WorldWideScience

Sample records for secure safe isotope

  1. SAFE/SNAP application to shipboard security

    International Nuclear Information System (INIS)

    Grady, L.M.; Walker, J.L.; Polito, J.

    1981-11-01

    An application of the combined Safeguards Automated Facility Evaluation/Safeguards Network Analysis Procedure (SAFE/SNAP) modeling technique to a physical protection system (PPS) aboard a generic ship is described. This application was performed as an example of how the SAFE and SNAP techniques could be used. Estimates of probability of interruption and neutralization for the example shipboard PPS are provided by SAFE as well as an adversary scenario, which serves as input to SNAP. This adversary scenario is analyzed by SNAP through four cases which incorporate increasingly detailed security force tactics. Comparisons between the results of the SAFE and SNAP analyses are made and conclusions drawn on the validity of each technique. Feedback from SNAP to SAFE is described, and recommendations for upgrading the ship based on the results of the SAFE/SNAP application are also discussed

  2. Safe handling of radioactive isotopes. Handbook 42

    International Nuclear Information System (INIS)

    1949-09-01

    With the increasing use of radioactive isotopes by industry, the medical profession, and research laboratories, it is essential that certain minimal precautions be taken to protect the users and the public. The recommendations contained in this handbook represent what is believed to be the best available opinions on the subject as of this date. As our experience with radioisotopes broadens, we will undoubtedly be able to improve and strengthen the recommendations for their safe handling and utilization. Through the courtesy of the National Research Council about a year ago, several hundred draft copies of this report were circulated to all leading workers and authorities in the field for comment and criticism. The present handbook embodies all pertinent suggestions received from these people. Further comment will be welcomed by the committee. One of the greatest difficulties encountered in the preparation of this handbook lay in the uncertainty regarding permissible radiation exposure levels - particularly for ingested radioactive materials. The establishment of sound figures for such exposure still remains a problem of high priority for many conditions and radioactive substances. Such figures as are used in this report represent the best available information today. If, in the future, these can be improved upon, appropriate corrections will be issued. The subject will be under continuous study by the two subcommittees mentioned above. The present Handbook has been prepared by the Subcommittee on the Handling of Radioactive Isotopes and Fission Products

  3. Safe handling of radioactive isotopes. Handbook 42

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1949-09-15

    With the increasing use of radioactive isotopes by industry, the medical profession, and research laboratories, it is essential that certain minimal precautions be taken to protect the users and the public. The recommendations contained in this handbook represent what is believed to be the best available opinions on the subject as of this date. As our experience with radioisotopes broadens, we will undoubtedly be able to improve and strengthen the recommendations for their safe handling and utilization. Through the courtesy of the National Research Council about a year ago, several hundred draft copies of this report were circulated to all leading workers and authorities in the field for comment and criticism. The present handbook embodies all pertinent suggestions received from these people. Further comment will be welcomed by the committee. One of the greatest difficulties encountered in the preparation of this handbook lay in the uncertainty regarding permissible radiation exposure levels - particularly for ingested radioactive materials. The establishment of sound figures for such exposure still remains a problem of high priority for many conditions and radioactive substances. Such figures as are used in this report represent the best available information today. If, in the future, these can be improved upon, appropriate corrections will be issued. The subject will be under continuous study by the two subcommittees mentioned above. The present Handbook has been prepared by the Subcommittee on the Handling of Radioactive Isotopes and Fission Products.

  4. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  5. Keeping Sealed Radioactive Sources Safe and Secure

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Radioactive sources are used in a wide variety of devices in medical, industrial, agricultural and research facilities worldwide. These sources, such as cobalt-60 and caesium-137, emit high levels of ionizing radiation, which can treat cancer, measure materials used in industry and sterilize food and medical appliances. Problems may arise when these sources are no longer needed, or if they are damaged or decayed. If these sources are not properly stored they can be a threat to human health and the environment and pose a security risk. Procedures to secure these spent or 'disused' sources are often highly expensive and need specialized assistance. The IAEA helps its States find long term solutions for the safe and secure storage of disused sealed radioactive sources (DSRSs)

  6. Ultra Safe And Secure Blasting System

    Energy Technology Data Exchange (ETDEWEB)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  7. Safe and secure: transportation of radioactive materials

    International Nuclear Information System (INIS)

    Howe, D.

