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea

    2004-09-01

    Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.

  8. Stable isotopes

    International Nuclear Information System (INIS)

    Brazier, J.L.; Guinamant, J.L.

    1995-01-01

    According to the progress which has been realised in the technology of separating and measuring isotopes, the stable isotopes are used as preferable 'labelling elements' for big number of applications. The isotopic composition of natural products shows significant variations as a result of different reasons like the climate, the seasons, or their geographic origins. So, it was proved that the same product has a different isotopic composition of alimentary and agriculture products. It is also important in detecting the pharmacological and medical chemicals. This review article deals with the technology, like chromatography and spectrophotometry, adapted to this aim, and some important applications. 17 refs. 6 figs

  9. Analysis on the University’s Network Security Level System in the Big Data Era

    Science.gov (United States)

    Li, Tianli

    2017-12-01

    The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.

  10. Optical isotope shifts for unstable samarium isotopes

    International Nuclear Information System (INIS)

    Eastham, D.A.; Walker, P.M.; Griffith, J.A.R.; Evans, D.E.; Grant, I.S.; England, J.G.; Fawcett, M.J.

    1984-01-01

    Using a tunable dye laser beam intersecting a thermal atomic beam, optical isotope shifts and hyperfine splittings have been measured for the four unstable samarium isotopes between 144 Sm and 154 Sm, covering the well known transition region from spherical to deformed shapes. (orig.)

  11. Electron linac for medical isotope production with improved energy efficiency and isotope recovery

    Science.gov (United States)

    Noonan, John; Walters, Dean; Virgo, Matt; Lewellen, John

    2015-09-08

    A method and isotope linac system are provided for producing radio-isotopes and for recovering isotopes. The isotope linac is an energy recovery linac (ERL) with an electron beam being transmitted through an isotope-producing target. The electron beam energy is recollected and re-injected into an accelerating structure. The ERL provides improved efficiency with reduced power requirements and provides improved thermal management of an isotope target and an electron-to-x-ray converter.

  12. Technical testing of portable isotope identification instruments

    International Nuclear Information System (INIS)

    Smith, D.E.

    2001-01-01

    . First generation portable isotope identifiers were identified and evaluated by U.S. Customs. Instruments from five vendors were put through a battery of tests according to delineated test procedures. The tests fell into five categories: Basic operation verification; Medical isotope identification; Individual isotope identification; Isotope pair identification; Dose rate calculation. The tests can be summarized as an initial verification of correct instrument operation (including whatever calibration procedure was specified by the vendor), followed by three different isotope identification tests designed to verify the instrument's ability to correctly identify 19 isotopes specified by U.S. Customs. The final test determined each instrument's ability to correctly display the dose rate from a wide energy range of gamma emitters. The individual isotope identification test and the isotope pair identification test were performed with three types of intervening shielding. The first of these three types used the minimum packaging needed for safe source handling and was, in general, thin plastic. This type of shielding is virtually identical to a bare radiation source. The second type of shielding used 2.7 mm of steel to simulate the wall of a typical transportainer (or sea-tainer). The third type of shielding used 6.94 mm of lead to simulate typical industrial packaging or, perhaps, an attempt by the shipper to conceal the source without unduly increasing the weight of the shipment. The isotopes tested were broadly categorized as: Special nuclear material (SNM), Medical, and Industrial. These included 17 gamma emitters, 1 beta emitter, and 1 neutron emitter. Each instrument was subjected to the following testing regimen: First, each instrument was calibrated according to vendor's procedures. Instrument size and weight were recorded. Next, the instrument's response to medical isotopes in their usual shipping containers was measured. This represents the most commonly occurring

  13. Intelligent Security System connected to IoT

    OpenAIRE

    Lopes Goncalves Magalhaes, Frederic

    2017-01-01

    A home is a private place which means safe and secure. Everyone would like to keep an eye on his place but unfortunately doing it physically 24/7 is not possible. Fortunately, the technologies available nowadays can be used to create an automated third eye for those who want to keep a regular control on their home. Mobile Application has become common in many business sectors and is a trend as more and more people possess a smartphone. Then, with two major mobile application stores, Googl...

  14. Patient data security in the DICOM standard

    International Nuclear Information System (INIS)

    Schuetze, B.; Kroll, M.; Geisbe, T.; Filler, T.J.

    2004-01-01

    The DICOM committee added the section 'Security Profiles' to the DICOM standard, in order to provide the opportunity of safe communication between health care system partners. Data complying with the DICOM standard - e.g. pictures, signals or reports of examinations can be provided with one or more digital signatures. Attention should be paid to the fact that these possibilities of the DICOM standard are available or can be supplied subsequently by new acquisitions of radiological modalities. The required information to check these prerequisites are given

  15. Stable isotope and trace element studies of black bear hair, Big Bend ecosystem, Texas and Mexico

    Science.gov (United States)

    Shanks, W.C. Pat; Hellgren, Eric C.; Stricker, Craig A.; Gemery-Hill, Pamela A.; Onorato, David P.

    2008-01-01

    Hair from black bears (Ursus americanus), collected from four areas in the Big Bend ecosystem, has been analyzed for stable isotopes of carbon, nitrogen, and sulfur to determine major food sources and for trace metals to infer possible effects of environmental contaminants. Results indicate that black bears are largely vegetarian, feeding on desert plants, nuts, and berries. Mercury concentrations in bear hair are below safe level standards (

  16. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implemented a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.

  17. Experimental study on isotope fractionation of evaporating water of different initial isotopic composition

    International Nuclear Information System (INIS)

    Pooja Devi; Jain, A.K.; Rao, M.S.; Kumar, B.

    2014-01-01

    The studies of evaporative isotopic fractionation in controlled conditions are of particular importance for understanding the mechanism of evaporation fractionation in natural conditions. We present the measurements of the average isotopic fractionation factors during the evaporation of water having different initial isotopic compositions at constant temperature. The results show that the isotopic composition of residual water become more enriched over the time and the initial isotopic composition of evaporating water has considerable effect on the average isotopic fractionation factors. The average isotopic fractionation factors in evaporation of Water A and Water B under the present experimental conditions were found to be 0.9817 ± 0.0044 and 0.9887 ± 0.0031 for oxygen and 0.9178 ± 0.0182 and 0.9437 ± 0.0169 for hydrogen, respectively. The findings of this work should lead to a better understanding and use of stable isotope techniques in isotope hydrology by using a simple technique of evaporation pan. (author)

  18. Isotope puzzle in sputtering

    International Nuclear Information System (INIS)

    Zheng Liping

    1998-01-01

    Mechanisms affecting multicomponent material sputtering are complex. Isotope sputtering is the simplest in the multicomponent materials sputtering. Although only mass effect plays a dominant role in the isotope sputtering, there is still an isotope puzzle in sputtering by ion bombardment. The major arguments are as follows: (1) At the zero fluence, is the isotope enrichment ejection-angle-independent or ejection-angle-dependent? (2) Is the isotope angular effect the primary or the secondary sputter effect? (3) How to understand the action of momentum asymmetry in collision cascade on the isotope sputtering?

  19. Abundance and Isotopic Composition of Gases in the Martian Atmosphere from the Curiosity Rover

    Science.gov (United States)

    Mahaffy, Paul R.; Webster, Christopher R.; Atreya, Sushil K.; Franz, Heather; Wong, Michael; Conrad, Pamela G.; Harpold, Dan; Jones, John J.; Leshin, Laurie A.; Manning, Heidi; Owen, Tobias; Pepin, Robert O.; Squyres, Steven; Trainer, Melissa; Kemppinen, Osku; Bridges, Nathan; Johnson, Jeffrey R.; Minitti, Michelle; Cremers, David; Bell, James F.; Edgar, Lauren; Farmer, Jack; Godber, Austin; Wadhwa, Meenakshi; Wellington, Danika; McEwan, Ian; Newman, Claire; Richardson, Mark; Charpentier, Antoine; Peret, Laurent; King, Penelope; Blank, Jennifer; Weigle, Gerald; Schmidt, Mariek; Li, Shuai; Milliken, Ralph; Robertson, Kevin; Sun, Vivian; Baker, Michael; Edwards, Christopher; Ehlmann, Bethany; Farley, Kenneth; Griffes, Jennifer; Grotzinger, John; Miller, Hayden; Newcombe, Megan; Pilorget, Cedric; Rice, Melissa; Siebach, Kirsten; Stack, Katie; Stolper, Edward; Brunet, Claude; Hipkin, Victoria; Léveillé, Richard; Marchand, Geneviève; Sánchez, Pablo Sobrón; Favot, Laurent; Cody, George; Steele, Andrew; Flückiger, Lorenzo; Lees, David; Nefian, Ara; Martin, Mildred; Gailhanou, Marc; Westall, Frances; Israël, Guy; Agard, Christophe; Baroukh, Julien; Donny, Christophe; Gaboriaud, Alain; Guillemot, Philippe; Lafaille, Vivian; Lorigny, Eric; Paillet, Alexis; Pérez, René; Saccoccio, Muriel; Yana, Charles; Armiens-Aparicio, Carlos; Rodríguez, Javier Caride; Blázquez, Isaías Carrasco; Gómez, Felipe Gómez; Gómez-Elvira, Javier; Hettrich, Sebastian; Malvitte, Alain Lepinette; Jiménez, Mercedes Marín; Martínez-Frías, Jesús; Martín-Soler, Javier; Martín-Torres, F. Javier; Jurado, Antonio Molina; Mora-Sotomayor, Luis; Caro, Guillermo Muñoz; López, Sara Navarro; Peinado-González, Verónica; Pla-García, Jorge; Manfredi, José Antonio Rodriguez; Romeral-Planelló, Julio José; Fuentes, Sara Alejandra Sans; Martinez, Eduardo Sebastian; Redondo, Josefina Torres; Urqui-O'Callaghan, Roser; Mier, María-Paz Zorzano; Chipera, Steve; Lacour, Jean-Luc; Mauchien, Patrick; Sirven, Jean-Baptiste; Fairén, Alberto; Hayes, Alexander; Joseph, Jonathan; Sullivan, Robert; Thomas, Peter; Dupont, Audrey; Lundberg, Angela; Melikechi, Noureddine; Mezzacappa, Alissa; DeMarines, Julia; Grinspoon, David; Reitz, Günther; Prats, Benito; Atlaskin, Evgeny; Genzer, Maria; Harri, Ari-Matti; Haukka, Harri; Kahanpää, Henrik; Kauhanen, Janne; Kemppinen, Osku; Paton, Mark; Polkko, Jouni; Schmidt, Walter; Siili, Tero; Fabre, Cécile; Wray, James; Wilhelm, Mary Beth; Poitrasson, Franck; Patel, Kiran; Gorevan, Stephen; Indyk, Stephen; Paulsen, Gale; Gupta, Sanjeev; Bish, David; Schieber, Juergen; Gondet, Brigitte; Langevin, Yves; Geffroy, Claude; Baratoux, David; Berger, Gilles; Cros, Alain; d'Uston, Claude; Forni, Olivier; Gasnault, Olivier; Lasue, Jérémie; Lee, Qiu-Mei; Maurice, Sylvestre; Meslin, Pierre-Yves; Pallier, Etienne; Parot, Yann; Pinet, Patrick; Schröder, Susanne; Toplis, Mike; Lewin, Éric; Brunner, Will; Heydari, Ezat; Achilles, Cherie; Oehler, Dorothy; Sutter, Brad; Cabane, Michel; Coscia, David; Israël, Guy; Szopa, Cyril; Dromart, Gilles; Robert, François; Sautter, Violaine; Le Mouélic, Stéphane; Mangold, Nicolas; Nachon, Marion; Buch, Arnaud; Stalport, Fabien; Coll, Patrice; François, Pascaline; Raulin, François; Teinturier, Samuel; Cameron, James; Clegg, Sam; Cousin, Agnès; DeLapp, Dorothea; Dingler, Robert; Jackson, Ryan Steele; Johnstone, Stephen; Lanza, Nina; Little, Cynthia; Nelson, Tony; Wiens, Roger C.; Williams, Richard B.; Jones, Andrea; Kirkland, Laurel; Treiman, Allan; Baker, Burt; Cantor, Bruce; Caplinger, Michael; Davis, Scott; Duston, Brian; Edgett, Kenneth; Fay, Donald; Hardgrove, Craig; Harker, David; Herrera, Paul; Jensen, Elsa; Kennedy, Megan R.; Krezoski, Gillian; Krysak, Daniel; Lipkaman, Leslie; Malin, Michael; McCartney, Elaina; McNair, Sean; Nixon, Brian; Posiolova, Liliya; Ravine, Michael; Salamon, Andrew; Saper, Lee; Stoiber, Kevin; Supulver, Kimberley; Van Beek, Jason; Van Beek, Tessa; Zimdar, Robert; French, Katherine Louise; Iagnemma, Karl; Miller, Kristen; Summons, Roger; Goesmann, Fred; Goetz, Walter; Hviid, Stubbe; Johnson, Micah; Lefavor, Matthew; Lyness, Eric; Breves, Elly; Dyar, M. Darby; Fassett, Caleb; Blake, David F.; Bristow, Thomas; DesMarais, David; Edwards, Laurence; Haberle, Robert; Hoehler, Tori; Hollingsworth, Jeff; Kahre, Melinda; Keely, Leslie; McKay, Christopher; Wilhelm, Mary Beth; Bleacher, Lora; Brinckerhoff, William; Choi, David; Dworkin, Jason P.; Eigenbrode, Jennifer; Floyd, Melissa; Freissinet, Caroline; Garvin, James; Glavin, Daniel; Jones, Andrea; Martin, David K.; McAdam, Amy; Pavlov, Alexander; Raaen, Eric; Smith, Michael D.; Stern, Jennifer; Tan, Florence; Meyer, Michael; Posner, Arik; Voytek, Mary; Anderson, Robert C.; Aubrey, Andrew; Beegle, Luther W.; Behar, Alberto; Blaney, Diana; Brinza, David; Calef, Fred; Christensen, Lance; Crisp, Joy A.; DeFlores, Lauren; Ehlmann, Bethany; Feldman, Jason; Feldman, Sabrina; Flesch, Gregory; Hurowitz, Joel; Jun, Insoo; Keymeulen, Didier; Maki, Justin; Mischna, Michael; Morookian, John Michael; Parker, Timothy; Pavri, Betina; Schoppers, Marcel; Sengstacken, Aaron; Simmonds, John J.; Spanovich, Nicole; Juarez, Manuel de la Torre; Vasavada, Ashwin R.; Yen, Albert; Archer, Paul Douglas; Cucinotta, Francis; Ming, Douglas; Morris, Richard V.; Niles, Paul; Rampe, Elizabeth; Nolan, Thomas; Fisk, Martin; Radziemski, Leon; Barraclough, Bruce; Bender, Steve; Berman, Daniel; Dobrea, Eldar Noe; Tokar, Robert; Vaniman, David; Williams, Rebecca M. E.; Yingst, Aileen; Lewis, Kevin; Cleghorn, Timothy; Huntress, Wesley; Manhès, Gérard; Hudgins, Judy; Olson, Timothy; Stewart, Noel; Sarrazin, Philippe; Grant, John; Vicenzi, Edward; Wilson, Sharon A.; Bullock, Mark; Ehresmann, Bent; Hamilton, Victoria; Hassler, Donald; Peterson, Joseph; Rafkin, Scot; Zeitlin, Cary; Fedosov, Fedor; Golovin, Dmitry; Karpushkina, Natalya; Kozyrev, Alexander; Litvak, Maxim; Malakhov, Alexey; Mitrofanov, Igor; Mokrousov, Maxim; Nikiforov, Sergey; Prokhorov, Vasily; Sanin, Anton; Tretyakov, Vladislav; Varenikov, Alexey; Vostrukhin, Andrey; Kuzmin, Ruslan; Clark, Benton; Wolff, Michael; McLennan, Scott; Botta, Oliver; Drake, Darrell; Bean, Keri; Lemmon, Mark; Schwenzer, Susanne P.; Anderson, Ryan B.; Herkenhoff, Kenneth; Lee, Ella Mae; Sucharski, Robert; Hernández, Miguel Ángel de Pablo; Ávalos, Juan José Blanco; Ramos, Miguel; Kim, Myung-Hee; Malespin, Charles; Plante, Ianik; Muller, Jan-Peter; Navarro-González, Rafael; Ewing, Ryan; Boynton, William; Downs, Robert; Fitzgibbon, Mike; Harshman, Karl; Morrison, Shaunna; Dietrich, William; Kortmann, Onno; Palucis, Marisa; Sumner, Dawn Y.; Williams, Amy; Lugmair, Günter; Wilson, Michael A.; Rubin, David; Jakosky, Bruce; Balic-Zunic, Tonci; Frydenvang, Jens; Jensen, Jaqueline Kløvgaard; Kinch, Kjartan; Koefoed, Asmus; Madsen, Morten Bo; Stipp, Susan Louise Svane; Boyd, Nick; Campbell, John L.; Gellert, Ralf; Perrett, Glynis; Pradler, Irina; VanBommel, Scott; Jacob, Samantha; Rowland, Scott; Atlaskin, Evgeny; Savijärvi, Hannu; Boehm, Eckart; Böttcher, Stephan; Burmeister, Sönke; Guo, Jingnan; Köhler, Jan; García, César Martín; Mueller-Mellin, Reinhold; Wimmer-Schweingruber, Robert; Bridges, John C.; McConnochie, Timothy; Benna, Mehdi; Bower, Hannah; Brunner, Anna; Blau, Hannah; Boucher, Thomas; Carmosino, Marco; Elliott, Harvey; Halleaux, Douglas; Rennó, Nilton; Elliott, Beverley; Spray, John; Thompson, Lucy; Gordon, Suzanne; Newsom, Horton; Ollila, Ann; Williams, Joshua; Vasconcelos, Paulo; Bentz, Jennifer; Nealson, Kenneth; Popa, Radu; Kah, Linda C.; Moersch, Jeffrey; Tate, Christopher; Day, Mackenzie; Kocurek, Gary; Hallet, Bernard; Sletten, Ronald; Francis, Raymond; McCullough, Emily; Cloutis, Ed; ten Kate, Inge Loes; Kuzmin, Ruslan; Arvidson, Raymond; Fraeman, Abigail; Scholes, Daniel; Slavney, Susan; Stein, Thomas; Ward, Jennifer; Berger, Jeffrey; Moores, John E.

    2013-07-01

    Volume mixing and isotope ratios secured with repeated atmospheric measurements taken with the Sample Analysis at Mars instrument suite on the Curiosity rover are: carbon dioxide (CO2), 0.960(±0.007); argon-40 (40Ar), 0.0193(±0.0001); nitrogen (N2), 0.0189(±0.0003); oxygen, 1.45(±0.09) × 10-3; carbon monoxide, < 1.0 × 10-3; and 40Ar/36Ar, 1.9(±0.3) × 103. The 40Ar/N2 ratio is 1.7 times greater and the 40Ar/36Ar ratio 1.6 times lower than values reported by the Viking Lander mass spectrometer in 1976, whereas other values are generally consistent with Viking and remote sensing observations. The 40Ar/36Ar ratio is consistent with martian meteoritic values, which provides additional strong support for a martian origin of these rocks. The isotopic signature δ13C from CO2 of ~45 per mil is independently measured with two instruments. This heavy isotope enrichment in carbon supports the hypothesis of substantial atmospheric loss.

  20. Reviews of the Comprehensive Nuclear-Test-Ban Treaty and U.S. security

    Science.gov (United States)

    Jeanloz, Raymond

    2017-11-01

    Reviews of the Comprehensive Nuclear-Test-Ban Treaty (CTBT) by the National Academy of Sciences concluded that the United States has the technical expertise and physical means to i) maintain a safe, secure and reliable nuclear-weapons stockpile without nuclear-explosion testing, and ii) effectively monitor global compliance once the Treaty enters into force. Moreover, the CTBT is judged to help constrain proliferation of nuclear-weapons technology, so it is considered favorable to U.S. security. Review of developments since the studies were published, in 2002 and 2012, show that the study conclusions remain valid and that technical capabilities are better than anticipated.

  1. Socio-philosophical preconditions of formation of the concept of security in protosociology

    Directory of Open Access Journals (Sweden)

    L. V. Kalashnikova

    2016-08-01

    The development of the theory of security is impossible without taking into account the foundations of social and philosophical heritage in this area, which is often out of sight of researchers. Socio-philosophical prerequisites of security concept creates the necessary conditions for the formation of general ideas about it as an objective reality, the study of which with the use of scientific and special methods of knowledge allows us to formulate the basic laws, scientific system of safety management principles that will ensure the safe existence of the person, the effective functioning of society and the state.

  2. Isotopically controlled semiconductors

    Energy Technology Data Exchange (ETDEWEB)

    Haller, Eugene E.

    2006-06-19

    The following article is an edited transcript based on the Turnbull Lecture given by Eugene E. Haller at the 2005 Materials Research Society Fall Meeting in Boston on November 29, 2005. The David Turnbull Lectureship is awarded to recognize the career of a scientist who has made outstanding contributions to understanding materials phenomena and properties through research, writing, and lecturing, as exemplified by the life work of David Turnbull. Haller was named the 2005 David Turnbull Lecturer for his 'pioneering achievements and leadership in establishing the field of isotopically engineered semiconductors; for outstanding contributions to materials growth, doping and diffusion; and for excellence in lecturing, writing, and fostering international collaborations'. The scientific interest, increased availability, and technological promise of highly enriched isotopes have led to a sharp rise in the number of experimental and theoretical studies with isotopically controlled semiconductor crystals. This article reviews results obtained with isotopically controlled semiconductor bulk and thin-film heterostructures. Isotopic composition affects several properties such as phonon energies, band structure, and lattice constant in subtle, but, for their physical understanding, significant ways. Large isotope-related effects are observed for thermal conductivity in local vibrational modes of impurities and after neutron transmutation doping. Spectacularly sharp photoluminescence lines have been observed in ultrapure, isotopically enriched silicon crystals. Isotope multilayer structures are especially well suited for simultaneous self- and dopant-diffusion studies. The absence of any chemical, mechanical, or electrical driving forces makes possible the study of an ideal random-walk problem. Isotopically controlled semiconductors may find applications in quantum computing, nanoscience, and spintronics.

  3. Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.

    Science.gov (United States)

    He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna

    2017-09-06

    With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.

  4. Method for separating isotopes

    International Nuclear Information System (INIS)

    Schlenker, R.F.

    1978-01-01

    A vortex tube for separating isotopes is described. A gas mixture containing the isotopic molecules enters the vortex tube under pressure and is separated into a hot discharge flow stream and a cold discharge flow stream. The hot discharge is enriched in lighter isotopic molecules whereas the cold discharge flow stream is enriched in the heavier isotopic molecules. The vortex tube can be used in a single stage or multistage isotope separation apparatus

  5. Method for separating isotopes

    International Nuclear Information System (INIS)

    Jepson, B.E.

    1975-01-01

    Isotopes are separated by contacting a feed solution containing the isotopes with a cyclic polyether wherein a complex of one isotope is formed with the cyclic polyether, the cyclic polyether complex is extracted from the feed solution, and the isotope is thereafter separated from the cyclic polyether

  6. SAFE Newsletter

    OpenAIRE

    2013-01-01

    The Center of Excellence SAFE – “Sustainable Architecture for Finance in Europe” – is a cooperation of the Center for Financial Studies and Goethe University Frankfurt. It is funded by the LOEWE initiative of the State of Hessen (Landes-Offensive zur Entwicklung wissenschaftlich-ökonomischer Exzellenz). SAFE brings together more than 40 professors and just as many junior researchers who are all dedicated to conducting research in support of a sustainable financial architecture. The Center has...

  7. Security challenges in designing I and C systems for nuclear power plant

    International Nuclear Information System (INIS)

    Behera, Rajendra Prasad; Jayanthi, T.; Madhusoodanan, K.; Satya Murty, S.A.V.

    2016-01-01

    Geographically distributed instrumentation and control (I and C) systems in any nuclear power plant (NPP) facilitate the operator with remote access to real-time data and issue supervisory command to remote control devices deployed in the field. The increased connectivity to plant communication network has exposed I and C systems to security vulnerabilities both in terms of physical and logical access. For example, denial-of service and fault induction attack can disrupt the operation of I and C systems by delaying or blocking the flow of data through plant communication network. The design process of I and C system is quite challenging since an engineer has to consider both safety and security features implemented in hardware and software components of the system. This paper analyzes attack taxonomy based on available data and presents Security Tree Analysis (STA) technique towards building safe and secures I and C systems for Nuclear Power Plant. (author)

  8. Perceptions of health care professionals on the safety and security at Odi District Hospital, Gauteng, South Africa.

    Science.gov (United States)

    Okeke, Sunday O; Mabuza, Langalibalele H

    2017-10-27

    For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to.Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28-47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees' safety (p < 0.0001). HCPs had positive perceptions regarding the hospital's security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities' concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them.

  9. Calculation of isotope selective excitation of uranium isotopes using spectral simulation method

    International Nuclear Information System (INIS)

    Al-Hassanieh, O.

    2009-06-01

    Isotope ratio enhancement factor and isotope selectivity of 235 U in five excitation schemes (I: 0→10069 cm - 1 →IP, II: 0 →10081 cm - 1 →IP, III: 0 →25349 cm - 1→ IP, IV: 0→28650 cm - 1 →IP, V: 0→16900 cm - 1 →34659 cm - 1 →IP), were computed by a spectral simulation approach. The effect of laser bandwidth and Doppler width on the isotope ratio enhancement factor and isotope selectivity of 235 U has been studied. The photoionization scheme V gives the highest isotope ratio enhancement factor. The main factors which effect the separation possibility are the isotope shift and the relative intensity of the transitions between hyperfine levels. The isotope ratio enhancement factor decreases exponentially by increasing the Doppler width and the laser bandwidth, where the effect of Doppler width is much greater than the effect of the laser bandwidth. (author)

  10. Isotopic clusters

    International Nuclear Information System (INIS)

    Geraedts, J.M.P.

    1983-01-01

    Spectra of isotopically mixed clusters (dimers of SF 6 ) are calculated as well as transition frequencies. The result leads to speculations about the suitability of the laser-cluster fragmentation process for isotope separation. (Auth.)

  11. Method for separating isotopes

    International Nuclear Information System (INIS)

    Jepson, B.E.

    1976-01-01

    The invention comprises a method for separating different isotopes of elements from each other by contacting a feed solution containing the different isotopes with a macrocyclic polyether to preferentially form a macrocyclic polyether complex with the lighter of the different isotopes. The macrocyclic polyether complex is then separated from the lighter isotope depleted feed solution. A chemical separation of isotopes is carried out in which a constant refluxing system permits a continuous countercurrent liquid-liquid extraction. (LL)

  12. Isotope technique in JPS dam surveillance: its potential

    International Nuclear Information System (INIS)

    Sabri Hassan

    2006-01-01

    Controlling seepage is one of the most important requirements for safe dams. Any leakage at an earth embankment may be potentially dangerous since rapid internal erosion may quickly enlarge an initially minor defect. Thus dam owners need to have thorough surveillance programs that can forewarn of impending problems from seepage or other factors influencing the safety of dams. In carrying out dam surveillance works, all possible efforts should be considered and foreseeing the potential of isotope technique, JPS (Department of Irrigation and Drainage, Malaysia) and MINT (Malaysian Institute for Nuclear Technology Research) participated actively in the UNDP/RCA/IAEA program under RAS/8/093 project sponsored by the International Atomic Energy Agency (IAEA). Through these activities, it was noted that the technique demonstrated very promising potentials such as in assisting dam site selections, site investigations, watershed studies, dam and reservoir design, leakage investigations and sediments related issues, the two latter ones being relatively critical during the operational life of the dam. Establishment of baseline isotopic characteristics (or fingerprint), hydrochemistry, electrical conductivity and temperature profiles is underway for all JPS dams to be later utilized in diagnosing seepage related issues it is suggested that application of this technique be extended to other dam owners nationwide. (Author)

  13. AR.Drone: security threat analysis and exemplary attack to track persons

    Science.gov (United States)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  14. On the combination of isotope hydrogeology with regional flow and transport modelling

    International Nuclear Information System (INIS)

    Barmen, G.A.

    1992-01-01

    Many different methods and tools can be used when trying to improve the information basis on which decisions are made for maintaining a quantitatively and qualitatively safe, long-term use of groundwater resources. In this thesis, classical hydrogeological examinations, hydrochemical investigations, environmental isotope studies, computerized groundwater flow modelling and radioisotope transport modelling have been applied to the large system of reservoirs in the sedimentary deposits of southwestern Scania, Sweden. The stable isotopes 2 H, 18 O and 13 C and the radioactive 3 H and 14 C have been measured and the results obtained can improve the estimations of the periods of recharge and the average circulation times of the groundwater reservoirs studied. A groundwater flow model based on finite difference techniques and a continuum approach has been modified by data from traditional hydrogeological studies. The computer code, NEWSAM, has been used to simulate steady-state and transient isotope transport in the area studied, taking into account advective transport with radioactive decay. The interacting groundwater resevoirs studied have been represented by a three-dimensional system of grids in the numerical model. A major merit of this combination of isotope hydrogeology and regional flow and transport modelling is that the isotope transport simulations help to demonstrate where zones particularly vulnerable to pollution are situated. These locations are chiefly the results of the hydrogeological characteristics traditionally examined, but they are revealed by means of the transport model. Subsequent, more detailed investigations can then be focussed primarily on these vulnerable zones. High contents of radioisotopes in the main aquifer of southwestern Scania may indicate that groundwater withdrawals have stimulated recharge from shallow aquifers and surface waters and that the risk of pollution has increased. (196 refs.) (au)

  15. Security of radioactive sources. Interim guidance for comment

    International Nuclear Information System (INIS)

    2003-06-01

    balance between managing sources safely and securely, while still enabling them to be used by authorized personnel without undue hindrance. Thus the level of security should be commensurate with the potential hazard posed by the source, recognizing the need to ensure appropriate use of the source for beneficial purposes

  16. Exploring the isotopic niche: isotopic variance, physiological incorporation, and the temporal dynamics of foraging

    Directory of Open Access Journals (Sweden)

    Justin Douglas Yeakel

    2016-01-01

    Full Text Available Consumer foraging behaviors are dynamic, changing in response to prey availability, seasonality, competition, and even the consumer's physiological state. The isotopic composition of a consumer is a product of these factors as well as the isotopic `landscape' of its prey, i.e. the isotopic mixing space. Stable isotope mixing models are used to back-calculate the most likely proportional contribution of a set of prey to a consumer's diet based on their respective isotopic distributions, however they are disconnected from ecological process. Here we build a mechanistic framework that links the ecological and physiological processes of an individual consumer to the isotopic distribution that describes its diet, and ultimately to the isotopic composition of its own tissues, defined as its `isotopic niche’. By coupling these processes, we systematically investigate under what conditions the isotopic niche of a consumer changes as a function of both the geometric properties of its mixing space and foraging strategies that may be static or dynamic over time. Results of our derivations reveal general insight into the conditions impacting isotopic niche width as a function of consumer specialization on prey, as well as the consumer's ability to transition between diets over time. We show analytically that moderate specialization on isotopically unique prey can serve to maximize a consumer's isotopic niche width, while temporally dynamic diets will tend to result in peak isotopic variance during dietary transitions. We demonstrate the relevance of our theoretical findings by examining a marine system composed of nine invertebrate species commonly consumed by sea otters. In general, our analytical framework highlights the complex interplay of mixing space geometry and consumer dietary behavior in driving expansion and contraction of the isotopic niche. Because this approach is established on ecological mechanism, it is well-suited for enhancing the

  17. Isotope effects on nuclear shielding

    International Nuclear Information System (INIS)

    Hansen, P.E.

    1983-01-01

    This review concentrates upon empirical trends and practical uses of mostly secondary isotope effects, both of the intrinsic and equilibrium types. The text and the tables are arranged in the following fashion. The most 'popular' isotope effect is treated first, deuterium isotope effects on 13 C nuclear shielding, followed by deuterium on 1 H nuclear shieldings, etc. Focus is thus on the isotopes producing the effect rather than on the nuclei suffering the effect. After a brief treatment of each type of isotope effect, general trends are dealt with. Basic trends of intrinsic isotope effects such as additivity, solvent effects, temperature effects, steric effects, substituent effects and hyperconjugation are discussed. Uses of isotope effects for assignment purposes, in stereochemical studies, in hydrogen bonding and in isotopic tracer studies are dealt with. Kinetic studies, especially of phosphates, are frequently performed by utilizing isotope effects. In addition, equilibrium isotope effects are treated in great detail as these are felt to be new and very important and may lead to new uses of isotope effects. Techniques used to obtain isotope effects are briefly surveyed at the end of the chapter. (author)

  18. Education and training on nuclear security in Greece

    International Nuclear Information System (INIS)

    Pafilis, C. N.; Kamenopoulou, V.; Maltezos, A.; Seferlis, S.; Dimitriou, P.; Matikas, T. E.

    2009-01-01

    The Greek Atomic Energy Commission is the competent authority responsible for designing, implementing and supervising the radiation protection programme in Greece. According to its statutory law one of its main responsibilities is the provision of education and training to people involved in the national emergency response plan against nuclear and radiological threats. Due to the high requirements demanded for the safe conduct of the Athens 2004 Olympic Games, a nuclear security programme was established and the nuclear security infrastructure of the country was upgraded. Under this framework, GAEC provided training on radiation protection, prevention, detection, emergency preparedness and response to the personnel involved in the emergency plan. Since that time, the GAEC continues to organize seminars frequently addressed to the organizations involved in the emergency plan, in order to establish the sustainability of national operational capability on preparedness and response. (authors)

  19. Laser assisted aerodynamic isotope separation

    International Nuclear Information System (INIS)

    Berg, H. van den

    1985-01-01

    It is shown that the efficiency of conventional aerodynamic isotope seperation can be improved by two orders of magnitude with the aid of a relatively weak cw infrared laser which is used to induce isotopically selective condensation. Overall isotope enrichment factors in excess of 2 are obtained as compared to about 1.02 in the conventional seperation. Sulphur isotopes in SF 6 as well as Silicon isotopes in SiF 4 and Bromine isotopes in CF 3 Br are seperated on a laboratory scale. Infrared vibrational predissociation by itself and in combination with isotopically selective condensation are also shown to be effective new ways of isotope separation. (orig.) [de

  20. Survey of main challenges (security and privacy in wireless body area networks for healthcare applications

    Directory of Open Access Journals (Sweden)

    Samaher Al-Janabi

    2017-07-01

    Full Text Available Wireless Body Area Network (WBAN is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN. Finally, open areas for future research and enhancements are explored.

  1. IT Security Support for the Spaceport Command Control System Development

    Science.gov (United States)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  2. Affordable and Secure Nuclear Energy Development: DOE Investments and Laboratory R&D Challenges - A Review

    Energy Technology Data Exchange (ETDEWEB)

    Dasari, Venkateswara Rao [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-12-20

    The need for sustainable and secure nuclear energy is summarized. Driven by economics and public-private partnerships, the technology is evolving. Cost control and regulatory simplification are needed for a nuclear renaissance. Small modular reactors--simple, scalable, and inherently safe--may be the future.

  3. The world in a box? Food security, edible insects, and "One World, One Health" collaboration

    NARCIS (Netherlands)

    Yates-Doerr, E.

    2015-01-01

    Scientists in the Netherlands are cultivating edible insects to address concerns of international food security. Committed to the One World, One Health (OWOH) movement, their research aims to create a safe and effective global solution to the conjoined problems of climate change and an increasing

  4. Separation of uranium isotopes by accelerated isotope exchange reactions

    International Nuclear Information System (INIS)

    Seko, M.; Miyake, T.; Inada, K.; Ochi, K.; Sakamoto, T.

    1977-01-01

    A novel catalyst for isotope exchange reaction between uranium(IV) and uranium(VI) compounds enables acceleration of the reaction rate as much as 3000 times to make industrial separation of uranium isotopes economically possible

  5. Applications of isotopes

    International Nuclear Information System (INIS)

    Kirby-Smith, J.S.

    1976-01-01

    Current and potential applications of stable isotopes as tracers in a number of biomedical and environmental areas are discussed. It is pointed out that a wide variety of problems exist in these fields whose solutions in principle are amenable to the isotopic approach. The number and diversity of these problems as well as the unique role stable isotopes can play in their solution illustrate the importance of achieving and maintaining a broad inventory of isotopic species. Experience has demonstrated unequivocally an additional overriding requirement for widespread exploration of stable isotopes by the scientific and technical community, i.e., the need for low cost availability of the materials in quantity. Some representative applications of 12 C, 13 C, 14 N, 15 N, 16 O, 17 O, and 18 O are discussed

  6. Used fuel extended storage security and safeguards by design roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Durbin, Samuel G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lindgren, Eric Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Robert [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Ketusky, Edward [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); England, Jeffrey [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Scherer, Carolynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sprinkle, James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Michael. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rauch, Eric [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Scaglione, John [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Dunn, T. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-05-01

    In the United States, spent nuclear fuel (SNF) is safely and securely stored in spent fuel pools and dry storage casks. The available capacity in spent fuel pools across the nuclear fleet has nearly reached a steady state value. The excess SNF continues to be loaded in dry storage casks. Fuel is expected to remain in dry storage for periods beyond the initial dry cask certification period of 20 years. Recent licensing renewals have approved an additional 40 years. This report identifies the current requirements and evaluation techniques associated with the safeguards and security of SNF dry cask storage. A set of knowledge gaps is identified in the current approaches. Finally, this roadmap identifies known knowledge gaps and provides a research path to deliver the tools and models needed to close the gaps and allow the optimization of the security and safeguards approaches for an interim spent fuel facility over the lifetime of the storage site.

  7. Handling small arbovirus vectors safely during biosafety level 3 containment: Culicoides variipennis sonorensis (Diptera:Ceratopogonidae) and exotic bluetongue viruses.

    Science.gov (United States)

    Hunt, G J; Tabachnick, W J

    1996-05-01

    Equipment and procedures are described for biosafety level 3 (BL-3) containment work with small, zoophilic arthropods. BL-3 classified pathogens always must be manipulated in biological safety cabinets. Procedures, including physical barriers and handling methods, that prevent the escape of potentially virus-infected insects are discussed, and the use of a monitoring system for insect security is explained. The inability to recover escaped minute, flying insects poses a major difference from similar work with larger insects, such as mosquitoes. Methods were developed for the safe and secure handling of Culicoides variipennis sonorensis Wirth & Jones infected with exotic bluetongue viruses during BL-3 containment.

  8. Integration of the advanced transparency framework to advanced nuclear systems : enhancing Safety, Operations, Security and Safeguards (SOSS)

    International Nuclear Information System (INIS)

    Mendez, Carmen Margarita; Rochau, Gary Eugene; Cleary, Virginia D.

    2008-01-01

    The advent of the nuclear renaissance gives rise to a concern for the effective design of nuclear fuel cycle systems that are safe, secure, nonproliferating and cost-effective. We propose to integrate the monitoring of the four major factors of nuclear facilities by focusing on the interactions between Safeguards, Operations, Security, and Safety (SOSS). We proposed to develop a framework that monitors process information continuously and can demonstrate the ability to enhance safety, operations, security, and safeguards by measuring and reducing relevant SOSS risks, thus ensuring the safe and legitimate use of the nuclear fuel cycle facility. A real-time comparison between expected and observed operations provides the foundation for the calculation of SOSS risk. The automation of new nuclear facilities requiring minimal manual operation provides an opportunity to utilize the abundance of process information for monitoring SOSS risk. A framework that monitors process information continuously can lead to greater transparency of nuclear fuel cycle activities and can demonstrate the ability to enhance the safety, operations, security and safeguards associated with the functioning of the nuclear fuel cycle facility. Sandia National Laboratories (SNL) has developed a risk algorithm for safeguards and is in the process of demonstrating the ability to monitor operational signals in real-time though a cooperative research project with the Japan Atomic Energy Agency (JAEA). The risk algorithms for safety, operations and security are under development. The next stage of this work will be to integrate the four algorithms into a single framework

  9. Breaching the security of the Kaiser Permanente Internet patient portal: the organizational foundations of information security.

    Science.gov (United States)

    Collmann, Jeff; Cooper, Ted

    2007-01-01

    This case study describes and analyzes a breach of the confidentiality and integrity of personally identified health information (e.g. appointment details, answers to patients' questions, medical advice) for over 800 Kaiser Permanente (KP) members through KP Online, a web-enabled health care portal. The authors obtained and analyzed multiple types of qualitative data about this incident including interviews with KP staff, incident reports, root cause analyses, and media reports. Reasons at multiple levels account for the breach, including the architecture of the information system, the motivations of individual staff members, and differences among the subcultures of individual groups within as well as technical and social relations across the Kaiser IT program. None of these reasons could be classified, strictly speaking, as "security violations." This case study, thus, suggests that, to protect sensitive patient information, health care organizations should build safe organizational contexts for complex health information systems in addition to complying with good information security practice and regulations such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996.

  10. Isotopes in heterogeneous catalysis

    CERN Document Server

    Hargreaves, Justin SJ

    2006-01-01

    The purpose of this book is to review the current, state-of-the-art application of isotopic methods to the field of heterogeneous catalysis. Isotopic studies are arguably the ultimate technique in in situ methods for heterogeneous catalysis. In this review volume, chapters have been contributed by experts in the field and the coverage includes both the application of specific isotopes - Deuterium, Tritium, Carbon-14, Sulfur-35 and Oxygen-18 - as well as isotopic techniques - determination of surface mobility, steady state transient isotope kinetic analysis, and positron emission profiling.

  11. Geochemistry of silicon isotopes

    Energy Technology Data Exchange (ETDEWEB)

    Ding, Tiping; Li, Yanhe; Gao, Jianfei; Hu, Bin [Chinese Academy of Geological Science, Beijing (China). Inst. of Mineral Resources; Jiang, Shaoyong [China Univ. of Geosciences, Wuhan (China).