    2015-01-01

    Western Waste Management Facility is Central Transportation Facility for Low and Intermediate waste materials. Transportation support for Stations: Reactor inspection tools and heavy water between stations and reactor components and single bundles of irradiated fuel to AECL-Chalk River for examination. Safety Track Record: 3.2 million kilometres safely travelled and no transportation accident - resulting in a radioactive release.

  8. Cyber Security: Rule of Use Internet Safely?

    OpenAIRE

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  9. Global Security, Medical Isotopes, and Nuclear Science

    Science.gov (United States)

    Ahle, Larry

    2007-10-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R&D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities.

  10. Global Security, Medical Isotopes, and Nuclear Science

    International Nuclear Information System (INIS)

    Ahle, Larry

    2007-01-01

    Over the past century basic nuclear science research has led to the use of radioactive isotopes into a wide variety of applications that touch our lives everyday. Some are obvious, such as isotopes for medical diagnostics and treatment. Others are less so, such as National/Global security issues. And some we take for granted, like the small amount of 241 Am that is in every smoke detector. At the beginning of this century, we are in a position where the prevalence and importance of some applications of nuclear science are pushing the basic nuclear science community for improved models and nuclear data. Yet, at the same time, the push by the basic nuclear science community to study nuclei that are farther and farther away from stability also offer new opportunities for many applications. This talk will look at several global security applications of nuclear science, summarizing current R and D and need for improved nuclear data It will also look at how applications of nuclear science, such as to medicine, will benefit from the push for more and more powerful radioactive ion beam facilities

  11. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.J.; Bastiaansen, H.J.M.; Berg, J. van den; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two bigchallenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  12. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.; Bastiaansen, H.; Van den Berg, J.; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two big challenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  13. Sacroiliac secure corridor: analysis for safe insertion of iliosacral screws

    Directory of Open Access Journals (Sweden)

    Henrique Alves Cruz

    2013-08-01

    Full Text Available OBJECTIVE: Posterior pelvic lesions, especially of the sacral-iliac joint, have high mortality and morbidity risks. Definitive fixation is necessary for the joint stabilization, and one option is the sacral percutaneous pinning with screws. Proximity to important structures to this region brings risks to the fixation procedure; therefore, it is important to know the tridimensional anatomy of the pelvis posterior region. Deviations of the surgeon's hand of four degrees may target the screws to those structures; dimorphisms of the upper sacrum and a poor lesion reduction may redound in a screw malpositioning. This study is aimed to evaluate the dimensions of a safe surgical corridor for safe sacroiliac screw insertion and relations with age and sex of the patients. METHOD: One hundred randomly selected pelvis CTs of patients with no pelvic diseases, seen at a tertiary care teaching Hospital. Measurements were made by computer and the safest area for screw insertion was calculated by two methods. The results were expressed in mm (not in degrees, in order to be a further surgical reference. RESULTS: There was a significant size difference in the analyzed sacral vertebra, differing on a wider size in men than in women. There was no significant statistical difference between vertebral size and age. By both methods, a safe area for screw insertion could be defined. CONCLUSION: Age does not influence the width of the surgical corridor. The surgeon has a safe corridor considered narrower when inserting screws in a female pelvis than when in a male one. However, as the smallest vertebra found (feminine was considered for statics, it was concluded that this corridor is 20 mm wide in any direction, taking as a reference the centrum of the vertebra.

  14. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  15. Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms

    OpenAIRE

    Portnoi, Marcos; Shen, Chien-Chung

    2014-01-01

    This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and securit...

  16. DOES FOOD SAFETY CONFLICT WITH FOOD SECURITY? THE SAFE CONSUMPTION OF FOOD

    OpenAIRE

    Kinsey, Jean D.

    2004-01-01

    This paper concludes by saying no, food safety and security reinforce each other. It combines food safety and food security into the concept of "safe food consumption." Unsafe food consumption occurs when food contains known substances that lead to short or long term illness or death (botulism) and suspect substances that are believed to lead to delayed diseases (pesticides). It also occurs when hunger or over eating contribute to long-term illness and shorter life expectancy. The costs of il...

  17. Stable isotope usage in developing countries: Safe tracer tools to measure human nutritional status

    International Nuclear Information System (INIS)

    Klein, P.D.; Klein, E.R.

    1987-01-01

    How many calories are used when a nursing mother feeds her infant? How much milk does an infant receive in one week? What is the impact of the environment on the energy needs of children? How adequately does dietary protein sustain the synthesis of body constituents? What types of foods best nourish a child recovering from intestinal diseases such as diarrhoea? Quantitative answers to questions such as these can be obtained from the use of stable, non-radioactive isotopic tracers. Answers to these questions are important in assessing the nutritional status of infants, children, pregnant women and nursing mothers, as well as that of individuals who subsist on marginal food supplies. Because stable isotopic tracers are completely safe and without hazard, they can be used freely in health, nutrition, and agriculture studies in all populations

  18. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  19. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  20. Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.

    Science.gov (United States)

    Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y

    2010-05-01

    A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.

  1. Regulatory Framework and Current Practices of the Radioactive Material Safe and Secure Transport in Albania

    International Nuclear Information System (INIS)

    Dollani, K.; Grillo, B.; Telhaj, E.

    2016-01-01

    Attempts for the establishing of a safe and secure radioactive material transport in Albania began a decade ago with formulation of the different regulation in the field of safe and secure handling of the radioactive materials. In 2004 a special regulation for the safe transport of radioactive material was prepared and approved by the National Radiation Protection Commission). This regulation has been based in the IAEA standards for the radioactive material transport and was reviewed periodically. The last regulation of the radioactive material transport was approved by Albanian government through a governmental ordinance. The transport of the radioactive material in Albania is performed by licensed subjects, which fulfill all requirements of the mentioned governmental ordinance. Based in the existing regulation, for each transport of radioactive material, a special permission is issued by NRPC. The issuing of permission allows competent authority to provide necessary information on transport regularity and to have under survey all transports of the radioactive material carried out inside the country. Last year were issued more than 80 permissions for the transport of the different types and categories of the radioactive sources. (author)

  2. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  3. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  4. Safe and Secure Transportation of Radioactive Materials in Pakistan and Future Challenges

    International Nuclear Information System (INIS)

    Muneer, Muhammad; Ejaz, Asad

    2016-01-01

    PNRA is the sole organization in the country responsible to regulate all matters pertaining to ionizing radiations. For the safety of transport of radioactive material in the country, PNRA has adopted IAEA TS-R-1 as a national regulation. To cover the security aspects and emergency situations, if any, during the transportation of radioactive material, PNRA has issued the regulatory guide on ‘Transportation of Radioactive Material by Road in Pakistan’. In Pakistan, low to medium activity radioactive sources are transported from one place to another by road for the purpose of industrial radiography, well logging, medical application, etc. According to national policy, sealed radioactive sources of half life greater than 1 year and with initial activity of 100 GBq or more imported in the country are required to be returned to country of origin (exported) after its use. Although the activities related to transport of radioactive material remained safe and secure and no major accident/incident has been reported so far, however, the improvement/enhancement in the regulatory infrastructure is a continuous process. In future, more challenges are expected to be faced in the safety of transport packages. This paper will describe the steps taken by PNRA for the safety and security of transport of radioactive material in the country and future challenges. (author)

  5. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  6. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  7. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo; Lowe, Kathleen M.; Tucker, Mark D; Salerno, Reynolds Mathewson; Souza, Caroline Ann

    2006-11-01

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

  8. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  9. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    Energy Technology Data Exchange (ETDEWEB)

    MCCOY,JAMES A.

    2000-08-29

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  10. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  11. Experiences for the Safe and Secure transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2016-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  12. Experiences for the Safe and Secure Transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2011-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  13. Safe, secure, and clean disposal of final nuclear wastes using 'PyroGreen' strategies

    International Nuclear Information System (INIS)