    2018-04-01

    Silicon is one of the most abundant elements in the Earth and silicon isotope geochemistry is important in identifying the silicon source for various geological bodies and in studying the behavior of silicon in different geological processes. This book starts with an introduction on the development of silicon isotope geochemistry. Various analytical methods are described and compared with each other in detail. The mechanisms of silicon isotope fractionation are discussed, and silicon isotope distributions in various extraterrestrial and terrestrial reservoirs are updated. Besides, the applications of silicon isotopes in several important fields are presented.

  12. Software Implementation of Secure Firmware Update in IoT Concept

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2017-01-01

    Full Text Available This paper focuses on a survey of secure firmware update in the Internet of Things, design and description of safe and secure bootloader implementation on RFID UHF reader, encryption with AES-CCM and versioning with use of external backup flash memory device. In the case of problems with HW compatibility or other unexpected errors with new FW version, it is possible to downgrade to previous FW image, including the factory image. Authentication is provided by the UHF RFID service tag used to extract unique initialization vector of the encryption algorithm for each update session. The results show slower update speed with this new upgrade method of approximately 27% compared to older one, using the only AES-CBC algorithm.

  13. Being in a safe and thus secure place, the core of early labour: A secondary analysis in a Swedish context

    Science.gov (United States)

    Carlsson, Ing-Marie

    2016-01-01

    Background Early labour is the very first phase of the labour process and is considered to be a period of time when no professional attendance is needed. However there is a high frequency of women who seek care at the delivery wards during this phase. When a woman is admitted to the delivery ward, one role for midwives is to determine whether the woman is in established labour or not. If the woman is assessed as being in early labour she will probably then be advised to return home. This recommendation is made due to past research that found that the longer a woman is in hospital the higher the risk for complications for her and her child. Women have described how this situation leaves them in a vulnerable situation where their preferences are not always met and where they are not always included in the decision-making process. Aim The aim of this study was to generate a theory based on where a woman chooses to be during the early labour process and to increase our understanding about how experiences can differ from place to place. Methods The method was a secondary analysis with grounded theory. The data used in the analysis was from two qualitative interview studies and 37 transcripts. Conclusion The findings revealed a substantive theory that women needed to be in a safe and thus secure place during early labour. This theory also describes the interplay between how women ascribed their meaning of childbirth as either a natural live event or a medical one, how this influenced where they wanted to be during early labour, and how that chosen place influenced their experiences of labour and birth. PMID:27172510

  14. DETERMINANTS OF HOUSEHOLD FOOD SECURITY: A COMPARATIVE ANALYSIS OF EASTERN AND WESTERN INDONESIA

    Directory of Open Access Journals (Sweden)

    Puspi Eko Wiranthi

    2014-04-01

    Full Text Available Indonesian Food Security Council in 2009 issued a Food Security and Vulnerability Atlas (FSVA which stated that there were 100 districts in Indonesia which were most vulnerable to food insecurity and 79% of which were located in eastern region. By using Susenas regular data in 2008, this study aimed to analyze determinants of household food security in eastern compared to western region. The ordered logistic regression model was employed to investigate the determinants of household food security. The result showed that most of households in Indonesia were vulnerable to food insecurity (41.76%. The percentage in eastern region (48.56% was higher than that in western region (41.76%. Increase in expenditure equivalent, age and education level of household head, female household head, small household size, household head’s occupation in non-agriculture and urban household would increase the probability of a household to become food secure in both regions. The difference was in the factor of access to electricity in eastern and access to safe drinking water and loan in western region. Policies which aim to increase education, credit access, and intensive family planning have big roles in improving household food security.

  15. ICT: isotope correction toolbox.

    Science.gov (United States)

    Jungreuthmayer, Christian; Neubauer, Stefan; Mairinger, Teresa; Zanghellini, Jürgen; Hann, Stephan

    2016-01-01

    Isotope tracer experiments are an invaluable technique to analyze and study the metabolism of biological systems. However, isotope labeling experiments are often affected by naturally abundant isotopes especially in cases where mass spectrometric methods make use of derivatization. The correction of these additive interferences--in particular for complex isotopic systems--is numerically challenging and still an emerging field of research. When positional information is generated via collision-induced dissociation, even more complex calculations for isotopic interference correction are necessary. So far, no freely available tools can handle tandem mass spectrometry data. We present isotope correction toolbox, a program that corrects tandem mass isotopomer data from tandem mass spectrometry experiments. Isotope correction toolbox is written in the multi-platform programming language Perl and, therefore, can be used on all commonly available computer platforms. Source code and documentation can be freely obtained under the Artistic License or the GNU General Public License from: https://github.com/jungreuc/isotope_correction_toolbox/ {christian.jungreuthmayer@boku.ac.at,juergen.zanghellini@boku.ac.at} Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  16. Uses of stable isotopes

    International Nuclear Information System (INIS)

    Axente, Damian

    1998-01-01

    The most important fields of stable isotope use with examples are presented. These are: 1. Isotope dilution analysis: trace analysis, measurements of volumes and masses; 2. Stable isotopes as tracers: transport phenomena, environmental studies, agricultural research, authentication of products and objects, archaeometry, studies of reaction mechanisms, structure and function determination of complex biological entities, studies of metabolism, breath test for diagnostic; 3. Isotope equilibrium effects: measurement of equilibrium effects, investigation of equilibrium conditions, mechanism of drug action, study of natural processes, water cycle, temperature measurements; 4. Stable isotope for advanced nuclear reactors: uranium nitride with 15 N as nuclear fuel, 157 Gd for reactor control. In spite of some difficulties of stable isotope use, particularly related to the analytical techniques, which are slow and expensive, the number of papers reporting on this subject is steadily growing as well as the number of scientific meetings organized by International Isotope Section and IAEA, Gordon Conferences, and regional meeting in Germany, France, etc. Stable isotope application development on large scale is determined by improving their production technologies as well as those of labeled compound and the analytical techniques. (author)

  17. Going Beyond Compliance: A Strategic Framework for Promoting Information Security in Hospitals.

    Science.gov (United States)

    Zandona, David J; Thompson, Jon M

    In the past decade, public and private organizations have experienced a significant and alarming rise in the number of data breaches. Across all sectors, there seems to be no safe haven for the protection of information. In the health care industry, the trend is even worse. Information security is at an unbelievable low point, and it is unlikely that government oversight can fix this issue. Health care organizations have ramped up their approaches to addressing the problem; however, these initiatives are often incremental rather than transformational. Hospitals need an overall organization-wide strategy to prevent breaches from occurring and to minimize effects if they do occur. This article provides an analysis of the literature related to health information security and offers a suggested strategy for hospital administrators to follow in order to create a more secure environment for patient health information.

  18. What Isn't Working and New Requirements. The Need to Harmonize Safety and Security Requirements

    International Nuclear Information System (INIS)

    Flory, D.

    2011-01-01

    The year 2011 marks the 50th anniversary of the first IAEA regulations governing the transport of radioactive material. However transport safety at the IAEA obviously predates this, since the regulations took time to develop. In 1957, GC. 1/1 already states: 'The Agency should undertake studies with a view to the establishment of regulations relating to the international transportation of radioactive materials. ...'. And goes further: 'The transport of radioisotopes and radiation sources has brought to light many problems and involves the need for uniform packaging and shipping regulations ... facilitate the acceptance of such materials by sea and air carriers'. This conference reiterates the challenge given then through the sub-title 'The next fifty years - Creating a Safe, Secure and Sustainable Framework'. Looking back, we can see that the sustainable framework was a goal in 1957, where radioactive material could be transported should it be desired. Since these early days we have added to safety the need to ensure security. However we still see the same calls today to eradicate denial of shipment, which might suggest we have not progressed. But the picture today is very different - we have today well established requirements for safe transport of radioactive material, and the recommendations for security in transport are coming of age for all radioactive materials. The outstanding issue would seem to be harmonisation, not just between safety and security in IAEA documents, but also harmonisation between Member States.

  19. Intracellular Cadmium Isotope Fractionation

    Science.gov (United States)

    Horner, T. J.; Lee, R. B.; Henderson, G. M.; Rickaby, R. E.

    2011-12-01

    Recent stable isotope studies into the biological utilization of transition metals (e.g. Cu, Fe, Zn, Cd) suggest several stepwise cellular processes can fractionate isotopes in both culture and nature. However, the determination of fractionation factors is often unsatisfactory, as significant variability can exist - even between different organisms with the same cellular functions. Thus, it has not been possible to adequately understand the source and mechanisms of metal isotopic fractionation. In order to address this problem, we investigated the biological fractionation of Cd isotopes within genetically-modified bacteria (E. coli). There is currently only one known biological use or requirement of Cd, a Cd/Zn carbonic anhydrase (CdCA, from the marine diatom T. weissfloggii), which we introduce into the E. coli genome. We have also developed a cleaning procedure that allows for the treating of bacteria so as to study the isotopic composition of different cellular components. We find that whole cells always exhibit a preference for uptake of the lighter isotopes of Cd. Notably, whole cells appear to have a similar Cd isotopic composition regardless of the expression of CdCA within the E. coli. However, isotopic fractionation can occur within the genetically modified E. coli during Cd use, such that Cd bound in CdCA can display a distinct isotopic composition compared to the cell as a whole. Thus, the externally observed fractionation is independent of the internal uses of Cd, with the largest Cd isotope fractionation occurring during cross-membrane transport. A general implication of these experiments is that trace metal isotopic fractionation most likely reflects metal transport into biological cells (either actively or passively), rather than relating to expression of specific physiological function and genetic expression of different metalloenzymes.

  20. Applications of stable isotopes

    International Nuclear Information System (INIS)

    Letolle, R.; Mariotti, A.; Bariac, T.

    1991-06-01

    This report reviews the historical background and the properties of stable isotopes, the methods used for their measurement (mass spectrometry and others), the present technics for isotope enrichment and separation, and at last the various present and foreseeable application (in nuclear energy, physical and chemical research, materials industry and research; tracing in industrial, medical and agronomical tests; the use of natural isotope variations for environmental studies, agronomy, natural resources appraising: water, minerals, energy). Some new possibilities in the use of stable isotope are offered. A last chapter gives the present state and forecast development of stable isotope uses in France and Europe

  1. High mass isotope separation arrangement

    International Nuclear Information System (INIS)

    Eerkens, J.W.

    1976-01-01

    An isotope separation arrangement for separating a preselected isotope from a mixture of chemically-identical but isotopically-different molecules by either photon-induced pure revibrational or vibronic selective excitation of the molecules containing the atoms of the isotope to be separated from a lower to a higher energy state, and a chemical reaction of the higher energy state molecules with a chemically-reactive agent to form a chemical compound containing primarily the atoms of the isotope to be separated in a physicochemical state different from the physicochemical state of the mixture of chemically-identical but isotopically-different molecules. The chemical compound containing the atoms of the isotope to be separated may be subsequently processed to obtain the isotope. The laser configuration used to generate the photon beam is fully described

  2. Prediction of safe driving Behaviours based on health belief model: the case of taxi drivers in Bandar Abbas, Iran.

    Science.gov (United States)

    Razmara, Asghar; Aghamolaei, Teamur; Madani, Abdoulhossain; Hosseini, Zahra; Zare, Shahram

    2018-03-20

    Road accidents are among the main causes of mortality. As safe and secure driving is a key strategy to reduce car injuries and offenses, the present research aimed to explore safe driving behaviours among taxi drivers based on the Health Belief Model (HBM). This study was conducted on 184 taxi drivers in Bandar Abbas who were selected based on a multiple stratified sampling method. Data were collected by a questionnaire comprised of a demographic information section along with the constructs of the HBM. Data were analysed by SPSS ver19 via a Pearson's correlation coefficient and multiple regressions. The mean age of the participants was 45.1 years (SD = 11.1). They all had, on average, 10.3 (SD = 7/5) years of taxi driving experience. Among the HBM components, cues to action and perceived benefits were shown to be positively correlated with safe driving behaviours, while perceived barriers were negatively correlated. Cues to action, perceived barriers and perceived benefits were shown to be the strongest predictors of a safe drivers' behaviour. Based on the results of this study in designing health promotion programmes to improve safe driving behaviours among taxi drivers, cues to action, perceived benefits and perceived barriers are important. Therefore, advertising, the design of information campaigns, emphasis on the benefits of safe driving behaviours and modification barriers are recommended.

  3. Isotope separation process

    International Nuclear Information System (INIS)

    Lyon, R.K.

    1976-01-01

    The instant invention relates to a process for separating a material into two or more parts in each of which the abundances of the isotopes of a given element differ from the abundances of the isotopes of the same material in said material. In one embodiment, the invention relates to a method for the isotopically selective excitation of gas phase molecules by multiple infrared photon absorption followed by selective dissociation of said excited molecules by the absorption of a single photon of visible or ultraviolet light. This invention is useful for, but not limited to, the separation of the principal isotopes of uranium. 11 Claims, 2 Drawing Figures

  4. Microcontroller Based Home Security and Load Controlling Using Gsm Technology

    OpenAIRE

    Mustafijur Rahman; A.H.M Zadidul Karim; Sultanur Nyeem; Faisal Khan; Golam Matin

    2015-01-01

    "Home automation" referred to as 'Intelligent home' or 'automated home', indicates the automation of daily tasks with electrical devices used in homes. This could be the control of lights or more complex chores such as remote viewing of the house interiors for surveillance purposes. The emerging concept of smart homes offers a comfortable, convenient and safe and secure environment for occupants. These include automatic load controlling, fire detection, temperature sensing, and motion detecti...

  5. Waste Issues Associated with the Safe Movement of Hazardous Chemicals

    International Nuclear Information System (INIS)

    Dare, J. H.; Cournoyer, M. E.

    2002-01-01

    Moving hazardous chemicals presents the risk of exposure for workers engaged in the activity and others that might be in the immediate area. Adverse affects are specific to the chemicals and can range from minor skin, eye, or mucous membrane irritation, to burns, respiratory distress, nervous system dysfunction, or even death. A case study is presented where in the interest of waste minimization; original shipping packaging was removed from a glass bottle of nitric acid, while moving corrosive liquid through a security protocol into a Radiological Control Area (RCA). During the transfer, the glass bottle broke. The resulting release of nitric acid possibly exposed 12 employees with one employee being admitted overnight at a hospital for observation. This is a clear example of administrative controls to reduce the generation of suspect radioactive waste being implemented at the expense of employee health. As a result of this event, material handling procedures that assure the safe movement of hazardous chemicals through a security protocol into a radiological control area were developed. Specifically, hazardous material must be transferred using original shipping containers and packaging. While this represents the potential to increase the generation of suspect radioactive waste in a radiological controlled area, arguments are presented that justify this change. Security protocols for accidental releases are also discussed. In summary, the 12th rule of ''Green Chemistry'' (Inherently Safer Chemistry for Accident Prevention) should be followed: the form of a substance used in a chemical process (Movement of Hazardous Chemicals) should be chosen to minimize the potential for chemical accidents, including releases

  6. Waste Issues Associated with the Safe Movement of Hazardous Chemicals

    Energy Technology Data Exchange (ETDEWEB)

    Dare, J. H.; Cournoyer, M. E.

    2002-02-26

    Moving hazardous chemicals presents the risk of exposure for workers engaged in the activity and others that might be in the immediate area. Adverse affects are specific to the chemicals and can range from minor skin, eye, or mucous membrane irritation, to burns, respiratory distress, nervous system dysfunction, or even death. A case study is presented where in the interest of waste minimization; original shipping packaging was removed from a glass bottle of nitric acid, while moving corrosive liquid through a security protocol into a Radiological Control Area (RCA). During the transfer, the glass bottle broke. The resulting release of nitric acid possibly exposed 12 employees with one employee being admitted overnight at a hospital for observation. This is a clear example of administrative controls to reduce the generation of suspect radioactive waste being implemented at the expense of employee health. As a result of this event, material handling procedures that assure the safe movement of hazardous chemicals through a security protocol into a radiological control area were developed. Specifically, hazardous material must be transferred using original shipping containers and packaging. While this represents the potential to increase the generation of suspect radioactive waste in a radiological controlled area, arguments are presented that justify this change. Security protocols for accidental releases are also discussed. In summary, the 12th rule of ''Green Chemistry'' (Inherently Safer Chemistry for Accident Prevention) should be followed: the form of a substance used in a chemical process (Movement of Hazardous Chemicals) should be chosen to minimize the potential for chemical accidents, including releases.

  7. SAFETY AND SECURITY MEASURES ADOPTED BY THE HOTELS AND THEIR IMPACT ON CUSTOMER RELATIONSHIP MANAGEMENT

    OpenAIRE

    Abhishek Chauhan; Ankit Shukla; Pradeep Negi

    2018-01-01

    Hotel can be defined as “Home away from home” for the guests who come to the hotel as they receive homely environment and services in the hotel. The guests who come to the hotels come with an understanding that they and their belongings would be safe and secured in the hotel during their occupancy in the hotel. The safety and security aspects play a very vital role in hospitality industry as this industry is dependent largely on the customer relationship with the hotel. If the guest encounter...

  8. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint.

    Science.gov (United States)

    Chen, Han-Shen

    2017-01-30

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015-2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.

  9. Review of Safety and Security of Radioactive Sources in Africa

    International Nuclear Information System (INIS)

    Kiti, Shadrack Anthony; Choi, Kwang Sik

    2011-01-01

    Radioactive materials are used worldwide for peaceful applications in medicine, industry, agriculture, environmental science, education and research and military applications. Most of these radioactive sources used are imported therefore trans-boundary movement is a significant factor in consideration of safety and security measures during movement of these sources. It is estimated that 20 million packages of radioactive materials are transported annually worldwide and this number of shipments is expected to increase due to the renaissance of nuclear power generation. The African continent has shown considerable leadership in its advocacy for the safety and security of radioactive sources. The First Africa Workshop on the Establishment of a Legal Framework governing Radiation Protection, the Safety of Radiation Sources and the Safe Management of Radioactive Waste held in Ethiopia in 2001 called upon the IAEA to form a forum for African countries to consider the Code of Conduct on the Safety and Security of Radioactive Sources and give it a legally binding effect so that the peaceful use of nuclear technology is not compromised. Despite these laudable efforts, Africa still faces considerable challenges in the implementation of safety and security of radioactive sources because of weak regulatory control and lack of infrastructure to properly control, manage and secure radiation sources 1 . The purpose of this paper was therefore, to analyze, review, address and share knowledge and experience with regard to safety and security measures of radioactive materials in Africa. This project will benefit IAEA's African member states in creating nuclear safety and security networking in the region

  10. Government of Canada response to the report of the Expert Review Panel on medical isotope production

    International Nuclear Information System (INIS)

    Paradis, C.

    2010-01-01

    Recent supply disruptions have highlighted the fragility of the supply chain that delivers essential medical isotopes to patients globally. A new and more reliable way of supplying isotopes to Canadians needs to be found. That is why the Government of Canada established the Expert Review Panel on Medical Isotope Production (the Panel) in June 2009. The Government recognizes the relatively long lead times associated with the development of any new source of medical. isotopes. To ensure that appropriate action is taken now for the long term, the Government tasked the Panel with reporting to the Minister. of Natural Resources on its assessment of the most viable options for securing supplies of technetium-99m (Tc99r) for the Canadian health care system over the medium and long term and the actions that may be required by governments and others to facilitate realization of these options. The Panel reported to the Minister of Natural Resources on November 30, 2009. Since then, the Government has been carefully considering the recommendations of the Panel within the context of the broader nuclear and health care landscape. What follows is the Government's response to the Panel's thoughtful, comprehensive and insightful report, including actions that are planned based on its recommendations. (author)

  11. Isotope laboratories

    International Nuclear Information System (INIS)

    1978-01-01

    This report from the Dutch Ministry of Health is an advisory document concerned with isotope laboratories in hospitals, in connection with the Dutch laws for hospitals. It discusses which hospitals should have isotope laboratories and concludes that as many hospitals as possible should have small laboratories so that emergency cases can be dealt with. It divides the Netherlands into regions and suggests which hospitals should have these facilities. The questions of how big each lab. is to be, what equipment each has, how each lab. is organised, what therapeutic and diagnostic work should be carried out by each, etc. are discussed. The answers are provided by reports from working groups for in vivo diagnostics, in vitro diagnostics, therapy, and safety and their results form the criteria for the licences of isotope labs. The results of a questionnaire for isotope labs. already in the Netherlands are presented, and their activities outlined. (C.F.)

  12. A level-playing field for medical isotope production - How to phase-out reliance on HEU

    International Nuclear Information System (INIS)

    Kuperman, A.J.

    1999-01-01

    Two decades ago, civilian commerce in highly enriched uranium (HEU) for use as targets in the production of medical isotopes was considered a relatively minor security concern for three reasons. First, the number of producers was small. Second, the amount of HEU involved was small. Third, the amount of HEU was dwarfed by the quantities of HEU in civilian commerce as fuel for nuclear research and test reactors. Now, however, all three variables have changed. First, as the use of medical isotopes has expanded rapidly, production programs are proliferating. Second, as the result of such new producers and the expansion of existing production facilities, the amounts of HEU involved are growing. Third, as the RERTR program has facilitated the phase-out of HEU as fuel in most research and test reactors, the quantities of HEU for isotope production have come to represent a significant percentage of global commerce in this weapons-usable material. Medical isotope producers in several states are cooperating with the RERTR program to convert to low-enriched uranium (LEU) targets within the next few years, and one already relies on LEU for isotope production. However, the three biggest isotope producers - in Canada and the European Union - continue to rely on HEU, creating a double-standard that endangers the goal of the RERTR program. Each of these three producers has expressed economic concerns about being put at a competitive disadvantage if it alone converts. This paper proposes forging a firmer international consensus that all present and future isotope producers should convert to LEU, and calls for codifying such a commitment in a statement of intent to be prepared by producers over the next year. With such a level playing field, no producer would need fear being put at a competitive disadvantage by conversion, or being stigmatized by pressure groups for continued reliance on HEU. The phase-out of all HEU commerce for isotope production could be achieved within about

  13. ISOTOPE METHODS IN HOMOGENEOUS CATALYSIS.

    Energy Technology Data Exchange (ETDEWEB)

    BULLOCK,R.M.; BENDER,B.R.

    2000-12-01

    The use of isotope labels has had a fundamentally important role in the determination of mechanisms of homogeneously catalyzed reactions. Mechanistic data is valuable since it can assist in the design and rational improvement of homogeneous catalysts. There are several ways to use isotopes in mechanistic chemistry. Isotopes can be introduced into controlled experiments and followed where they go or don't go; in this way, Libby, Calvin, Taube and others used isotopes to elucidate mechanistic pathways for very different, yet important chemistries. Another important isotope method is the study of kinetic isotope effects (KIEs) and equilibrium isotope effect (EIEs). Here the mere observation of where a label winds up is no longer enough - what matters is how much slower (or faster) a labeled molecule reacts than the unlabeled material. The most careti studies essentially involve the measurement of isotope fractionation between a reference ground state and the transition state. Thus kinetic isotope effects provide unique data unavailable from other methods, since information about the transition state of a reaction is obtained. Because getting an experimental glimpse of transition states is really tantamount to understanding catalysis, kinetic isotope effects are very powerful.

  14. Environmental and security challenges of nuclear plants

    International Nuclear Information System (INIS)

    Omar, A.S.

    2014-01-01

    The world population increase, the acceleration of global requirement for development and the need to expand energy production, have led to the depletion of natural resources. The international efforts are increasing to get clean, safe and economical energy sources . The electricity generated from nuclear energy considers less polluting and high economic competitiveness as well as reliability and efficiency. The nuclear power plants projects face significant challenges, especially after two major accidents, in Chernobyl 1986 and Fukushima 2011 including the fears of radiation effects, nuclear waste management and nuclear proliferation issues, as well as the lack of public acceptance. So those bodies interested in operating nuclear power plants work to increase nuclear safety standards, review the nuclear facilities safety, know the strict application of laws, seek to prove the economic competitiveness, maintain environmental security, assist in the nonproliferation regime and gain public acceptance. This article discusses the most important environmental and security challenges of nuclear power plants. It highlights the importance of the peaceful uses of nuclear energy as a source of sustainable development and environmental security. It also offers a number of recommendations to support the Arab countries trend towards the inclusion of nuclear energy option within their national programs to generate electricity. (author)

  15. A Way Forward to Improve Nutrition with Stable Isotopes

    International Nuclear Information System (INIS)

    Gorisek, Aleksandra Sasa

    2014-01-01

    People need food and water to survive, but nutritious food is central to healthy living. Energy-dense fat, protein and carbohydrates need to be accompanied by vitamins and minerals (micronutrients) to ensure proper nutrition. Malnutrition, an inappropriate balance of nutrients, can occur with too much or too little of food. The IAEA works with other agencies to evaluate interventions in Member States that are designed to address the problem of malnutrition. Stable isotope techniques can be used to validate the information collected through the use of questionnaires and simple measurements. Capacity building through training and the provision of equipment enables nutritionists worldwide to use these methods in community settings as they are safe, non-invasive and can be used with adults and children of all ages

  16. Process for isotope separation

    International Nuclear Information System (INIS)

    Emile, B.F.M.

    1983-11-01

    A process is claimed for isotopic separation applied to isotopes of elements that can be placed in at least a physicochemical form in which the isotopic atoms or the molecules containing these atoms can be easily displaced and for which there are selective radiations preferentially absorbed by the isotopes of a certain type or by the molecules containing them, said absorption substantially increasing the probability of ionization of said atoms or molecules relative to the atoms or molecules that did not absorb the radiation. The process consists of placing the isotopic mixture in such a form, subjecting it in a separation zone to selective radiations and to an electrical field that produces migration of positive ions toward the negative electrodes and negative ions toward the positive electrodes, and withdrawing from certain such zones the fractions thus enriched in certain isotopes

  17. Isotope separation process

    International Nuclear Information System (INIS)

    Cabicar, J.; Stamberg, K.; Katzer, J.

    1983-01-01

    A process for separating isotopes by the method of controlled distribution is claimed. A first phase is either a solution of isotopic components and a ligand (from 10 - 6 M to a saturated solution), or a gaseous mixture of isotopic components, or a gaseous mixture of isotopic components and an inert gas. The isotopes are in the starting mixture in molar ratio from 1:10 5 to 1:10 - 5 . The second phase is a solid sorbent such as styrene-divinylbenzene ion exchangers, or bio-sorbents on the basis of mycelium of lower fungi and sorbents on the basis of cellulose, or an extraction agent such as tributyl phosphate and trioctyl amine, if need be, kept by a carrier such as teflon, silica gel and cellulose. The two-phase system exhibits non-linear equilibrium isotherm for sorption and/or desorption or for extraction and/or re-extraction. After bringing both phases into contact the rate of transport of isotopic components from one phase into another is not equal. Retardation of isotopic exchange takes place by complexation of isotopes with ligands such as cabonate, sulphate, citrate, chloride and ethylenediamine tetraacetate ions, or by using sorbents and extraction agents with chelating functional groups such as carboxyl and hyroxyl groups, groups on the basis of phosphorus, nitrogen and sulphur and/or by operating in darkness, or in the light having wave length between 2.5x10 2 and 10 9 nm. The contact time is between 10 - 2 and 10 6 s, temperature between 10 2 and 10 3 K, the number of stirrer revolutions between 10 - 2 and 10 4 revolutions per s, flow rate at column arrangement between 10 - 6 and 10 - 1 m/s and the size of particles of sorbent between 10 - 6 and 10 - 2 m

  18. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    Science.gov (United States)

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  19. Identification of sources of lead exposure in French children by lead isotope analysis: a cross-sectional study

    Directory of Open Access Journals (Sweden)

    Lucas Jean-Paul

    2011-08-01

    Full Text Available Abstract Background The amount of lead in the environment has decreased significantly in recent years, and so did exposure. However, there is no known safe exposure level and, therefore, the exposure of children to lead, although low, remains a major public health issue. With the lower levels of exposure, it is becoming more difficult to identify lead sources and new approaches may be required for preventive action. This study assessed the usefulness of lead isotope ratios for identifying sources of lead using data from a nationwide sample of French children aged from six months to six years with blood lead levels ≥25 μg/L. Methods Blood samples were taken from 125 children, representing about 600,000 French children; environmental samples were taken from their homes and personal information was collected. Lead isotope ratios were determined using quadrupole ICP-MS (inductively coupled plasma - mass spectrometry and the isotopic signatures of potential sources of exposure were matched with those of blood in order to identify the most likely sources. Results In addition to the interpretation of lead concentrations, lead isotope ratios were potentially of use for 57% of children aged from six months to six years with blood lead level ≥ 25 μg/L (7% of overall children in France, about 332,000 children, with at least one potential source of lead and sufficiently well discriminated lead isotope ratios. Lead isotope ratios revealed a single suspected source of exposure for 32% of the subjects and were able to eliminate at least one unlikely source of exposure for 30% of the children. Conclusions In France, lead isotope ratios could provide valuable additional information in about a third of routine environmental investigations.

  20. Hydrogen isotope separation experience at the Savannah River Site

    International Nuclear Information System (INIS)

    Lee, M.W.

    1993-01-01

    Savannah River Site (SRS) is a sole producer of tritium for US Weapons Program. SRS has built Facilities, developed the tritium handling processes, and operated safely for the last forty years. Tritium is extracted from the irradiated reactor target, purified, mixed with deuterium, and loaded to the booster gas bottle in the weapon system for limited lifetime. Tritium is recovered from the retired bottle and recycled. Newly produced tritium is branded into the recycled tritium. One of the key process is the hydrogen isotope separation that tritium is separated from deuterium and protium. Several processes have been used for the hydrogen isotope separation at SRS: Thermal Diffusion Column (TD), Batch Cryogenic Still (CS), and Batch Chromatography called Fractional Sorption (FS). TD and CS requires straight vertical columns. The overall system separation factor depends on the length of the column. These are three story building high and difficult to put in glove box. FS is a batch process and slow operation. An improved continuous chromatographic process called Thermal Cycling Absorption Process (TCAP) has been developed. It is small enough to be about to put in a glove box yet high capacity comparable to CS. The SRS tritium purification processes can be directly applicable to the Fusion Fuel Cycle System of the fusion reactor

  1. Isotope separation process

    International Nuclear Information System (INIS)

    Thomas, W.R.L.

    1979-01-01

    The instant invention relates to an improved process for separating a material into two or more parts in each of which the abundances of the isotopes of a given element differ from the abundances of the isotopes of the same element in said material. More particularly, the invention relates to a method for the isotopically selective excitation of gas phase molecules by multiple infrared photon absorption followed by a step wherein more of the excited molecules than non-excited molecules are converted to a chemically different form which may be separated by means known in the art. This invention is useful for, but not limited to, the separation of the principal isotopes of uranium

  2. Isotope separation process

    International Nuclear Information System (INIS)

    Lyon, R.K.

    1977-01-01

    The instant invention relates to a process for separating a material into two or more parts in each of which the abundances of the isotopes of a given element differ from the abundances of the isotopes of the same material in said material. More particularly, the invention relates to a method for the isotopically selective excitation of gas phase molecules by multiple infrared photon absorption followed by a step wherein more of the excited molecules than nonexcited molecules are converted to a chemically different form which may be separated by means known in the art. This invention is useful for, but not limited to, the separation of the principal isotopes of uranium. 15 claims, 1 figure

  3. Artificial neural network application in isotopic characterization of radioactive waste drums

    International Nuclear Information System (INIS)

    Potiens Junior, Ademar Jose

    2005-01-01

    One of the most important aspects to the development of the nuclear technology is the safe management of the radioactive waste arising from several stages of the nuclear fuel cycles, as well as from production and use of radioisotope in the medicine, industry and research centers. The accurate characterization of this waste is not a simple task, given to its diversity in isotopic composition and non homogeneity in the space distribution and mass density. In this work it was developed a methodology for quantification and localization of radionuclides not non homogeneously distributed in a 200 liters drum based in the Monte Carlo Method and Artificial Neural Network (RNA), for application in the isotopic characterization of the stored radioactive waste at IPEN. Theoretical arrangements had been constructed involving the division of the radioactive waste drum in some units or cells and some possible configurations of source intensities. Beyond the determination of the detection positions, the respective detection efficiencies for each position in function of each cell of the drum had been obtained. After the construction and the training of the RNA's for each developed theoretical arrangement, the validation of the method were carried out for the two arrangements that had presented the best performance. The results obtained show that the methodology developed in this study could be an effective tool for isotopic characterization of radioactive wastes contained in many kind of packages. (author)

  4. Isotope separation method and apparatus

    International Nuclear Information System (INIS)

    Lyon, R.K.; Eisner, P.N.; Thomas, W.R.L.

    1980-01-01

    A method and apparatus are specified for separating a mixture of isotopes present in a compound, preferably a gaseous compound, into two or more parts in each of which the abundances of the isotopes differ from the natural abundances of the isotopes in the compound. The invention particularly relates to carrying out a laser induced, isotopically selective conversion of gaseous molecules in such a manner as to achieve more than one stage of isotope separation along the length of the laser beam. As an example, the invention is applied to the separation of the isotopes of uranium in UF 6 , in which either the U-235 or U-238 isotope is selectively excited by means of irradiation from an infrared laser, and the selectively excited isotope converted into a product that can be recovered from UF 6 by one of a variety of methods that are described. (U.K.)

  5. Isotope angiocardiography

    International Nuclear Information System (INIS)

    Stepinska, J.; Ruzyllo, W.; Konieczny, W.

    1979-01-01

    Method of technetium isotope 99 m pass through the heart recording with the aid of radioisotope scanner connected with seriograph and computer is being presented. Preliminary tests were carried out in 26 patients with coronary disease without or with previous myocardial infarction, cardiomyopathy, ventricular septal defect and in patients with artificial mitral and aortic valves. The obtained scans were evaluated qualitatively and compared with performed later contrast X-rays of the heart. Size of the right ventricle, volume and rate of left atrial evacuation, size and contractability of left ventricle were evaluated. Similarity of direct and isotope angiocardiographs, non-invasional character and repeatability of isotope angiocardiography advocate its usefulness. (author)

  6. International Isotopes Markets

    Directory of Open Access Journals (Sweden)

    Stanislaw Z. Zhiznin

    2016-01-01

    Full Text Available The paper studies world markets of stable and radioactive isotopes. Isotopes have found various applications in science, industry, agriculture and other sectors of the economy, but especially - in medicine. Nuclear medicine is developing intensively all over the world thanks to the success in the treatment of various diseases with the help of radioactive pharmaceuticals (radiopharmaceuticals. The article uses empirical data from a forecast study of the global radiopharmaceuticals market made in 2015 by a research company «Markets and Markets» for the European, North American and global markets. The paper also analyzes the statistical data on the global export and import of natural uranium, enriched and depleted uranium, plutonium, thorium and some stable isotopes of non-medical purposes, presented by a company «Trend economy» in 2014. Despite a unique industrial base for the production of isotopes created in the Soviet Union Russia occupies a modest position on the world market of nuclear medicine except for certain areas. More than 80% of isotopes, produced in USSR were consumed domestically, the export of the stable and radioactive isotopes was in equal proportions. Now the country's domestic radiopharmaceuticals market is poorly developed. To radically change the situation, it is necessary to carry out reforms that stimulate the development of nuclear medicine.

  7. Safe Handling of Radioisotopes. 1973 Edition

    International Nuclear Information System (INIS)

    1973-01-01

    Under its Statute the International Atomic Energy Agency is empowered to provide for the application of standards of safety for protection against radiation to its own operations and to operations making use of assistance provided by it or with which it is otherwise directly associated. To this end authorities receiving such assistance are required to observe relevant health and safety measures prescribed by the Agency. As a first step, it was considered an urgent task to provide users of radionuclides with a manual of practice for the safe handling of these substances. The first edition of such a manual was published in 1958 and represented the first of the ''Safety Series'', a series of manuals and codes on health and safety published by the Agency. It was prepared after careful consideration of existing national and international codes of radiation safety by a group of international experts and in consultation with other international bodies. This edition presents the second revision. In response to the suggestion made by some Member States, the term 'radioisotopes' has been changed to 'radionuclides' in the title and, as appropriate, in the text because the term 'radionuclides' includes the radioactive element itself as well as the isotopes. The series of manuals and codes published in the Safety Series and the Technical Reports Series give more complete advice to the user on specialized topics.

  8. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  9. Atomic and molecular isotope separation

    International Nuclear Information System (INIS)

    Melamed, N.T.

    1979-01-01

    A method for differentially exciting a selected isotopic species in a mixture of isotopic species is described characterized in that almost the entire isotopic mixture is placed in an excited gaseous state; and a preselected isotopic species is then selectively de-excited through stimulated emission

  10. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  11. Elgamal Elliptic Curve Based Secure Communication Architecture for Microgrids

    Directory of Open Access Journals (Sweden)

    Sarmadullah Khan

    2018-03-01

    Full Text Available Microgrids play an important role in today’s power systems as the distributed generation is becoming increasingly common. They can operate in two possible modes: (i standalone and (ii grid-connected. The transitional state from standalone to grid-connected mode is very critical and requires the microgrid to be synchronized with the main grid. Thus, secure, reliable and trustworthy control and communication is utmost necessary to prevent out-of-sync connection which could severely damage the microgrid and/or the main grid. Existing solutions consume more resources and take long time to establish a secure connection. The objective of the proposed work is to reduce the connection establishment time by using efficient computational algorithms and save the resources. This paper proposes a secure authentication and key establishment mechanism for ensuring safe operation and control of the microgrids. The proposed approach uses the concept of Elgamal with slight modification. Private key of the sender is used instead of a random number. The proposed modification ensures the non repudiation. This paper also presents a system threat model along with security network architecture and evaluates the performance of proposed algorithm in protecting microgrid communication against man in the middle attacks and replay attacks that could delay the packets to damage the system and need to be detected. Mathematical modeling and simulation results show that the proposed algorithm performs better than the existing protocols in terms of connection establishment, resource consumption and security level.

  12. Electrochemically controlled iron isotope fractionation

    Science.gov (United States)

    Black, Jay R.; Young, Edward D.; Kavner, Abby

    2010-02-01

    Variations in the stable isotope abundances of transition metals have been observed in the geologic record and trying to understand and reconstruct the physical/environmental conditions that produced these signatures is an area of active research. It is clear that changes in oxidation state lead to large fractionations of the stable isotopes of many transition metals such as iron, suggesting that transition metal stable isotope signatures could be used as a paleo-redox proxy. However, the factors contributing to these observed stable isotope variations are poorly understood. Here we investigate how the kinetics of iron redox electrochemistry generates isotope fractionation. Through a combination of electrodeposition experiments and modeling of electrochemical processes including mass-transport, we show that electron transfer reactions are the cause of a large isotope separation, while mass transport-limited supply of reactant to the electrode attenuates the observed isotopic fractionation. Furthermore, the stable isotope composition of electroplated transition metals can be tuned in the laboratory by controlling parameters such as solution chemistry, reaction overpotential, and solution convection. These methods are potentially useful for generating isotopically-marked metal surfaces for tracking and forensic purposes. In addition, our studies will help interpret stable isotope data in terms of identifying underlying electron transfer processes in laboratory and natural samples.

  13. Project Management Plan for the Isotopes Facilities Deactivation Project at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    1995-04-01

    The purpose of the Isotopes Facilities Deactivation Project (IFDP) is to place former isotopes production facilities at the Oak Ridge National Laboratory in a safe, stable, and environmentally sound condition suitable for an extended period of minimum surveillance and maintenance (S ampersand M) and as quickly and economically as possible. Implementation and completion of the deactivation project will further reduce the already small risks to the environment and to public safety and health. Furthermore, the project should result in significant S ampersand M cost savings in the future. The IFDP management plan has been prepared to document the project objectives, define organizational relationships and responsibilities, and outline the management control systems to be employed in the management of the project. The project has adopted a strategy to deactivate the simple facilities first, to reduce the scope of the project, and to gain experience before addressing more difficult facilities. A decision support system is being developed to identify those activities, that best promote the project mission and result in largest cost savings. The Work Plan for the Isotopes Facilities Deactivation Project at Oak Ridge National Laboratory (Energy Systems 1994) defines the project schedule, the cost estimate, and the technical approach for the project

  14. openPDS: protecting the privacy of metadata through SafeAnswers.

    Directory of Open Access Journals (Sweden)

    Yves-Alexandre de Montjoye

    Full Text Available The rise of smartphones and web services made possible the large-scale collection of personal metadata. Information about individuals' location, phone call logs, or web-searches, is collected and used intensively by organizations and big data researchers. Metadata has however yet to realize its full potential. Privacy and legal concerns, as well as the lack of technical solutions for personal metadata management is preventing metadata from being shared and reconciled under the control of the individual. This lack of access and control is furthermore fueling growing concerns, as it prevents individuals from understanding and managing the risks associated with the collection and use of their data. Our contribution is two-fold: (1 we describe openPDS, a personal metadata management framework that allows individuals to collect, store, and give fine-grained access to their metadata to third parties. It has been implemented in two field studies; (2 we introduce and analyze SafeAnswers, a new and practical way of protecting the privacy of metadata at an individual level. SafeAnswers turns a hard anonymization problem into a more tractable security one. It allows services to ask questions whose answers are calculated against the metadata instead of trying to anonymize individuals' metadata. The dimensionality of the data shared with the services is reduced from high-dimensional metadata to low-dimensional answers that are less likely to be re-identifiable and to contain sensitive information. These answers can then be directly shared individually or in aggregate. openPDS and SafeAnswers provide a new way of dynamically protecting personal metadata, thereby supporting the creation of smart data-driven services and data science research.