    Jung, HyoSook; Choi, Sungyeol; Hwang, Il Soon

    2011-01-01

    Spent nuclear fuels (SNFs) present global challenges that must be overcome to pave way for safe, secure, peaceful and clean nuclear energy. As one of innovative solutions, we have proposed an innovative partitioning, transmutation, and disposal approach named as 'PyroGreen' that is designed to eliminate the need for high-level waste repositories. A flowsheet of pyrochemical partitioning process with technically achievable values of decontamination factors on long-living radionuclides has been established to enable all the final wastes to be disposed of as low and intermediate level wastes. The long-term performance of a geological repository was assessed by SAFE-ROCK code for the final wastes from the PyroGreen processing of entire 26,000 MTHM of SNFs arising from lifetime operation of 24 pressurized water reactors. The assessment results agree well with an earlier study in the fact that most harmful radionuclides dominating groundwater migration risk are shown to be long-living fission products including C-14, Cl-36, Se-79, I-129, and Cs-135, whereas most actinides including U, Pu, Np, Am, and Cm are shown to remain near the repository. It is shown that the final wastes can meet the radiological dose limit of current Korean regulation on the low and intermediate level waste repository. Long-living actinide concentration in wastes is comparable with those in wastes in Waste Isolation Pilot Plant that has proved adequately low risk of human intrusion. Overall decontamination factors required for PyroGreen are finally determined as 20,000 for uranium and all transuranic elements whereas much lower values in the range of 10-50 are required for important fission products including Se, Tc, I, Sr, and Cs in order to eliminate the need for any high-level waste repository. It has been shown that experimentally demonstrated recovery rate data for key process steps positively support the feasibility of PyroGreen. SAFE-ROCK code was used to evaluate the long-term performance

  14. The experience of the Republic of Belarus in the field of safe and secure transport of radioactive material

    International Nuclear Information System (INIS)

    Astashka, R.; Kronava, Z.; Prykhodzka, A.; Tkachonak, I.

    2016-01-01

    The experience of the safe and secure transport of radioactive material of the Republic of Belarus includes domestic and international movements. Transit is a substantial part of international movements taking into account the location of the country. Legislative and regulatory requirements on safety and security of radioactive material transport being in force in the country include the demands making by such state structures as the Department on Nuclear and Radiation Safety, the Department on supervision for the safe industrial activities, the Ministry of Health of the Republic of Belarus. At the same time response to accidents and security events belongs to the scope of activity of special subdivisions of the Ministry for Emergency Situations and the Ministry of Internal Affairs of the Republic of Belarus. For safety purposes all the above-mentioned structures are executing their duties in close collaboration with each other and are following the IAEA safety and security recommendations. The regulatory infrastructure concerning the safe and secure transport of radioactive material of the Republic of Belarus is the subject of the contributed paper. (author)

  15. Subjective Security in a Volatile Geopolitical Situation: Does Lithuanian Society Feel Safe?

    Directory of Open Access Journals (Sweden)

    Vileikienė Eglė

    2016-12-01

    Full Text Available The geopolitical situation of Lithuania has deteriorated since the annexation of Crimea and the military conflict in Eastern Ukraine. It has affected the objective security of the state as well as subjective security of the Lithuanian population. This article analyses subjective security and deals with the subjective perception of geopolitical and military threats, mainly social attitudes towards national security and the willingness to defend the country. Article is based on theories of securitisation and human security and holds that individuals are the primary referents of security. Empirically, the article relies on the original data of the research project “Subjective Security in a Volatile Geopolitical Context: Traits, Factors and Individual Strategies”, funded by the Research Council of Lithuania. Article shows the dynamics of social attitudes towards security. Over the last 15 years, a clear shift towards the understanding of potential military threats has occurred. Nevertheless, the predominant concern about individual security, overshadowing security of the state and security of the global order, found in previous studies, has persisted. An individual, as a rule, feels most secure in his/her “closest” environment, e.g. family and friends, and least secure in the “farthest” environment, e.g. other continents.

  16. Use of stable isotopes in developing countries: safe markers for nutrition regime study

    International Nuclear Information System (INIS)

    Klein, P.D.; Klein, E.R.