  15. Three New Offset {delta}{sup 11}B Isotope Reference Materials for Environmental Boron Isotope Studies

    Energy Technology Data Exchange (ETDEWEB)

    Rosner, M. [BAM Federal Institute for Materials Research and Testing, Berlin (Germany); IsoAnalysis UG, Berlin (Germany); Vogl, J. [BAM Federal Institute for Materials Research and Testing, Berlin (Germany)

    2013-07-15

    The isotopic composition of boron is a well established tool in various areas of science and industry. Boron isotope compositions are typically reported as {delta}{sup 11}B values which indicate the isotopic difference of a sample relative to the isotope reference material NIST SRM 951. A significant drawback of all of the available boron isotope reference materials is that none of them covers a natural boron isotope composition apart from NIST SRM 951. To fill this gap of required {delta}{sup 11}B reference materials three new solution boric acid reference materials were produced, which cover 60 per mille of the natural boron isotope variation (-20 to 40 per mille {delta}{sup 11}B) of about 100 per mille . The new reference materials are certified for their {delta}{sup 11}B values and are commercially available through European Reference Materials (http://www.erm-crm.org). The newly produced and certified boron isotope reference materials will allow straightforward method validation and quality control of boron isotope data. (author)

  16. An isotope-enrichment unit and a process for isotope separation

    International Nuclear Information System (INIS)

    1981-01-01

    A process and equipment for isotope enrichment using gas-centrifuge cascades are described. The method is described as applied to the separation of uranium isotopes, using natural-abundance uranium hexafluoride as the gaseous-mixture feedstock. (U.K.)

  17. CLARUS as a Cloud Security Framework: e-Health Use Case.

    Science.gov (United States)

    Vidal, David; Iriso, Santiago; Mulero, Rafael

    2017-01-01

    Maintaining Passive Medical Health Records (PMHR) is an increasing cost and resource consumption problem. Moving to the cloud is the clearest solution to solve the problem as it offers a high amount of space and computation power. But the cloud is not safe enough when dealing with this kind of information because it can be easily accessed by attackers. The European Commission funded research project CLARUS contributes to protect healthcare-sensitive information in a secure way.

  18. Carbon isotope ratios and isotopic correlations between components in fruit juices

    Science.gov (United States)

    Wierzchnicki, Ryszard

    2013-04-01

    Nowadays food products are defined by geographical origin, method of production and by some regulations concerning terms of their authenticity. Important data for confirm the authenticity of product are providing by isotopic methods of food control. The method checks crucial criteria which characterize the authenticity of inspected product. The European Union Regulations clearly show the tendency for application of the isotopic methods for food authenticity control (wine, honey, juice). The aim of the legislation steps is the protection of European market from possibility of the commercial frauds. Method of isotope ratio mass spectrometry is very effective tool for the use distinguishably the food products of various geographical origin. The basic problem for identification of the sample origin is the lack of databases of isotopic composition of components and information about the correlations of the data. The subject of the work was study the isotopic correlations existing between components of fruits. The chemical and instrumental methods of separation: water, sugars, organic acids and pulp from fruit were implemented. IRMS technique was used to measure isotopic composition of samples. The final results for original samples of fruits (apple, strawberry etc.) will be presented and discussed. Acknowledgement: This work was supported by the Polish Ministry of Science and Higher Education under grant NR12-0043-10/2010.

  19. THE STATUS OF INFORMATION SECURITY COMPETENCE FORMEDNESS OF FUTURE COMPUTER SCIENCE TEACHERS

    Directory of Open Access Journals (Sweden)

    Vasyl P. Oleksiuk

    2017-12-01

    Full Text Available In the article there are explored the concepts of cybersecurity and information security. It is proved that cybersecurity can’t be fully ensured without teaching to principles and rules of information security. The authors have analyzed the specificity of the future computer science teachers' study in the context of developing of their competences necessary for safe students’ activity in the computer networks and Internet. Particular attention is paid to the threats arising after introduction cloud technologies various service models into the educational process. The article focuses on methods and stages of the pedagogical investigation of correlation between the operational and reflective components of the professional competencies of future computer science teachers.

  20. Measurement of isotope abundance variations in nature by gravimetric spiking isotope dilution analysis (GS-IDA).

    Science.gov (United States)

    Chew, Gina; Walczyk, Thomas

    2013-04-02

    Subtle variations in the isotopic composition of elements carry unique information about physical and chemical processes in nature and are now exploited widely in diverse areas of research. Reliable measurement of natural isotope abundance variations is among the biggest challenges in inorganic mass spectrometry as they are highly sensitive to methodological bias. For decades, double spiking of the sample with a mix of two stable isotopes has been considered the reference technique for measuring such variations both by multicollector-inductively coupled plasma mass spectrometry (MC-ICPMS) and multicollector-thermal ionization mass spectrometry (MC-TIMS). However, this technique can only be applied to elements having at least four stable isotopes. Here we present a novel approach that requires measurement of three isotope signals only and which is more robust than the conventional double spiking technique. This became possible by gravimetric mixing of the sample with an isotopic spike in different proportions and by applying principles of isotope dilution for data analysis (GS-IDA). The potential and principle use of the technique is demonstrated for Mg in human urine using MC-TIMS for isotopic analysis. Mg is an element inaccessible to double spiking methods as it consists of three stable isotopes only and shows great potential for metabolically induced isotope effects waiting to be explored.

  1. Laser separation of uranium isotopes

    International Nuclear Information System (INIS)

    Porter, J.T.

    1981-01-01

    Method and apparatus for separating uranium isotopes are claimed. The method comprises the steps of irradiating a uranyl source material at a wavelength selective to a desired isotope and at an effective temperature for isotope spectral line splitting below about 77 deg.K., further irradiating the source material within the fluorescent lifetime of the source material to selectively photochemically reduce the excited isotopic species, and chemically separating the reduced isotope species from the remaining uranyl salt compound

  2. High mass isotope separation arrangement

    International Nuclear Information System (INIS)

    Eerkens, J.W.

    1980-01-01

    This invention relates to the isotope separation art and, more particularly, to a selectively photon-induced energy level transition of an isotopic molecule containing the isotope to be separated and a chemical reaction with a chemically reactive agent to provide a chemical compound containing atoms of the isotope desired. In particular a description is given of a method of laser isotope separation applied to the separation of 235 UF 6 from 238 UF 6 . (U.K.)

  3. Stable oxygen and hydrogen isotopes of brines - comparing isotope ratio mass spectrometry and isotope ratio infrared spectroscopy

    Science.gov (United States)

    Ahrens, Christian; Koeniger, Paul; van Geldern, Robert; Stadler, Susanne

    2013-04-01

    Today's standard analytical methods for high precision stable isotope analysis of fluids are gas-water equilibration and high temperature pyrolysis coupled to isotope ratio mass spectrometers (IRMS). In recent years, relatively new laser-based analytical instruments entered the market that are said to allow high isotope precision data on nearly every media. This optical technique is referred to as isotope ratio infrared spectroscopy (IRIS). The objective of this study is to evaluate the capability of this new instrument type for highly saline solutions and a comparison of the analytical results with traditional IRMS analysis. It has been shown for the equilibration method that the presence of salts influences the measured isotope values depending on the salt concentration (see Lécuyer et al, 2009; Martineau, 2012). This so-called 'isotope salt effect' depends on the salt type and salt concentration. These factors change the activity in the fluid and therefore shift the isotope ratios measured by the equilibration method. Consequently, correction factors have to be applied to these analytical data. Direct conversion techniques like pyrolysis or the new laser instruments allow the measurement of the water molecule from the sample directly and should therefore not suffer from the salt effect, i.e. no corrections of raw values are necessary. However, due to high salt concentrations this might cause technical problems with the analytical hardware and may require labor-intensive sample preparation (e.g. vacuum distillation). This study evaluates the salt isotope effect for the IRMS equilibration technique (Thermo Gasbench II coupled to Delta Plus XP) and the laser-based IRIS instruments with liquid injection (Picarro L2120-i). Synthetic salt solutions (NaCl, KCl, CaCl2, MgCl2, MgSO4, CaSO4) and natural brines collected from the Stassfurt Salt Anticline (Germany; Stadler et al., 2012) were analysed with both techniques. Salt concentrations ranged from seawater salinity

  4. Isotope production

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Dewi M.

    1995-07-15

    Some 2 0% of patients using radiopharmaceuticals receive injections of materials produced by cyclotrons. There are over 200 cyclotrons worldwide; around 35 are operated by commercial companies solely for the production of radio-pharmaceuticals with another 25 accelerators producing medically useful isotopes. These neutron-deficient isotopes are usually produced by proton bombardment. All commonly used medical isotopes can be generated by 'compact' cyclotrons with energies up to 40 MeV and beam intensities in the range 50 to 400 microamps. Specially designed target systems contain gram-quantities of highly enriched stable isotopes as starting materials. The targets can accommodate the high power densities of the proton beams and are designed for automated remote handling. The complete manufacturing cycle includes large-scale target production, isotope generation by cyclotron beam bombardment, radio-chemical extraction, pharmaceutical dispensing, raw material recovery, and labelling/packaging prior to the rapid delivery of these short-lived products. All these manufacturing steps adhere to the pharmaceutical industry standards of Good Manufacturing Practice (GMP). Unlike research accelerators, commercial cyclotrons are customized 'compact' machines usually supplied by specialist companies such as IBA (Belgium), EBCO (Canada) or Scanditronix (Sweden). The design criteria for these commercial cyclotrons are - small magnet dimensions, power-efficient operation of magnet and radiofrequency systems, high intensity extracted proton beams, well defined beam size and automated computer control. Performance requirements include rapid startup and shutdown, high reliability to support the daily production of short-lived isotopes and low maintenance to minimize the radiation dose to personnel. In 1987 a major step forward in meeting these exacting industrial requirements came when IBA, together with the University of Louvain-La-Neuve in Belgium, developed the Cyclone-30

  5. Are Detox Diets Safe?

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Are Detox Diets Safe? KidsHealth / For Teens / Are Detox Diets ... seguras las dietas de desintoxicación? What Is a Detox Diet? The name sounds reassuring — everyone knows that ...

  6. On the safeness of examinees and the reliability of system

    International Nuclear Information System (INIS)

    Kudo, Kazumi; Kanda, Kosuke; Saito, Kazuhiko; Maesawa, Tsuneharu; Idekami, Tomio

    1979-01-01

    The control technique of the reliability of examination system was investigated from the viewpoint of patient safety and image information, based on the prevention of microshock owing to circulatory organ checking system. As for the equipments in hospitals, the size of rooms, air conditioning system, power source installation, earth and piping arrangements should be fully discussed at the planning stage. EPR system must be introduced for the prevention for microshock. Intensive education and training are required for operators to secure safeness in operation. Thorough care should be taken to prevent bacilli infection. Further examinations were made on the control technique of the reliability of photographing system from viewpoint of image information, and it is necessary to study the factors for obtaining the reliability of compound machinery components and the devices of generating radiation. (Kobatake, H.)

  7. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    Science.gov (United States)

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  8. The development of mobile robot for security application and nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  9. The development of mobile robot for security application and nuclear facilities

    International Nuclear Information System (INIS)

    Kim, B. S.; Lee, Y. B.; Choi, Y. S.; Seo, Y. C.; Park, Y. M.

    1999-12-01

    The use of a mobile robot system in nuclear radioactive environments has the advantage of watching and inspecting the NPP safety-related equipment systematically and repairing damaged parts efficiently, thereby enhancing the safe operations of NPPs as well as reducing significantly personnel's dose rate to radioactive environment. Key technology achieved through the development of such robotic system can be used for security application and can offer new approaches to many of the tasks faced to the industry as well. The mobile robot system was composed of a mobile subsystem, a manipulator subsystem, a control subsystem, and a sensor subsystem to use in security application and nuclear radioactive environments. The mobile subsystem was adopted to synchro-drive method to improve the mobility of it. And the manipulator subsystem was developed to minimize the weight and easy to control at remote site. Finally, we developed the USB-based robot control system considering the expandability and modularity. The developed mobile robot for inspection and security was experimented for the collision avoidance and autonomous algorithm, and then it was confirmed that the mobile robot was very effective to the security application and inspection of nuclear facilities. (author)

  10. Isotope separation apparatus

    International Nuclear Information System (INIS)

    Lyon, R.K.; Eisner, P.N.; Thomas, W.R.I.

    1983-01-01

    This application discloses a method for and an apparatus in which isotopes of an element in a compared are separated from each other while that compound, i.e., including a mixture of such isotopes, flows along a predetermined path. The apparatus includes a flow tube having a beginning and an end. The mixture of isotopes is introduced into the flow tube at a first introduction point between the beginning and the end thereof to flow the mixture toward the end thereof. A laser irradiates the flow tube dissociating compounds of a preselected one of said isotopes thereby converting the mixture in an isotopically selective manner. The dissociation products are removed from the tube at a first removal point between the first introduction point and the end. The dissociation product removed at the the first removal point are reconverted back into the comound thereby providing a first stage enriched compound. This first stage enriched compound is reintroduced into the flow tube at a second introduction point between the beginning thereof and the first introduction point. Further product is removed from the flow tube at a second removal point between the second introduction point and the first introduction point. The second introduction point is chosen so that the isotope composition of the first stage enriched compound is approximately the same as that of the compound in the flow tube

  11. Calcium Isotope Analysis by Mass Spectrometry

    Science.gov (United States)

    Boulyga, S.; Richter, S.

    2010-12-01

    The variations in the isotopic composition of calcium caused by fractionation in heterogeneous systems and by nuclear reactions can provide insight into numerous biological, geological, and cosmic processes, and therefore isotopic analysis finds a wide spectrum of applications in cosmo- and geochemistry, paleoclimatic, nutritional, and biomedical studies. The measurement of calcium isotopic abundances in natural samples has challenged the analysts for more than three decades. Practically all Ca isotopes suffer from significant isobaric interferences, whereas low-abundant isotopes can be particularly affected by neighboring major isotopes. The extent of natural variations of stable isotopes appears to be relatively limited, and highly precise techniques are required to resolve isotopic effects. Isotope fractionation during sample preparation and measurements and instrumental mass bias can significantly exceed small isotope abundance variations in samples, which have to be investigated. Not surprisingly, a TIMS procedure developed by Russell et al. (Russell et al., 1978. Geochim Cosmochim Acta 42: 1075-1090) for Ca isotope measurements was considered as revolutionary for isotopic measurements in general, and that approach is used nowadays (with small modifications) for practically all isotopic systems and with different mass spectrometric techniques. Nevertheless, despite several decades of calcium research and corresponding development of mass spectrometers, the available precision and accuracy is still not always sufficient to achieve the challenging goals. This presentation discusses figures of merits of presently used analytical methods and instrumentation, and attempts to critically assess their limitations. Additionally, the availability of Ca isotope reference materials will be discussed.

  12. Nutrition and food security policy in the Islamic Republic of Iran: situation analysis and roadmap towards 2021.

    Science.gov (United States)

    Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo

    2018-05-03

    All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).

  13. Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Raid Khalid Hussein

    2017-04-01

    Full Text Available The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is virtualisation. While this concept brings its own security risks, these risks are not necessarily related to the cloud. The main disadvantage of using cloud computing is linked to safety and security. This is because anybody which chooses to employ cloud computing will use someone else’s hard disk and CPU in order to sort and store data. In cloud environments, a great deal of importance is placed on guaranteeing that the virtual machine image is safe and secure. Indeed, a previous study has put forth a framework with which to protect the virtual machine image in cloud computing. As such, the present study is primarily concerned with confirming this theoretical framework so as to ultimately secure the virtual machine image in cloud computing. This will be achieved by carrying out interviews with experts in the field of cloud security.

  14. Safe Anesthesia For Every Tot

    DEFF Research Database (Denmark)

    Weiss, Markus; Vutskits, Laszlo; Hansen, Tom G

    2015-01-01

    PURPOSE OF REVIEW: The term 'safe use of anesthesia in children is ill-defined and requires definition of and focus on the 'safe conduct of pediatric anesthesia'. RECENT FINDINGS: The Safe Anesthesia For Every Tot initiative (www.safetots.org) has been set up during the last year to focus...... on the safe conduct of pediatric anesthesia. This initiative aims to provide guidance on markers of quality anesthesia care. The introduction and implementation of national regulations of 'who, where, when and how' are required and will result in an improved perioperative outcome in vulnerable children....... The improvement of teaching, training, education and supervision of the safe conduct of pediatric anesthesia are the main goals of the safetots.org initiative. SUMMARY: This initiative addresses the well known perioperative risks in young children, perioperative causes for cerebral morbidity as well as gaps...

  15. Editorial for Journal of Human Security Volume 10

    Directory of Open Access Journals (Sweden)

    Sabina Lautensach

    2014-01-01

    Full Text Available Nelson Rolihlahla Mandela's death on 5 December 2013 and his funeral ten days later were taken as an occasion in the global media to discuss the merits of political leadership for human security, with occasional comments on its pitfalls. This particular leader is not the most politically safe object of discussion, as, for a long time, he openly advocated civil disobedience and resistance, initially of the non-violent kind, but later becoming violent. Predictably, the local hegemon reacted with great brutality and sweeping measures to the resistance of the ANC, policies that shocked many in the western world. This reaction by the gov­ernment and its supporters and the counterreaction it incited amounted, in the long run, to little more than a vast reduction in human security for most citizens of South Africa, lasting until the ANC's victory and Mr Mandela's ascendance to the presidency in 1994.

  16. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    Science.gov (United States)

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  17. Secure method for biometric-based recognition with integrated cryptographic functions.

    Science.gov (United States)

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  18. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  19. Isotopically exchangeable phosphorus

    International Nuclear Information System (INIS)

    Barbaro, N.O.

    1984-01-01

    A critique revision of isotope dilution is presented. The concepts and use of exchangeable phosphorus, the phosphate adsorption, the kinetics of isotopic exchange and the equilibrium time in soils are discussed. (M.A.C.) [pt

  20. Improved E-Banking System With Advanced Encryption Standards And Security Models

    Directory of Open Access Journals (Sweden)

    Sharaaf N. A.

    2015-08-01

    Full Text Available Emerging new Technologies and large scale businesses have made this world a global village. Many business organizations provide online services targeting global consumer bases. Transaction in international scale has been enabled by banks all around the world through E-banking in order to supply the needs of above business organizations. E-banking serves lots of benefits to both customers of banks and banks itself. It adds value to customers satisfaction with better service quality and enables banks to gain a competitive advantage over other competitors. Online banking need to possess high level security in order to provide safe consistent and robust online environment which guarantees secure data transmission and identity of both bank and customer. Lack of security may lead to less trust or hard to trust attitude towards online banking. Although customers are attracted by online banking convenience they seem largely in concern about identity theft and phishing. Analysis of many research papers on e-banking security models and their respective advantages and disadvantages have been discussed in literature review. Username password E-banking dongles fractal images biometric scans and advanced encryption standards are some of the suggested solutions for E-banking security. This study focuses on the security beyond above mechanisms. This paper ensures security of online banking at three levels. At client side using internet dongle integrated with finger print scanning technology at banking sever side and data transmission level. This model also includes username password and advanced encryption for further security. Complete description on the model has been discussed in methodology section. Future works on this topic and Conclusion are covered in separate sections.

  1. Physics with isotopically controlled semiconductors

    International Nuclear Information System (INIS)

    Haller, E.E.

    1994-08-01

    Control of the isotopic composition of semiconductors offers a wide range of new scientific opportunities. In this paper a number of recent results obtained with isotopically pure as well as deliberately mixed diamond and Ge bulk single crystals and Ge isotope superlattices will be reviewed. Isotopic composition affects several properties such as phonon energies, bandstructure and lattice constant in subtle but theoretically well understood ways. Large effects are observed for thermal conductivity, local vibrational modes of impurities and after neutron transmutation doping (NTD). Several experiments which could profit greatly from isotope control are proposed

  2. Isotopic separation by ion chromatography

    International Nuclear Information System (INIS)

    Albert, M.G.; Barre, Y.; Neige, R.

    1994-01-01

    The isotopic exchange reaction and the isotopic separation factor are first recalled; the principles of ion chromatography applied to lithium isotope separation are then reviewed (displacement chromatography) and the process is modelled in the view of dimensioning and optimizing the industrial process; the various dimensioning parameters are the isotopic separation factor, the isotopic exchange kinetics and the material flow rate. Effects of the resin type and structure are presented. Dimensioning is also affected by physico-chemical and hydraulic parameters. Industrial implementation features are also discussed. 1 fig., 1 tab., 5 refs

  3. Beneficial use of isotopes

    International Nuclear Information System (INIS)

    Bertel, E.; Stevens, G.H.

    1998-01-01

    The paper gives an outlook on the main isotopes currently used for beneficial applications, provides an overview on geographic distribution of isotope production capabilities and identifies the main suppliers world-wide. It analyses trends in different countries and regions, including the refurbishment and/or replacement of ageing facilities and the implementation of new capabilities. Issues related to adequate supply of isotopes and potential under or over capacity of production for some key products are discussed. The evolution of the isotope production sector is analysed. Issues such as lowering of governmental support to production facilities, emergence of international co-operation and agreements on production capabilities, and developments in non-OECD/NEA countries are addressed. The paper offers some concluding remarks on the importance of maintaining and enhancing beneficial uses of isotopes, the role of government policies, the need for co-operation between countries and between the private and public sectors. The paper addresses the role of international cooperation in making efficient use of existing isotope production capacity and investigates ways for reducing the need for investment in additional capacity. (author)

  4. Safe society safe mobility

    CSIR Research Space (South Africa)

    Holtmann, B

    2007-07-01

    Full Text Available . Journal of research in crime and delinquency, 21, 233-50. Metropolitan Transportation Authority, 2007. What is Bus Rapid Transit? [O]. Available: http://www.mta.info/mta/planning/brt/whatis.htm Accessed on 28/05/2007 Mijanovich, T., and Weitzman..., 2006. South African Police Service Statistics. [O]. Available: http://www.saps.gov.za/statistics/reports/crimestats/2006/crime_stats.htm Accessed on 29/03/2007 Security.co.za., 2007. Window washers beat up motorist. [O]. Available: http...

  5. Smart security system for Indian rail wagons using IOT

    Science.gov (United States)

    Bhanuteja, S.; Shilpi, S.; Pragna, K.; Arun, M.

    2017-11-01

    The objective of this project is to create a Security System for the goods that are carried in open top freight trains. The most efficient way to secure anything from thieves is to have a continuous observation. So for continuous observation of the open top freight train, Camera module2 has been used. Passive Infrared Sensor (PIR) 1 has been used to detect the motion or to sense movement of people, animals, or any object. So whenever a motion is detected by the PIR sensor, the Camera takes a picture of that particular instance. That picture will be send to the Raspberry PI which does Skin Detection Algorithm and specifies whether that motion was created by a human or not. If a human makes it, then that picture will send to the drop box. Any Official can have a look at the same. The existing system has a CCTV installed at various critical locations like bridges, railway stations etc. but they does not provide a continuous observation. This paper describes about the Security System that provides continuous observation for open top freight trains so that goods can be carried safely to its destination.

  6. Isotopes Project

    International Nuclear Information System (INIS)

    Dairiki, J.M.; Browne, E.; Firestone, R.B.; Lederer, C.M.; Shirley, V.S.

    1984-01-01

    The Isotopes Project compiles and evaluates nuclear structure and decay data and disseminates these data to the scientific community. From 1940-1978 the Project had as its main objective the production of the Table of Isotopes. Since publication of the seventh (and last) edition in 1978, the group now coordinates its nuclear data evaluation efforts with those of other data centers via national and international nuclear data networks. The group is currently responsible for the evaluation of mass chains A = 167-194. All evaluated data are entered into the International Evaluated Nuclear Structure Data File (ENSDF) and are published in Nuclear Data Sheets. In addition to the evaluation effort, the Isotopes Project is responsible for production of the Radioactivity Handbook

  7. Uranium isotope separation from 1941 to the present

    International Nuclear Information System (INIS)

    Maier-Komor, Peter

    2010-01-01

    Uranium isotope separation was the key development for the preparation of highly enriched isotopes in general and thus became the seed for target development and preparation for nuclear and applied physics. In 1941 (year of birth of the author) large-scale development for uranium isotope separation was started after the US authorities were warned that NAZI Germany had started its program for enrichment of uranium and might have confiscated all uranium and uranium mines in their sphere of influence. Within the framework of the Manhattan Projects the first electromagnetic mass separators (Calutrons) were installed and further developed for high throughput. The military aim of the Navy Department was to develop nuclear propulsion for submarines with practically unlimited range. Parallel to this the army worked on the development of the atomic bomb. Also in 1941 plutonium was discovered and the production of 239 Pu was included into the atomic bomb program. 235 U enrichment starting with natural uranium was performed in two steps with different techniques of mass separation in Oak Ridge. The first step was gas diffusion which was limited to low enrichment. The second step for high enrichment was performed with electromagnetic mass spectrometers (Calutrons). The theory for the much more effective enrichment with centrifugal separation was developed also during the Second World War, but technical problems e.g. development of high speed ball and needle bearings could not be solved before the end of the war. Spying accelerated the development of uranium separation in the Soviet Union, but also later in China, India, Pakistan, Iran and Iraq. In this paper, the physical and chemical procedures are outlined which lead to the success of the project. Some security aspects and Non-Proliferation measures are discussed.

  8. Uranium isotope separation from 1941 to the present

    Energy Technology Data Exchange (ETDEWEB)

    Maier-Komor, Peter, E-mail: Peter@Maier-Komor.d [Retired from Physik-Department E12, Technische Universitaet Muenchen, D-85747 Garching (Germany)

    2010-02-11

    Uranium isotope separation was the key development for the preparation of highly enriched isotopes in general and thus became the seed for target development and preparation for nuclear and applied physics. In 1941 (year of birth of the author) large-scale development for uranium isotope separation was started after the US authorities were warned that NAZI Germany had started its program for enrichment of uranium and might have confiscated all uranium and uranium mines in their sphere of influence. Within the framework of the Manhattan Projects the first electromagnetic mass separators (Calutrons) were installed and further developed for high throughput. The military aim of the Navy Department was to develop nuclear propulsion for submarines with practically unlimited range. Parallel to this the army worked on the development of the atomic bomb. Also in 1941 plutonium was discovered and the production of {sup 239}Pu was included into the atomic bomb program. {sup 235}U enrichment starting with natural uranium was performed in two steps with different techniques of mass separation in Oak Ridge. The first step was gas diffusion which was limited to low enrichment. The second step for high enrichment was performed with electromagnetic mass spectrometers (Calutrons). The theory for the much more effective enrichment with centrifugal separation was developed also during the Second World War, but technical problems e.g. development of high speed ball and needle bearings could not be solved before the end of the war. Spying accelerated the development of uranium separation in the Soviet Union, but also later in China, India, Pakistan, Iran and Iraq. In this paper, the physical and chemical procedures are outlined which lead to the success of the project. Some security aspects and Non-Proliferation measures are discussed.

  9. Uranium isotope separation from 1941 to the present

    Science.gov (United States)

    Maier-Komor, Peter

    2010-02-01

    Uranium isotope separation was the key development for the preparation of highly enriched isotopes in general and thus became the seed for target development and preparation for nuclear and applied physics. In 1941 (year of birth of the author) large-scale development for uranium isotope separation was started after the US authorities were warned that NAZI Germany had started its program for enrichment of uranium and might have confiscated all uranium and uranium mines in their sphere of influence. Within the framework of the Manhattan Projects the first electromagnetic mass separators (Calutrons) were installed and further developed for high throughput. The military aim of the Navy Department was to develop nuclear propulsion for submarines with practically unlimited range. Parallel to this the army worked on the development of the atomic bomb. Also in 1941 plutonium was discovered and the production of 239Pu was included into the atomic bomb program. 235U enrichment starting with natural uranium was performed in two steps with different techniques of mass separation in Oak Ridge. The first step was gas diffusion which was limited to low enrichment. The second step for high enrichment was performed with electromagnetic mass spectrometers (Calutrons). The theory for the much more effective enrichment with centrifugal separation was developed also during the Second World War, but technical problems e.g. development of high speed ball and needle bearings could not be solved before the end of the war. Spying accelerated the development of uranium separation in the Soviet Union, but also later in China, India, Pakistan, Iran and Iraq. In this paper, the physical and chemical procedures are outlined which lead to the success of the project. Some security aspects and Non-Proliferation measures are discussed.

  10. Considerations on Fail Safe Design for Design Basis Accident (DBA) vs. Design Extension Condition (DEC): Lesson Learnt from the Fukushima Accident

    International Nuclear Information System (INIS)

    Ha, Jun Su; Kim, Sungyeop

    2014-01-01

    The fail safety design is referred to as an inherently safe design concept where the failure of an SSC (System, Structure or Component) leads directly to a safe condition. Usually the fail safe design has been devised based on the design basis accident (DBAs), because the nuclear safety has been assured by securing the capability to safely cope with DBAs. Currently regards have been paid to the DEC (Design Extension Condition) as an extended design consideration. Hence additional attention should be paid to the concept of the fail safe design in order to consider the DEC, accordingly. In this study, a case chosen from the Fukushima accident is studied to discuss the issue associated with the fail safe design in terms of DBA and DEC standpoints. For the fail safe design to be based both on the DBA and the DEC, a Mode Changeable Fail Safe Design (MCFSD) is proposed in this study. Additional discussions on what is needed for the MCFSD to be applied in the nuclear safety are addressed as well. One of the lessons learnt from the Fukushima accident should include considerations on the fail-safe design in a changing regulatory framework. Currently the design extension condition (DEC) including severe accidents should be considered during designing and licensing NPPs. Hence concepts on the fail safe design need to be changed to be based on not only the DBA but also the DEC. In this study, a case on a fail-safe design chosen from the Fukushima accident is studied to discuss the issue associated with the fail safe design in terms of DBA and DEC conditions. For the fail safe design to be based both on the DBA and the DEC, a Mode Changeable Fail Safe Design (MCFSD) is proposed in this study. Additional discussions on what is needed for the MCFSD to be applied in the nuclear safety are addressed as well

  11. The safe home project.

    Science.gov (United States)

    Arphorn, Sara; Jiraniratisai, Sopaphan; Rungtakul, Rungsri; Phutta, Nikom

    2011-12-01

    The Thai Health Promotion Foundation supported the Improvement of Quality of Life of Informal Workers project in Ban Luang District, Amphur Photaram, Ratchaburi Province. There were many informal workers in Ban Luang District. Sweet-crispy fish producers in Ban Luang were the largest group among the sweet-crispy fish producers in Thailand. This project was aimed at improving living and working conditions of informal workers, with a focus on the sweet-crispy fish group. Good practices of improved living and working conditions were used to help informal workers build safe, healthy and productive work environments. These informal workers often worked in substandard conditions and were exposed to various hazards in the working area. These hazards included risk of exposure to hot work environment, ergonomics-related injuries, chemical hazards, electrical hazards etc. Ergonomics problems were commonly in the sweet-crispy fish group. Unnatural postures such as prolonged sitting were performed dominantly. One hundred and fifty informal workers participated in this project. Occupational health volunteers were selected to encourage occupational health and safety in four groups of informal workers in 2009. The occupational health volunteers trained in 2008 were farmers, beauty salon workers and doll makers. The occupational health and safety knowledge is extended to a new informal worker group: sweet-crispy fish producer, in 2009. The occupational health and safety training for sweet-crispy fish group is conducted by occupational health volunteers. The occupational health volunteers increased their skills and knowledge assist in to make safe home and safe community through participatory oriented training. The improvement of living and working condition is conducted by using a modified WISH, Work Improvement for Safe Home, checklist. The plans of improvement were recorded. The informal workers showed improvement mostly on material handling and storage. The safe uses and safe

  12. Evaluating the skills of isotope-enabled general circulation models against in situ atmospheric water vapor isotope observations

    DEFF Research Database (Denmark)

    Steen-Larsen, Hans Christian; Risi, C.; Werner, M.

    2017-01-01

    The skills of isotope-enabled general circulation models are evaluated against atmospheric water vapor isotopes. We have combined in situ observations of surface water vapor isotopes spanning multiple field seasons (2010, 2011, and 2012) from the top of the Greenland Ice Sheet (NEEM site: 77.45°N......: 2014). This allows us to benchmark the ability to simulate the daily water vapor isotope variations from five different simulations using isotope-enabled general circulation models. Our model-data comparison documents clear isotope biases both on top of the Greenland Ice Sheet (1-11% for δ18O and 4...... boundary layer water vapor isotopes of the Baffin Bay region show strong influence on the water vapor isotopes at the NEEM deep ice core-drilling site in northwest Greenland. Our evaluation of the simulations using isotope-enabled general circulation models also documents wide intermodel spatial...

  13. Stable isotope enrichment: Current and future potential

    International Nuclear Information System (INIS)

    Tracy, J.G.; Aaron, W.S.

    1992-01-01

    Oak Ridge National Laboratory (ORNL) operates the Isotope Enrichment Facility for the purpose of providing enriched stable isotopes, selected radioactive isotopes (including the actinides), and isotope-related materials and services for use in various research applications. ORNL is responsible for isotope enrichment and the distribution of approximately 225 nongaseous stable isotopes from 50 multi-isotopic elements. Many enriched isotope products are of prime importance in the fabrication of nuclear targets and the subsequent production of special radionuclides. State-of-the-art techniques to achieve special isotopic, chemical, and physical requirements are performed at ORNL This report describes the status and capabilities of the Isotope Enrichment Facility and the Isotope Research Materials Laboratory as well as emphasizing potential advancements in enrichment capabilities

  14. Stable isotope enrichment - current and future potential

    International Nuclear Information System (INIS)

    Tracy, J.G.; Aaron, W.S.

    1993-01-01

    Oak Ridge National Laboratory (ORNL) operates the Isotope Enrichment Facility for the purpose of providing enriched stable isotopes, selected radioactive isotopes (including the actinides), and isotope-related materials and services for use in various research applications. ORNL is responsible for isotope enrichment and the distribution of approximately 225 nongaseous stable isotopes from 50 multi-isotopic elements. Many enriched isotope products are of prime importance in the fabrication of nuclear targets and the subsequent production of special radionuclides. State-of-the-art techniques to achieve special isotopic, chemical, and physical requirements are performed at ORNL. This report describes the status and capabilities of the Isotope Enrichment Facility and the Isotope Research Materials Laboratory as well as emphasizing potential advancements in enrichment capabilities. (orig.)

  15. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  16. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint

    Directory of Open Access Journals (Sweden)

    Han-Shen Chen

    2017-01-01

    Full Text Available In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015–2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs, meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI, with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level.

  17. Evaluation and Analysis of Eco-Security in Environmentally Sensitive Areas Using an Emergy Ecological Footprint

    Science.gov (United States)

    Chen, Han-Shen

    2017-01-01

    In this paper, the overall ecological and environmental sustainability in the Cing-Jing region in Taiwan is examined. As land use and cover change has been found to be an important analysis method, an emergy ecological footprint model was applied and the eco-security assessed to ensure authorities maintain a balance between ecological preservation and tourism development. While the ecological environment in the Cing-Jing region from 2008 to 2014 was found to be within safe levels, all related indices had increased considerably. A Grey model was used to predict the 2015–2024 ecological carrying capacities, from which it was found that there is expected to be a large increase in per capita ecological footprints (EFs), meaning that in the future there is going to be a larger ecological deficit and a higher ecological pressure index (EFI), with the eco-security predicted to reach a Grade 2 intermediate level in 2022. As the Cing-Jing region is predicted to become ecologically unsustainable, local, regional, and national governments need to implement regulations to strictly control the land use in the Cing-Jing region. This study demonstrated that emergy EF (EEF) theory application can give objective guidance to decision-makers to ensure that recreational non-urban eco-security can be maintained at a safe level. PMID:28146086

  18. Stable Isotope Group 1982 progress report

    International Nuclear Information System (INIS)

    Stewart, M.K.

    1983-06-01

    The work of the Stable Isotope Group of the Institute of Nuclear Sciences during 1982, in the fields of isotope geology, isotope hydrology, geochronology, isotope biology and mass spectrometer instrumentation, is described

  19. Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm

    Science.gov (United States)

    Rachmawati, D.; Budiman, M. A.; Aulya, L.

    2018-02-01

    Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.

  20. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    Science.gov (United States)

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. A secure and synthesis tele-ophthalmology system.

    Science.gov (United States)

    Wei, Zhuo; Wu, Yongdong; Deng, Robert H; Yu, Shengsheng; Yao, Haixia; Zhao, Zhigang; Ngoh, Lek Heng; Han, Lim Tock; Poh, Eugenie W T

    2008-10-01

    This paper describes a secure and synthesis ophthalmology telemedicine system, referred to as TeleOph. Under a Secure Socket Layer (SSL) channel, patient prerecorded data can be safely transferred via the Internet. With encrypted videoconference and white-board, the system not only supports hospital-to-clinic consultation, but also supplies hospital-tohospital joint discussion. Based on Directshow technology (Microsoft Corporation, Redmond, WA), video cameras connected to the computer by firewire can be captured and controlled to sample video data. By using TWAIN technology, the system automatically identifies networked still cameras (on fundus and slitlamp devices) and retrieves images. All the images are stored in a selected format (such as JPEG, DICOM, BMP). Besides offline-transferring prerecorded data, the system also supplies online sampling of patient data (real-time capturing from remote places). The system was deployed at Tan Tock Seng Hospital, Singapore and Ang Mo Kio, Singapore, where 100 patients were enrolled in the system for examination. TeleOph can be successfully used for patient consultation, and hospital joint discussion. Meanwhile, TeleOph can supply both offline and online sampling of patient data.

  2. Isotopic marking and tracers

    International Nuclear Information System (INIS)

    Morel, F.

    1997-01-01

    The use of radioactive isotopes as tracers in biology has been developed thanks to the economic generation of the required isotopes in accelerators and nuclear reactors, and to the multiple applications of tracers in the life domain; the most usual isotopes employed in biology are carbon, hydrogen, phosphorus and sulfur isotopes, because these elements are present in most of organic molecules. Most of the life science knowledge appears to be dependent to the extensive use of nuclear tools and radioactive tracers; the example of the utilization of radioactive phosphorus marked ATP to study the multiple reactions with proteins, nucleic acids, etc., is given

  3. Boron isotopes in geothermal systems

    International Nuclear Information System (INIS)

    Aggarwal, J.

    1997-01-01

    Boron is a highly mobile element and during water-rock reactions, boron is leached out of rocks with no apparent fractionation. In geothermal systems where the water recharging the systems are meteoric in origin, the B isotope ratio of the geothermal fluid reflects the B isotope ratio of the rocks. Seawater has a distinctive B isotope ratio and where seawater recharges the geothermal system, the B isotope ratio of the geothermal system reflects the mixing of rock derived B and seawater derived B. Any deviations of the actual B isotope ratio of a mixture reflects subtle differences in the water-rock ratios in the cold downwelling limb of the hydrothermal system. This paper will present data from a variety of different geothermal systems, including New Zealand; Iceland; Yellowston, USA; Ibusuki, Japan to show the range in B isotope ratios in active geothermal systems. Some of these systems show well defined mixing trends between seawater and the host rocks, whilst others show the boron isotope ratios of the host rock only. In geothermal systems containing high amounts of CO 2 boron isotope ratios from a volatile B source can also be inferred. (auth)

  4. Isotopes in Greenland Precipitation

    DEFF Research Database (Denmark)

    Faber, Anne-Katrine

    Greenland ice cores offer a unique opportunity to investigate the climate system behaviour. The objective of this PhD project is to investigate isotope modelling of present- day conditions and conduct model-data comparison using Greenland ice cores. Thus this thesis investigates how the integration...... of model and data can be used to improve the understanding of climate changes. This is done through analysis of isotope modelling, observations and ice core measurements. This dissertation comprises three projects: (1) Modelling the isotopic response to changes in Arctic sea surface conditions, (2......) Constructing a new Greenland database of observations and present-day ice core measurements, and (3) Performance test of isotope-enabled CAM5 for Greenland. The recent decades of rapid Arctic sea ice decline are used as a basis for an observational-based model experiment using the isotope-enabled CAM model 3...

  5. Isotope separation process

    International Nuclear Information System (INIS)

    1976-01-01

    The invention relates to a process for separating a given material into two or more parts, in each of which the abundances of the isotopes of a given element differ from the abundances of the isotopes of the same material in the said material. More particularly, the invention relates to a method for the isotopically selective excitation of gas phase UF 6 by infrared photon absorption followed by selective reaction of said excited UF 6 with atomic chlorine, bromine, or iodine to form a product which may be separated by means known in the art

  6. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing.

    Science.gov (United States)

    Ko, Hoon; Měsíček, Libor; Choi, Jongsun; Hwang, Seogchan

    2018-01-01

    Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.

  7. Pb isotopes of Gorgona Island (Colombia): Isotopic variations correlated with magma type

    International Nuclear Information System (INIS)

    Dupre, B.; Echeverria, L.M.

    1984-01-01

    Lead isotopic results obtained on komatiites and basalts from Gorgona Island provide evidence of large isotopic variations within a restricted area (8x2.5 km). The variations are correlated with differences in volcanic rock type. The highest isotopic ratios ( 206 Pb/ 204 Pbproportional19.75) correspond to tholeiites which make up most of the island. The lowest ratios (18.3) correspond to the komatiites of the west coast of the island. Other rock types (komatiites of the east coast, K-tholeiites, picrites and tuffs) have isotopic characteristics intermediate between these two extreme values. These results are explained by the existence of two distinct mantle sourbe regions, and by mixing or contamination between them. (orig.)

  8. Pb isotopes of Gorgona Island (Colombia): isotopic variations correlated with magma type

    Science.gov (United States)

    Dupré, B.; Echeverría, L. M.

    1984-02-01

    Lead isotopic results obtained on komatiites and basalts from Gorgona Island provide evidence of large isotopic variations within a restricted area (8 × 2.5 km). The variations are correlated with differences in volcanic rock type. The highest isotopic ratios ( 206Pb/ 204Pb˜ 19.75 ) correspond to tholeiites which make up most of the island. The lowest ratios (18.3) correspond to the komatiites of the west coast of the island. Other rock types (komatiites of the east coast, K-tholeiites, picrites and tuffs) have isotopic characteristics intermediate between these two extreme values. These results are explained by the existence of two distinct mantle source regions, and by mixing or contamination between them.

  9. Stable Isotope Group 1983 progress report

    International Nuclear Information System (INIS)

    Stewart, M.K.