    1987-01-01

    Possible use of stable radioisotopes in studies on nutrition and medicine problems that may be used in investigations of babies, children, pregnant women is shown. Attention is paid to behaviour of limited number of elements: hydrogen, carbon, nitrogen, oxygen. The IAEA plans implementation of a new coordinated research program on use of stable isotopes for studying nutrition problems and related diseases. The program emphasis will be placed on protein metabolism measurements and estimation of energy consumption in control population groups in developing countries

  17. The development of a small inherently safe homogeneous reactor for the production of medical isotopes

    Energy Technology Data Exchange (ETDEWEB)

    Carlin, G.E.; Bonin, H.W., E-mail: george.carlin@rmc.ca [Royal Military College of Canada, Kingston, Ontario (Canada)

    2013-07-01

    The use of radioisotopes for various procedures in the health care industry has become one of the most important practices in medicine. New interest has been found in the use of liquid fueled nuclear reactors to produce these isotopes due to the ease of fuel processing and ability to efficiently use LEU as the fuel source. A version of this reactor is being developed at the Royal Military College of Canada to act as a successor to the SLOWPOKE-2 platform. The thermal hydraulic and transient characteristics of a 20 kWt version are being studied to verify inherent safety abilities. (author)

  18. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  19. Integrated safeguards and security for the INEL Special Isotope Separation Plant

    International Nuclear Information System (INIS)

    Warner, G.F.; Zack, N.R.

    1990-01-01

    This paper describes the development of the safeguards and security system that was to be used for the Special Isotope Separation (SIS) Production Plant. The US Department of Energy has postponed the construction of the SIS Plant that was to be built at the Idaho National Engineering Laboratory (INEL) site near Idaho Falls, Idaho. The Plant was designed to produce weapons grade plutonium from DOE owned fuel grade plutonium by converting off-spec. plutonium dioxide into metal buttons that would meet required chemical and isotopic specifications. Because this was to be a completely new facility there was a unique opportunity to provide an in-depth, ''state-of-the- art'' safeguards and security system without attempting to overlay upon an existing, older system. This facility was being designed to be in complete compliance with the new DOE Orders by integrating safeguards and security into the plant operating system and by providing graded protection to the areas of varying sensitivity within the plant

  20. Architecture of security management unit for safe hosting of multiple agents

    Science.gov (United States)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  1. The Model-Driven openETCS Paradigm for Secure, Safe and Certifiable Train Control Systems

    DEFF Research Database (Denmark)

    Peleska, Jan; Feuser, Johannes; Haxthausen, Anne Elisabeth

    2012-01-01

    -driven openETCS approach, a threat analysis is performed, identifying both safety and security hazards that may be common to all model-based development paradigms for safety-critical railway control systems, or specific to the openETCS approach. In the subsequent sections state-of-the-art methods suitable...

  2. Safe and secure at work?: findings from the 2002 Workplace Risk Supplement.

    Science.gov (United States)

    Jenkins, E Lynn; Fisher, Bonnie S; Hartley, Dan

    2012-01-01

    To examine employee's perception of safety and related workplace safety and prevention issues, including their use of self-protection measures and victimization experience. The Workplace Risk Supplement (WRS) to the National Crime Victimization Survey (NCVS) was administered to 55,158 employed respondents who were 16 years or older. Trained U.S. Census Bureau interviewers administered the WRS in all households selected for the NCVS during the 6-month reference period from January through June 2002. Responses from the 55,158 WRS respondents were weighted to obtain national estimates, resulting in 142,410,858 cases. The demographic distribution of WRS respondents is very similar to that of the U.S. labor force. Seven percent of respondents reported that they worried about someone in their workplace attacking them, while nearly 4% experienced victimization. The majority indicated that they felt that their workplace, the neighborhood around their workplace, and places they traveled to as part of their job were either "Very Safe" or "Somewhat Safe" from crime. Six percent carried some type of self protection while at work although this varied by occupation. Employees largely feel safe from violence while working. Differences in victimization by occupation bolster efforts to focus workplace violence prevention in high-risk occupations.

  3. Analysis of application of different approaches to secure safe drinking water

    Directory of Open Access Journals (Sweden)

    Pendić Zoran

    2017-01-01

    Full Text Available In this analysis, the risk systems include the systems within which services sensitive to risk are executed. The complex service of population supply with safe drinking water is considered to be risky. Guidelines for drinking water quality of the World Health Organization (WHO recommends the use of effective preventive approaches to risk-based management of the safety and quality of drinking water. For example, Food Safety Law of the Republic of Serbia stipulates mandatory application of HACCP system in order to obtain safe drinking water. Different approaches to preventive risk-based management for the sake of the safety and quality of drinking water are applied nowadays. In this paper we consider the following approaches: Original Codex Alimentarius HACCP system and some of its modified versions; International standard ISO 22000: 2005 Food safety management systems - Requirements for any organization in the food chain; Water Safety Plan (WSP of the World Health Organization (WHO; Generalized HACCP system. All of these approaches are based, to a greater or lesser extent, on the original Codex Alimentarius HACCP system. The paper gives a situation analysis (SWOT analysis of considered approaches.