    1984-06-01

    The work of the Stable Isotope Group of the Institute of Nuclear Sciences in the fields of isotope geology, isotope hydrology, geochronology, isotope biology and related fields, and mass spectrometer instrumentation, during 1983, is described

  10. Enabling SDN in VANETs: What is the Impact on Security?

    Science.gov (United States)

    Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana, Xavier; Alonso-Zarate, Jesus; Engel, Thomas

    2016-12-06

    The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens' quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers' behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture.

  11. Hot vacuum extraction-isotopic dilution mass spectrometry for determination of hydrogen isotopes in zircaloys

    International Nuclear Information System (INIS)

    Shi, Y.; Leeson, P.K.; Wilkin, D.; Britton, A.; Macleod, R.

    2016-01-01

    A hot vacuum extraction-isotope dilution mass spectrometry (HVE-IDMS) was studied for determination of hydrogen isotopes in zirconium metal and alloys as nuclear reactor materials. A theoretical assessment of the completeness of the extraction of hydrogen isotopes under the chosen condition was carried out based on the hydrogen and deuterium solubility data for zirconium. The optimal isotopic spiking condition for conventional IDMS was further explored for the special case IDMS where the isotope abundance of the samples is varied and non-natural. Applying the optimal conditions, the accurate IDMS determination was realized. The agreement between the measured values and the certified or prepared values of standard reference materials and homemade standard materials validate the method developed. (author)

  12. Safeguards and security in the face of nonproliferation, material storage and material disposition

    International Nuclear Information System (INIS)

    Rivers, J.D.; Kohen, M.D.

    1996-01-01

    Change is everywhere: society, domestic and international business, the US Government. As the world becomes smaller and more interconnected, the task of protecting the US'' most sensitive assets will become more complex. International obligations resulting from treaties and agreements will increasingly impact the Department of Energy (DOE), to include the dismantlement of nuclear weapons, and the safe, secure storage and disposition of special nuclear material that is a product of dismantlement. Two of the most urgent topics facing DOE are the prevention of proliferation of weapons of mass destruction and the future disposition of special nuclear material. This paper discusses how the DOE safeguards and security community is responding to the increasing challenges imposed by these two issues

  13. General Approaches and Requirements on Safety and Security of Radioactive Materials Transport in Russian Federation

    International Nuclear Information System (INIS)

    Ershov, V.N.; Buchel'nikov, A.E.; Komarov, S.V.

    2016-01-01

    Development and implementation of safety and security requirements for transport of radioactive materials in the Russian Federation are addressed. At the outset it is worth noting that the transport safety requirements implemented are in full accordance with the IAEA's ''Regulations for the Safe Transport of Radioactive Material (2009 Edition)''. However, with respect to security requirements for radioactive material transport in some cases the Russian Federation requirements for nuclear material are more stringent compared to IAEA recommendations. The fundamental principles of safety and security of RM managements, recommended by IAEA documents (publications No. SF-1 and GOV/41/2001) are compared. Its correlation and differences concerning transport matters, the current level and the possibility of harmonization are analysed. In addition a reflection of the general approaches and concrete transport requirements is being evaluated. Problems of compliance assessment, including administrative and state control problems for safety and security provided at internal and international shipments are considered and compared. (author)

  14. Isotopic exchange reactions. Kinetics and efficiency of the reactors using them in isotopic separation

    International Nuclear Information System (INIS)

    Ravoire, Jean

    1979-11-01

    In the first part, some definitions and the thermodynamic and kinetic isotopic effect concepts are recalled. In the second part the kinetic laws are established, in homogeneous and heterogeneous medium (one component being on occasions present in both phases), without and with isotopic effects. Emphasis is put on application to separation of isotopes, the separation factor α being close to 1, one isotope being in large excess with respect to the other one. Isotopic transfer is then given by: J = Ka (x - y/α) where x and y are the (isotopic) mole fractions in both phases, Ka may be either the rate of exchange or a transfer coefficient which can be considered as the 'same in both ways' if α-1 is small compared to the relative error on the measure of Ka. The third part is devoted to isotopic exchange reactors. Relationships between their efficiency and kinetics are established in some simple cases: plug cocurrent flow reactors, perfectly mixed reactors, countercurrent reactors without axial mixing. We treat only cases where α and the up flow to down flow ratio is close to 1 so that Murphee efficiency approximately overall efficiency (discrete stage contactors). HTU (phase 1) approximately HTU (phase 2) approximately HETP (columns). In a fourth part, an expression of the isotopic separative power of reactors is proposed and discussed [fr

  15. Designing Safe Facilities

    Science.gov (United States)

    McLester, Susan

    2011-01-01

    In the spring of 1999, 12 students and a teacher were killed by two gun-toting teenage boys at Columbine High School in Littleton, Colorado, making school safety and security an overnight priority in communities across the nation. Many schools are starting to borrow security methods and technology from the business world such as video intercoms,…

  16. Great isotope effects in compounding of sodium isotopes by macrocyclic polyether

    International Nuclear Information System (INIS)

    Knoechel, A.; Wilken, R.D.

    1978-01-01

    Isotope effects appear in the compounding of the two sodium isotopes 24 Na + and 22 Na + with macrocyclic polyethers, whose value was determined for the 13 best known polyethers. A radiometric process was used for determining the different half life periods of the nuclides used. To separate the compound and non-compound types, these were distributed between water and chloroform. The isotope ratio in the chloroform phase was compared with the output isotope ratio and the separation facfor determined from this. When using crown ethers, there was enrichment of 24 Na + by a significant amount (large crown ether) up to 3.1 +- 0.4% for 18 crown 6. The remarkably high results can be correlated by Biegeleisen's theory with other chemical conditions. There is a report on the first results of transferring these conditions to the H + /T + system. (orig.) [de

  17. Calcium hydroxide isotope effect in calcium isotope enrichment by ion exchange

    International Nuclear Information System (INIS)

    Jepson, B.E.; Shockey, G.C.

    1984-01-01

    The enrichment of calcium isotopes has been observed in ion-exchange chromatography with an aqueous phase of calcium hydroxide and a solid phase of sulfonic acid resin. The band front was exceedingly sharp as a result of the acid-base reaction occuring at the front of the band. Single-stage separation coefficients were found to be epsilon( 44 Ca/ 40 Ca) = 11 x 10 -4 and epsilon( 48 Ca/ 40 Ca) = 18 x 10 -4 . The maximum column separation factors achieved were 1.05 for calcium-44 and 1.09 for calcium-48 with the heavy isotopes enriching in the fluid phase. The calcium isotope effect between fully hydrated aqueous calcium ions and undissociated aqueous calcium hydroxide was estimated. For the calcium-44/40 isotope pair the separation coefficient was 13 x 10 -4 . 20 references, 2 figures

  18. Pb isotopes of Gorgona Island (Colombia): Isotopic variations correlated with magma type

    Energy Technology Data Exchange (ETDEWEB)

    Dupre, B.; Echeverria, L.M. (Max-Planck-Institut fuer Chemie (Otto-Hahn-Institut), Mainz (Germany, F.R.))

    1984-02-01

    Lead isotopic results obtained on komatiites and basalts from Gorgona Island provide evidence of large isotopic variations within a restricted area (8x2.5 km). The variations are correlated with differences in volcanic rock type. The highest isotopic ratios (/sup 206/Pb//sup 204/Pb proportional 19.75) correspond to tholeiites which make up most of the island. The lowest ratios (18.3) correspond to the komatiites of the west coast of the island.

  19. Isotope analytics for the evaluation of the feeding influence on the isotope ratio in beef samples

    International Nuclear Information System (INIS)

    Herwig, Nadine

    2010-01-01

    Information about the origin of food and associated production systems has a high significance for food control. An extremely promising approach to obtain such information is the determination of isotope ratios of different elements. In this study the correlation of the isotope ratios C-13/C-12, N-15/N-14, Mg-25/Mg-24, and Sr-87/Sr-86 in bovine samples (milk and urine) and the corresponding isotope ratios in feed was investigated. It was shown that in the bovine samples all four isotope ratios correlate with the isotope composition of the feed. The isotope ratios of strontium and magnesium have the advantage that they directly reflect the isotope ratios of the ingested feed since there is no isotope fractionation in the bovine organism which is in contrast to the case of carbon and nitrogen isotope ratios. From the present feeding study it is evident, that a feed change leads to a significant change in the delta C-13 values in milk and urine within 10 days already. For the deltaN-15 values the feed change was only visible in the bovine urine after 49 days. Investigations of cows from two different regions (Berlin/Germany and Goestling/Austria) kept at different feeding regimes revealed no differences in the N-15/N-14 and Mg-26/Mg-24 isotope ratios. The strongest correlation between the isotope ratio of the bovine samples and the kind of ingested feed was observed for the carbon isotope ratio. With this ratio even smallest differences in the feed composition were traceable in the bovine samples. Since different regions usually coincide with different feeding regimes, carbon isotope ratios can be used to distinguish bovine samples from different regions if the delta C-13 values of the ingested feed are different. Furthermore, the determination of strontium isotope ratios revealed significant differences between bovine and feed samples of Berlin and Goestling due to the different geologic realities. Hence the carbon and strontium isotope ratios allow the best

  20. Isotopic diversity indices: how sensitive to food web structure?

    Science.gov (United States)

    Brind'Amour, Anik; Dubois, Stanislas F

    2013-01-01

    Recently revisited, the concept of niche ecology has lead to the formalisation of functional and trophic niches using stable isotope ratios. Isotopic diversity indices (IDI) derived from a set of measures assessing the dispersion/distribution of points in the δ-space were recently suggested and increasingly used in the literature. However, three main critics emerge from the use of these IDI: 1) they fail to account for the isotopic sources overlap, 2) some indices are highly sensitive to the number of species and/or the presence of rare species, and 3) the lack of standardization prevents any spatial and temporal comparisons. Using simulations we investigated the ability of six commonly used IDI to discriminate among different trophic food web structures, with a focus on the first two critics. We tested the sensitivity of the IDI to five food web structures along a gradient of sources overlap, varying from two distinct food chains with differentiated sources to two superimposed food chains sharing two sources. For each of the food web structure we varied the number of species (from 10 to 100 species) and the type of species feeding behaviour (i.e. random or selective feeding). Values of IDI were generally larger in food webs with distinct basal sources and tended to decrease as the superimposition of the food chains increased. This was more pronounced when species displayed food preferences in comparison to food webs where species fed randomly on any prey. The number of species composing the food web also had strong effects on the metrics, including those that were supposedly less sensitive to small sample size. In all cases, computing IDI on food webs with low numbers of species always increases the uncertainty of the metrics. A threshold of ~20 species was detected above which several metrics can be safely used.

  1. Isotope Exchange: a Potential Mechanism Regulating the Natural and Anthropogenic Pb Isotope Budget in Coastal Waters

    Science.gov (United States)

    Chen, M.; Boyle, E. A.; Zurbrick, C.; Carrasco, G. G.; Switzer, A.; Zhao, N.

    2016-02-01

    Two independent studies on anthropogenic Pb and Pb isotopes in coastal corals from the northern Arabian Gulf and the Singapore Straits have shown an isotopic excursion where the main Pb sources discharging to the water move to more crustal-like values, indicating that the Pb in coastal waters might exchange isotopically with crustal particulates without propotional change in concentration. To investigate this issue, Pb isotope exchange is assessed through a closed-system exchange experiment using estuarine waters collected at the Johor River mouth (discharging to the Singapore Straits). During the experiment, a known amount of NBS-981 (206Pb/207Pb=1.093) was spiked into the unfiltered Johor water (dissolved 206Pb/207Pb = 1.199) and the changing isotopic composition of the dissolved Pb was monitored. Shortly after the spike addition, dissolved Pb exhibited 206Pb/207Pb=1.178, reflecting the influence of the spike. Within the following few days, the 206Pb/207Pb in the water increased to >1.190 with limited changes of the dissolved Pb concentration. The observations in closed-system experiment agree with the isotope difference between Singapore aerosol and seawater in our 2-year-long field observations. The kinetics of isotope exchange were assessed using a simple model, which reproduced >70% of the observed Pb isotope variance. Both the close-system experiment and field measurements imply that isotope exchange can be an important mechanism for regulating the Pb and Pb isotopes in coastal waters. Investigations on the distribution of Pb and Pb isotope in estuaries and coastal waters should further assess the role of isotope exchange in ocean Pb chemistry.

  2. Techniques for preparing isotopic targets

    International Nuclear Information System (INIS)

    Xu Guoji; Guan Shouren; Luo Xinghua; Sun Shuhua

    1987-12-01

    The techniques of making isotopic targets for nuclear physics experiments are introduced. Vacuum evaporation, electroplating, centrifugal precipitation, rolling and focused heavy-ion beam sputtering used to prepare various isotopic targets at IAE are described. Reduction-distillation with active metals and electrolytic reduction for converting isotope oxides to metals are mentioned. The stripping processes of producing self-supporting isotopic targets are summarized. The store methods of metallic targets are given

  3. Isotope applications in the environmental field

    International Nuclear Information System (INIS)

    DeWitt, R.

    1978-01-01

    Established uses of enriched isotopes in the environmental field were surveyed to determine future trends in isotope needs. Based on established isotope uses, on the projected increase in the pollution problem, and on the apparent social and economic pressure for pollution abatement, a significant demand for enriched isotopes appears to be developing for the assessment and control of air, water, and soil pollutants. Isotopic techniques will be used in combination with conventional methods of detection and measurement, such as gas chromatography, x-ray fluorescence, and atomic absorption. Recent advances in economical isotope separation methods, instrumentation, and methodology promise to place isotopic technology within the reach of most research and industrial institutions. Increased application of isotope techniques appears most likely to occur in areas where data are needed to characterize the movement, behavior, and fate of pollutants in the environment

  4. Isotopic contamination in electromagnetic isotope separators; La contagion isotopique dans les separateurs electromagnetiques d'isotopes

    Energy Technology Data Exchange (ETDEWEB)

    Cassignol, C [Commissariat a l' Energie Atomique, Saclay (France).Centre d' Etudes Nucleaires

    1960-07-01

    The mechanisms producing isotopic contamination in the electromagnetic separation of isotopes are studied with the aid of the Separator of Saclay and an electrostatic analyzer in cascade. After a separate investigation the result of which is that no contamination comes from the spreading of initial energies of ions, two principal mechanisms are emphasized; scattering and instability of the regime of the sources. The characters of each type of contamination arising from both mechanisms are described in some detail. An unique scheme of isotopic contamination is then derived from the partial ones. This scheme is successfully verified in several experimental separations. The applications concern principally the performances of magnetic cascades and more complex apparatus. It is found that the isotopic purities that such machines can deliver are extremely high. (author) [French] On a etudie, a l'aide du separateur de Saclay et d'un analyseur electrostatique en cascade, les mecanismes par lesquels est produite la contamination isotopique dans la separation electromagnetique des isotopes. A la suite d'une deuxieme etude, qui a mene a la conclusion que la contamination ne provient pas d'une dispersion des energies initiales des ions, on propose deux mecanismes comme etant les plus importants; la diffusion et l'instabilite du regime des sources. On decrit en quelques details la nature de la contamination provenant de deux types de mecanisme. On deduit de ces deux mecanismes un seul schema qui a ete ensuite verifie par plusieurs separations experimentales. Les applications interessent surtout les performances des cascades magnetiques et les appareillages plus complexes. On trouve que les puretes isotopiques que peuvent fournir de tels appareils sont tres elevees. (auteur)

  5. Psychological factors of the readiness of teachers to ensure social security in the educational environment.

    Directory of Open Access Journals (Sweden)

    Shmeleva E.A.

    2015-03-01

    Full Text Available The negative sociocultural transformations that are taking place in modern society and the resulting psychological transformation of personality and mode of life strongly require searching for ways of providing social safety to the next generation, with teachers being the implementers of this process. Teachers’ professionalism is determined by their willingness to solve personal and socially relevant problems, including the willingness to provide social security for other people, to thwart social risks, and to build constructive interpersonal relationships. The aim of our research was to reveal and to analyze the psychological factors affecting the readiness of teachers to ensure social security in educational environments. The environmental factors of social risk have been theoretically characterized. It has been shown that the essential factor in ensuring students’ social security is providing a safe social environment in educational institutions; such an environment provides the learners and the teachers with sociopsychological security and psychosocial well-being. The empirical part of our study was devoted to identifying negative social phenomena in the schools in the Ivanovo region (with the help of a questionnaire administered to 700 students and to identifying the personally and professionally important qualities of the teachers and the subjective psychological factors of their readiness to ensure social security in the educational environment (through interviewing 300 teachers; the administration of the questionnaires and the interviewing were followed by an assessment of their significance (with the help of a questionnaire administered to 140 teachers. Using factor analysis we identified the relevant indicators and grouped them into six factors of the readiness of teachers to ensure a safe educational environment. Relevant personal and professional qualities of teachers were revealed; these are the subjective factors of the

  6. Isotope dilution analysis

    Energy Technology Data Exchange (ETDEWEB)

    Fudge, A.

    1978-12-15

    The following aspects of isotope dilution analysis are covered in this report: fundamental aspects of the technique; elements of interest in the nuclear field, choice and standardization of spike nuclide; pre-treatment to achieve isotopic exchange and chemical separation; sensitivity; selectivity; and accuracy.

  7. Discovery of the cadmium isotopes

    International Nuclear Information System (INIS)

    Amos, S.; Thoennessen, M.

    2010-01-01

    Thirty-seven cadmium isotopes have been observed so far and the discovery of these isotopes is discussed here. For each isotope a brief summary of the first refereed publication, including the production and identification method, is presented.

  8. Discovery of the iron isotopes

    International Nuclear Information System (INIS)

    Schuh, A.; Fritsch, A.; Heim, M.; Shore, A.; Thoennessen, M.

    2010-01-01

    Twenty-eight iron isotopes have been observed so far and the discovery of these isotopes is discussed here. For each isotope a brief summary of the first refereed publication, including the production and identification method, is presented.

  9. Discovery of the silver isotopes

    International Nuclear Information System (INIS)

    Schuh, A.; Fritsch, A.; Ginepro, J.Q.; Heim, M.; Shore, A.; Thoennessen, M.

    2010-01-01

    Thirty-eight silver isotopes have been observed so far and the discovery of these isotopes is discussed here. For each isotope a brief summary of the first refereed publication, including the production and identification method, is presented.

  10. Isotopes in oxidation reactions

    International Nuclear Information System (INIS)

    Stewart, R.

    1976-01-01

    The use of isotopes in the study of organic oxidation mechanisms is discussed. The help provided by tracer studies to demonstrate the two-equivalent path - hydride transfer, is illustrated by the examples of carbonium oxidants and the Wacker reaction. The role of kinetic isotope effects in the study of the scission of carbon-hydrogen bonds is illustrated by hydride abstraction, hydrogen atom abstraction, proton abstraction and quantum mechanical tunnelling. Isotopic studies on the oxidation of alcohols, carbonyl compounds, amines and hydrocarbons are discussed. The role of isotopes in the study of biochemical oxidation is illustrated with a discussion on nicotinamide and flavin coenzymes. (B.R.H.)

  11. Natural gas market review 2007. Security in a globalising market to 2015

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-05-03

    Natural gas heats our homes, powers our factories, and increasingly generates electricity, safely and cleanly. Over recent decades, it has been an important element of secure, affordable, and environmentally responsible energy supply. But as production from IEA member countries declines, supplies will have to come from sources in more distant regions. What aspects of OECD gas markets need to be improved to deliver greater security and efficiency? What are the risks of increasing reliance on imports from Russia and the Middle East? Are strategic stocks of natural gas - similar to emergency oil stocks - a viable safety net to a supply disruption? Will there be enough investment in pipeline gas or will more need to be spent on LNG? What are the impacts of gas security on oil markets and power generation security? What do changes in the LNG industry mean for traditional contract terms? This publication, the second issue in a new IEA publications series, addresses key questions in this dynamic market. It offers a global appraisal of current trends in the light of the most recent historical data, including supply and demand projections to 2015.

  12. Lead isotope in mineral exploration

    International Nuclear Information System (INIS)

    Gulson, B.L.

    1986-01-01

    This book provides an up-to-date state-of-the-art review of lead isotopes in mineral exploration. Beginning with an historical review on suggested uses of lead isotopes in mineral exploration, the author then outlines the theoretical aspects of lead isotopes and illustrates that the method is based on well-known principles of radioactive decay, from which isotopic signatures for different styles of mineralization are derived. The varying isotopic signatures are then introduced. The major part of the book details over 40 case histories for base and precious metals, uranium and tin using sampling media such as sulfides, gossans, soils, weathered bedrock, vegetation and groundwaters. Advantages and disadvantages of each are discussed. Examples are given of the use of lead isotopes in testing conceptual models for exploration. The success rate and cost-effectiveness of the method are illustrated by actual exploration examples. Analytical advances which should lower the cost of the method and future uses are outlined. Many of the case histories use recently published or unpublished data, 27 tables of which are given in an appendix. Details of sampling, the methods for obtaining the isotope ratios, and a commercially-available integrated lead isotope service are also provided. (Auth.)

  13. Interrelatedness of child health, protection and well-being: an application of the SAFE model in Rwanda.

    Science.gov (United States)

    Betancourt, Theresa S; Williams, Timothy P; Kellner, Sarah E; Gebre-Medhin, Joy; Hann, Katrina; Kayiteshonga, Yvonne

    2012-05-01

    This study examines the core components of children's basic security and well-being in order to examine issues central to improving child protection in Rwanda. Sources of data included 15 focus groups with adults, 7 focus groups with children ages 10-17, and 11 key informant interviews with child protection stakeholders, including representatives from international NGOs, community-based groups, and the Rwandan Government, all of which took place in April and May of 2010. Participants painted a complex picture of threats to children's basic security in Rwanda. Three key themes were pervasive across all interviews: (1) deterioration of social and community cohesion in post-genocide Rwanda; (2) the cascading effects of poverty; and (3) the impact of caregiver illness and death on the caregiving environment. Consistent with the SAFE (Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security) model of child protection, participants rarely elaborated on a child protection threat independent of other basic security needs and rights. Findings suggest a need for integrated approaches to child protection that recognize this interrelatedness and extend beyond issue-specific child protection responses. This study contributes to a growing body of work highlighting the interrelated nature of child protection threats and the implications of adaptive and dangerous survival strategies that children and families engage in to meet their basic security needs. Analysis of this interrelatedness provides a roadmap for improving policies and implementing integrated and robust child protection strategies in Rwanda and other settings. Copyright © 2012 Elsevier Ltd. All rights reserved.

  14. Isotope effects on chemical equilibria

    International Nuclear Information System (INIS)

    Golding, P.D.

    1974-01-01

    The thermodynamic equilibrium constants of three deuterated substituted acetic acids are reported. The calculation of secondary isotope effects of the second kind for the three isotopic acid pairs has been accomplished by the appropriate comparison of thermodynamic equilibrium constants, and by the comparison of isotopic slopes. The effect of substituent variation on the isotope effects reported here disqualifies the simple inductive model as a legitimate description of secondary isotope effects of the second kind. The correlation of diminishing isotope effect per deuterium atom with increasing acidity is also invalidated by the present results. The syntheses of 9-thia-9,10-dihydrophenanthrene-9-oxide and thioxanthene-10-oxide are described. These compounds have been partially deuterated at their respective methylene positions. Spectral evidence indicates stereoselectivity of the methylene protons in the exchange reactions of both compounds. (author)

  15. Analysis of information security management systems at 5 domestic hospitals with more than 500 beds.

    Science.gov (United States)

    Park, Woo-Sung; Seo, Sun-Won; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam

    2010-06-01

    The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS.

  16. Isotopic chirality

    Energy Technology Data Exchange (ETDEWEB)

    Floss, H.G. [Univ. of Washington, Seattle, WA (United States)

    1994-12-01

    This paper deals with compounds that are chiral-at least in part, due to isotope substitution-and their use in tracing the steric course of enzyme reaction in vitro and in vivo. There are other applications of isotopically chiral compounds (for example, in analyzing the steric course of nonenzymatic reactions and in probing the conformation of biomolecules) that are important but they will not be discussed in this context.

  17. Isotopic separation

    International Nuclear Information System (INIS)

    Chen, C.L.

    1982-01-01

    A method is described for separating isotopes in which photo-excitation of selected isotope species is used together with the reaction of the excited species with postive ions of predetermined ionization energy, other excited species, or free electrons to produce ions or ion fragments of the selected species. Ions and electrons are produced by an electrical discharge, and separation is achieved through radial ambipolar diffusion, electrostatic techniques, or magnetohydrodynamic methods

  18. Isotope enrichment

    International Nuclear Information System (INIS)

    Lydtin, H-J.; Wilden, R.J.; Severin, P.J.W.

    1978-01-01

    The isotope enrichment method described is based on the recognition that, owing to mass diffusion and thermal diffusion in the conversion of substances at a heated substrate while depositing an element or compound onto the substrate, enrichment of the element, or a compound of the element, with a lighter isotope will occur. The cycle is repeated for as many times as is necessary to obtain the degree of enrichment required

  19. Isotope separation process

    International Nuclear Information System (INIS)

    Wexler, Sol; Young, C.E.

    1976-01-01

    Description is given of method for separating a specific isotope from a mixture of isotopes of an actinide element present as MF 6 , wherein M is the actinide element. It comprises: preparing a feed gas mixture of MF 6 in a propellant gas; passing the feed gas mixture under pressure through an expansion nozzle while heating the mixture to about 600 0 C; releasing the heated gas mixture from the nozzle into an exhaust chamber having a reduced pressure, whereby a gas jet of MF 6 molecules, MF 6 molecular clusters and propellant gas molecules is formed, the MF 6 molecules having a translational energy of about 3 eV; converting the MF 6 molecules to MF 6 ions by passing the jet through a cross jet of electron donor atoms so that an electron transfer takes place between the MF 6 - molecules and the electron donor atoms whereby the jet is now quasi-neutral, containing negative MF 6 - ions and positive donor ions; passing the quasi-neutral jet through a radiofrequency mass filter tuned to separate the MF 6 ions containing the specific isotope from the MF 6 - ions of the other isotopes and neutralizing and collecting the MF 6 molecules of the specific isotope [fr

  20. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  1. Chernobyl new safe confinement

    International Nuclear Information System (INIS)

    Dodd, L.

    2011-01-01

    The author presents the new safe confinement that will be commissioned at Unit 4 of the Chernobyl NPP in 2015. The confinement will ensure that Chernobyl Unit 4 will be placed in an environmentally safe condition for at least next 100 years. The article highlights the current work status, future perspectives and the feasibility of confinement concept [ru

  2. Asymptotically Safe Dark Matter

    DEFF Research Database (Denmark)

    Sannino, Francesco; Shoemaker, Ian M.

    2015-01-01

    We introduce a new paradigm for dark matter (DM) interactions in which the interaction strength is asymptotically safe. In models of this type, the coupling strength is small at low energies but increases at higher energies, and asymptotically approaches a finite constant value. The resulting...... searches are the primary ways to constrain or discover asymptotically safe dark matter....

  3. Gender difference in safe and unsafe practice of pesticide handling in tobacco farmers of malaysia.

    Science.gov (United States)

    Bin Nordin, R; Araki, S; Sato, H; Yokoyama, K; Bin Wan Muda, W A; Win Kyi, D

    2001-01-01

    To identify gender difference in safe and unsafe practice of pesticide handling in tobacco farmers of Malaysia, we conducted a 20-item questionnaire interview on storage of pesticide (4 questions), mixing of pesticide (3 questions), use of personal protective equipment and clothing while spraying pesticide (7 questions), activities during and after spraying of pesticide (5 questions), and maintenance of pesticide sprayer (1 question) in 496 tobacco farmers (395 males and 101 females) in Bachok District, Kelantan, Malaysia. Duration of employment was significantly longer in females than those in males (pwork habit, (3) reading and following instructions on pesticide label, (4) security, storage and disposal of pesticide container, (5) safe work habit, (6) proper handling of pesticide and maintenance of pesticide sprayer, (7) use of personal protective clothing, and (8) safe handling of pesticide. Results of analysis of covariance for the eight factor scores of all male and female farmers, controlling for educational level and duration of employment, showed that: (1) factor scores for use of personal protective equipment (pwork habit (p0.05). We therefore conclude that: (1) for female tobacco farmers, choice of personal attire tend to result in lower scores on use of personal protective equipment and personal protective clothing while personal hygiene practices result in lower score on safe work habit; and, (2) for male tobacco farmers, the lower scores on reading and following instruction on pesticide label and mixing pesticide and maintenance of pesticide sprayer in good condition suggests that they were not primarily involved in these activities. It is postulated that these differences in safe and unsafe practices of pesticide handling across gender is related to the choice of personal attire, personal hygiene practices and division of labour within farming households which in turn is influenced by prevailing sociocultural norms in the community.

  4. Groundwater Origins and Circulation Patterns Based on Isotopes in Challapampa Aquifer, Bolivia

    Directory of Open Access Journals (Sweden)

    Etzar Gómez

    2016-05-01

    Full Text Available Aridity and seasonality of precipitation are characteristics of the highland region in Bolivia. Groundwater becomes an important and safe source of water when surficial bodies are intermittent and affected by natural and anthropogenic contamination. Decades of exploitation of the Challapampa aquifer, combined with lack of information required to understand the groundwater circulation, represent a challenge for reservoir management. This study analyzes isotopic compositions of deuterium and oxygen-18 in different stages in the hydrologic cycle to assess flow patterns in the aquifer, especially in the alluvial fan of River Paria, where records are more extensive in space and time. Interpretations are based on existing and new data. Some implications, such as the age of water, the evaporation effect in groundwater and some thermal intrusions are supported by stable isotopes, tritium, radiocarbon, and electrical conductivity records. New results confirm that modern precipitation over the mountains surrounding the study area is the most important origin of water for shallow aquifers until exploited depths, 100 m below surface. The origin of water in deeper depths, 400 m, seems related to infiltration at higher altitudes and longer residence times.

  5. Interim guidance for the safe transport of reprocessed uranium

    International Nuclear Information System (INIS)

    1994-06-01

    Increasingly reprocessed uranium is being used for the fabrication of nuclear fuel elements. Different intermediate reprocessing steps are carried out at different locations. Therefore, transportation of uranium material is necessary. Due to the difference in isotope composition of reprocessed uranium then unirradiated uranium a doubt is casted on the presumption that packages used for the transport of unirradiated uranium are automatically suitable for reprocessed uranium compounds. The Standing Advisory Group on the Safe Transport of Radioactive Material (SAGSTRAM) recommended that the issue be reviewed by consultants and that a document be developed that would give guidance to users of the Regulations. This TECDOC is the result of the endeavors of the experts convened at two Consultants Services meetings. It contains guidance on the provisions in the current Regulations as well as proposals for changes to the new Revised Edition whose publication is planned for 1996. This document demonstrates that under the present Transport Regulations it is possible in most cases to ship reprocessed uranium compounds in the same packages as unirradiated uranium compounds. In few cases a more stringent package type is required. 8 refs, 22 figs, 19 tabs

  6. Isotope-equipped measuring instruments

    International Nuclear Information System (INIS)

    Miyagawa, Kazuo; Amano, Hiroshi

    1980-01-01

    In the steel industry, though the investment in isotope-equipped measuring instruments is small as compared with that in machinery, they play important role in the moisture measurement in sintering and blast furnaces, the thickness measurement in rolling process and others in automatic control systems. The economic aspect of the isotope-equipped measuring instruments is described on the basis of the practices in Kimitsu Works of Nippon Steel Corporation: distribution of such instruments, evaluation of economic effects, usefulness evaluation in view of raising the accuracy, and usefulness evaluation viewed from the failure of the isotope instruments. The evaluation of economic effects was made under the premise that the isotope-equipped measuring instruments are not employed. Then, the effects of raising the accuracy are evaluated for a γ-ray plate thickness gauge and a neutron moisture gauge for coke in a blast furnace. Finally, the usefulness was evaluated, assuming possible failure of the isotope-equipped measuring instruments. (J.P.N.)

  7. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  8. The measurement of the isotope ratios and concentrations of zinc by thermal ionization mass spectrometry using double isotope dilution

    International Nuclear Information System (INIS)

    Deng Zhongguo

    1994-01-01

    The isotope ratios and concentrations of zinc are measured by silicagel-thermal ionization mass spectrometry using the double isotope spikers. The double isotope spikers ( 70 Zn and 67 Zn-enriched isotopes) are used to correct the isotope mass fractionation for the zinc isotope ratios, and to certify the zinc concentrations in the unknown samples. The zinc concentrations of these double isotope spikers are surveyed by a spiker made of pure (99.99%) natural zinc metal powder. The correcting factors (f a , f t and f n ) of the zinc isotope ratios in the spiked mixture, spike and unspiked samples for the isotope mass fractionation, and the spike-to-unspiked ratios (X r ) of the zinc isotope r in the spiked mixture samples can be obtained to solve the matrix equations by numerical approximation. The natural zinc isotope ratios are: 64 Zn/ 67 Zn = 11.8498, 66 Zn/ 67 Zn = 6.7977, 68 Zn/ 67 Zn = 4.5730 and 70 Zn/ 67 Zn = 0.1520. The uncertainties determined of the isotope ratios and concentrations of zinc are +- 0.16% and +-0.31%, respectively

  9. General physical fundamentals of isotope hydrology

    International Nuclear Information System (INIS)

    Moser, H.; Rauert, W.

    1976-01-01

    A description is given of the measurement and measuring units of stable isotopes, the physical properties, measurement and measuring units of radioactive isotopes, the fundamentals of the tracer technique, the environmental isotope distribution in the hydrosphere and the radiation protection in isotope hydrological investigations. (HK) [de

  10. Isotope separation by ion waves

    International Nuclear Information System (INIS)

    Dawson, J.M.

    1978-01-01

    One of the isotopes of an element having several isotopes can be separated from the others in a dense, neutral plasma. Thus initially a neutral plasma is prepared including the element in question. This may consist of positive ions and negative electrons or alternatively of positive and negative ions, or else of a mixture of positive ions, negative ions and electrons. The plasma may then be injected into a magnetic field or may be generated in the field where more energy is imparted to a selected isotope than to the others. Finally, the isotopes are separated from each other on the basis of their differential energies. For example, the selected isotope may be given more energy than the others by stimulating it within the plasma at its resonant frequency which may be close to the cyclotron frequency, either by an electric field or by a magnetic field. In order to excite the other isotope, a different resonant frequency is required which depends on the plasma density, the relative concentration of electrons if the plasma contains electrons, the strength of the magnetic field, the ratio of charge to mass of the isotope, and possibly on the physical parameters of the plasma apparatus itself, such as the ratio of the length of the plasma column to its radius. The more energetic isotope may be separated by energy dependent chemical reactions, it may be collected by a positively biased probe or else the isotopes may be separated from each other by magnetic fields or in various other ways

  11. Isotope separation by magnetic fields

    International Nuclear Information System (INIS)

    Dawson, J.M.

    1978-01-01

    One of the isotopes of an element having several isotopes can be separated from the others in a dense, neutral plasma. Thus initially a neutral plasma is prepared including the element in question. This may consist of positive ions and negative electrons or alternatively of positive and negative ions, or else of a mixture of positive ions, negative ions and electrons. The plasma may then be injected into a magnetic field or may be generated in the field where more energy is imparted to a selected isotope than to the others. Finally, the isotopes are separated from each other on the basis of their differential energies. For example, the selected isotope may be given more energy than the others by stimulating it within the plasma at its resonant frequency which may be close to the cyclotron frequency, either by an electric field or by a magnetic field. In order to excite the other isotope, a different resonant frequency is required which depends on the plasma density, the relative concentration of electrons if the plasma contains electrons, the strength of the magnetic field, the ratio of charge to mass of the isotope, and possibly on the physical parameters of the plasma apparatus itself, such as the ratio of the length of the plasma column to its radius. The more energetic isotope may be separated by energy dependent chemical reactions, it may be collected by a positively biased probe or else the isotopes may be separated from each other by magnetic fields or in various other ways

  12. Isotope distribution program at the Oak Ridge National Laboratory with emphasis on medical isotopes

    International Nuclear Information System (INIS)

    Adair, H.L.

    1987-01-01

    The Isotope Distribution Program (IDP) is a group of individual activities with separate and diverse DOE sponsors which share the common mission of the production and distribution of isotope products and the performance of isotope-related services. Its basic mission is to provide isotope products and associated services to the user community by utilizing government-owned facilities that are excess to the primary mission of the DOE. The IDP is in its 41st year of operation. Initially, the program provided research quantities of radioactive materials, and through the 1950's it was the major supplier of radioisotopes for both research and commercial application. Distribution of enriched stable isotopes began in 1954. This paper discusses the use of radioisotopes in medicine and the role that ORNL plays in this field

  13. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  14. 75 FR 1734 - Children’s Online Privacy Protection Rule Safe Harbor Proposed Self-Regulatory Guidelines; i-SAFE...

    Science.gov (United States)

    2010-01-13

    ... Proposed Self-Regulatory Guidelines; i-SAFE, Inc. Application for Safe Harbor AGENCY: Federal Trade... for public comment concerning proposed self-regulatory guidelines submitted by i-SAFE, Inc. under the... approval self-regulatory guidelines that would implement the Rule's protections.\\3\\ \\1\\ 64 FR 59888 (1999...

  15. Stable water isotope patterns in a climate change hotspot: the isotope hydrology framework of Corsica (western Mediterranean).

    Science.gov (United States)

    van Geldern, Robert; Kuhlemann, Joachim; Schiebel, Ralf; Taubald, Heinrich; Barth, Johannes A C

    2014-06-01

    The Mediterranean is regarded as a region of intense climate change. To better understand future climate change, this area has been the target of several palaeoclimate studies which also studied stable isotope proxies that are directly linked to the stable isotope composition of water, such as tree rings, tooth enamel or speleothems. For such work, it is also essential to establish an isotope hydrology framework of the region of interest. Surface waters from streams and lakes as well as groundwater from springs on the island of Corsica were sampled between 2003 and 2009 for their oxygen and hydrogen isotope compositions. Isotope values from lake waters were enriched in heavier isotopes and define a local evaporation line (LEL). On the other hand, stream and spring waters reflect the isotope composition of local precipitation in the catchment. The intersection of the LEL and the linear fit of the spring and stream waters reflect the mean isotope composition of the annual precipitation (δP) with values of-8.6(± 0.2) ‰ for δ(18)O and-58(± 2) ‰ for δ(2)H. This value is also a good indicator of the average isotope composition of the local groundwater in the island. Surface water samples reflect the altitude isotope effect with a value of-0.17(± 0.02) ‰ per 100 m elevation for oxygen isotopes. At Vizzavona Pass in central Corsica, water samples from two catchments within a lateral distance of only a few hundred metres showed unexpected but systematic differences in their stable isotope composition. At this specific location, the direction of exposure seems to be an important factor. The differences were likely caused by isotopic enrichment during recharge in warm weather conditions in south-exposed valley flanks compared to the opposite, north-exposed valley flanks.

  16. Isotope separation system

    International Nuclear Information System (INIS)

    Lehmann, J.-C.

    1975-01-01

    A description is given of an isotope separation device comprising a system for converting into gaseous form a first and second isotope to be separated, a monochromatic excitation light source to excite the gaseous molecules of these two isotopes in a distinct manner, a first and second receiver to collect selectively the molecules of the first and second distinctly excited isotopes. The frequency FL of the excitation light is selected between a lower limit and a higher limit F2 + 1/2 LD, depending on the frequences F1 and F2 of two absorption lines near this first and second isotope. The difference DF between these two frequencies F1 and F2 is less than the Doppler width LD of each one of these lines and greater than the natural width LN of each of these two lines and also the width of line LR of the excitation light source. The probability that the molecules will be excited by this light depends on the direction of their displacement to a major and different extent for both isotopes. An ionising light source LI is set up to irradiate the seat of interaction between the excitation light and the gaseous molecules with an ionisation light able to ionise the excited molecules without ionising the molecules that are not excited. The receivers are able to collect selectively the ionised molecules. A sufficiently low gas pressure is selected for the distance between the place of interaction and the first receiver to be less than double the free mean travel of the molecules in the gas [fr

  17. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  18. Food irradiation is safe: Half a century of studies

    International Nuclear Information System (INIS)

    Roberts, Peter B.

    2014-01-01

    The potential benefits of food irradiation are yet to be realized due to slow progress in the commercialization of the technology. Processing food with ionizing radiation has encountered several barriers, one of which is the belief that consumers will not purchase irradiated food and a consequent caution among food retailers and producers. There is sufficient evidence that consumers will purchase irradiated foods when offered at retail in contrast to the data from many surveys of general public opinion. Communicating this evidence to food retailers and producers is essential if a major barrier to a greater use of the technology is to be overcome. - Highlights: • Food irradiation is safe and can benefit food safety, security and trade. • Commercial use remains limited. • The food trade tends to believe consumers will not buy irradiated food. • There is good evidence that consumers buy irradiated food when it is offered. • Demonstrating this evidence to industry is vital for commercial success

  19. Canada's isotope crisis : what next?

    International Nuclear Information System (INIS)

    Nathwani, J.; Wallace, D.

    2010-01-01

    Canada urgently requires a rigorous debate on the strategic options for ensuring a robust, reliable, and affordable supply of radioactive isotopes. Should the debate be confined to how Canada can best develop the necessary technologies solely for our own use or should Canada abandon the idea of producing its own isotope supply and any future aspirations to serve the global market? Canada's Isotope Crisis focuses on the central policy question: do we dare to try to shape the future or do we retreat into silence because we are not prepared to make the necessary investments for the future well-being of Canadians? This volume showcases pointed essays and analysis from members of the academy and individuals who have made contributions to the development of medical isotopes and pioneered their use in medical practice. It also includes commentary from those involved in the production, manufacturing, processing, and distribution of isotopes. Canada's Isotope Crisis is a multi-disciplinary effort that addresses the global dimension of isotope supply and combines expert opinions on the present and past with knowledge of the relevant government agencies and the basis for their decisions at critical junctures.

  20. A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Hoon Ko

    2018-01-01

    Full Text Available Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients’ biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.