  4. 5 steps to delivering safe, secure and reliable rail solutions for the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Connelly, C. [Direct Rail Services, Warrington (United Kingdom)

    2004-07-01

    Direct Rail Services (DRS) has been operating since October 1995, following the decision by parent company, British Nuclear Fuels (BNFL), to create a strategic rail transport service. The decision came after the privatisation of the rail network in the UK, when the former British Rail was superseded by a range of private organisations responsible for separate areas of the industry. Individual companies became responsible for aspects such as the operation and maintenance of the network infrastructure and for passenger and freight train services. Rather than enter into contractual arrangements with third party contractors, DRS was formed - securing both the access and reliability of transport routes and availability of the rail network, providing greater guarantees about the levels of service delivery. The strategy of bringing this area of transport in house was concurrent with that of international transport, utilising its own fleet of ships for overseas fuel movements. Freight operations began in October 1995, with the first services operating between Sellafield and the low level radioactive waste facility at Drigg.

  5. 5 steps to delivering safe, secure and reliable rail solutions for the nuclear industry

    International Nuclear Information System (INIS)

    Connelly, C.

    2004-01-01

    Direct Rail Services (DRS) has been operating since October 1995, following the decision by parent company, British Nuclear Fuels (BNFL), to create a strategic rail transport service. The decision came after the privatisation of the rail network in the UK, when the former British Rail was superseded by a range of private organisations responsible for separate areas of the industry. Individual companies became responsible for aspects such as the operation and maintenance of the network infrastructure and for passenger and freight train services. Rather than enter into contractual arrangements with third party contractors, DRS was formed - securing both the access and reliability of transport routes and availability of the rail network, providing greater guarantees about the levels of service delivery. The strategy of bringing this area of transport in house was concurrent with that of international transport, utilising its own fleet of ships for overseas fuel movements. Freight operations began in October 1995, with the first services operating between Sellafield and the low level radioactive waste facility at Drigg

  6. μRTZVisor: A Secure and Safe Real-Time Hypervisor

    Directory of Open Access Journals (Sweden)

    José Martins

    2017-10-01

    Full Text Available Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target. Microkernel-based approaches to virtualization have been shown to bridge the gap between traditional and embedded virtualization. This notwithstanding, existent microkernel-based solutions follow a highly para-virtualized approach, which inherently requires a significant software engineering effort to adapt guest operating systems (OSes to run as userland components. In this paper, we present μ RTZVisor as a new TrustZone-assisted hypervisor that distinguishes itself from state-of-the-art TrustZone solutions by implementing a microkernel-like architecture while following an object-oriented approach. Contrarily to existing microkernel-based solutions, μ RTZVisor is able to run nearly unmodified guest OSes, while, contrarily to existing TrustZone-assisted solutions, it provides a high degree of functionality and configurability, placing strong emphasis on the real-time support. Our hypervisor was deployed and evaluated on a Xilinx Zynq-based platform. Experiments demonstrate that the hypervisor presents a small trusted computing base size (approximately 60KB, and a performance overhead of less than 2% for a 10 ms guest-switching rate.

  7. Safe Grid

    Science.gov (United States)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote

  8. Being in a safe and thus secure place, the core of early labour: A secondary analysis in a Swedish context

    Science.gov (United States)

    Carlsson, Ing-Marie

    2016-01-01

    Background Early labour is the very first phase of the labour process and is considered to be a period of time when no professional attendance is needed. However there is a high frequency of women who seek care at the delivery wards during this phase. When a woman is admitted to the delivery ward, one role for midwives is to determine whether the woman is in established labour or not. If the woman is assessed as being in early labour she will probably then be advised to return home. This recommendation is made due to past research that found that the longer a woman is in hospital the higher the risk for complications for her and her child. Women have described how this situation leaves them in a vulnerable situation where their preferences are not always met and where they are not always included in the decision-making process. Aim The aim of this study was to generate a theory based on where a woman chooses to be during the early labour process and to increase our understanding about how experiences can differ from place to place. Methods The method was a secondary analysis with grounded theory. The data used in the analysis was from two qualitative interview studies and 37 transcripts. Conclusion The findings revealed a substantive theory that women needed to be in a safe and thus secure place during early labour. This theory also describes the interplay between how women ascribed their meaning of childbirth as either a natural live event or a medical one, how this influenced where they wanted to be during early labour, and how that chosen place influenced their experiences of labour and birth. PMID:27172510

  9. Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure

    Science.gov (United States)

    2006-05-04

    Communication Periods Processing Resource Sanitization Minimum Interrupt Servicing Semaphores Multi-Core Synchronization Primitives Timers And nothing else...Communities of Interest Secure Configuration of all Nodes in Enclave Bandwidth provisioning & partitioning Secure Clock Synchronization Suppression of

  10. Definition of the «Economic Security of an Enterprise» and «Safe Development of an Enterprise» Notions

    Directory of Open Access Journals (Sweden)

    Yefimova Ganna V.

    2013-11-01

    Full Text Available The necessity of this study is explained by difference of opinions regarding understanding of the “economic security of an enterprise” notion, on the one hand, and the poorly studied issue of a combination of the process of enterprise development with a necessary task of ensuring a high level of its economic security, on the other hand. Analysing, systemising and generalising results of scientific studies, the article identifies that economic security of an enterprise is an economic category, which characterises the enterprise functioning conditions. Favourable conditions of functioning ensure a high level of stability and steadiness of an enterprise and its ability of self-realisation and expanded self-reproduction. This becomes possible if an enterprise is capable of resisting external threats and preventing internal ones. Since development of an enterprise is an objective process, which takes place under conditions of uncertainty and changeability of external and internal environments, it is accompanied with a system of threats, which the system of economic security should protect an enterprise from. Taking into account the above, safe development of an enterprise is a process of consecutive transitions of the economic system from one state to another, which is not of a poorer quality than a previous one, which envisages producing new goals and creation of safe conditions for transition from one specific goal, achieved in the process of enterprise functioning, to another. The proposed definitions allow consideration of such significant issues of methodology of management of safe development of an enterprise as the diagnostics of its level and planning.

  11. Safe Environment Training: Effects on Catholic Schoolteachers' and Administrators' School Security and Satisfaction

    Science.gov (United States)

    Teague, James Brian

    2013-01-01

    In 2002, in light of the sexual abuse crisis in the Catholic church, The United States Conference of Catholic Bishops established "The charter for the Protection of Children and Young People" that mandated safe environment training for clergy personnel, and volunteers working in the Catholic church. In this study, under the auspices of a…

  12. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    Science.gov (United States)

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  13. Promoting Safe, Secure, and Peaceful Growth of Nuclear Energy: Next Steps for Russia and the United States

    OpenAIRE

    Bunn, Matthew G.; Vyacheslav P. Kuznetzov

    2010-01-01

    Russia, the United States and other countries must cooperate to enable large-scale growth of nuclear energy around the world while achieving even higher standards of safety, security, and nonproliferation than are in place today. This will require building a new global framework for nuclear energy, including new or strengthened global institutions. The Belfer Center's Managing the Atom (MTA) Project and the Russian Research Center's Kurchatov Institute developed these and additional recommend...

  14. Sixth Warren K. Sinclair keynote address: The role of a strong regulator in safe and secure nuclear energy.

    Science.gov (United States)

    Lyons, Peter B

    2011-01-01

    The history of nuclear regulation is briefly reviewed to underscore the early recognition that independence of the regulator was essential in achieving and maintaining public credibility. The current licensing process is reviewed along with the status of applications. Challenges faced by both the NRC and the industry are reviewed, such as new construction techniques involving modular construction, digital controls replacing analog circuitry, globalization of the entire supply chain, and increased security requirements. The vital area of safety culture is discussed in some detail, and its importance is emphasized. Copyright © 2010 Health Physics Society

  15. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  16. Safe sex

    Science.gov (United States)

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  17. MELTER: A model of the thermal response of cargos transported in the Safe-Secure Trailer subject to fire environments for risk assessment applications

    International Nuclear Information System (INIS)

    Larsen, M.E.

    1994-08-01

    MELTER is an analysis of cargo responses inside a fire-threatened Safe-Secure Trailer (SST) developed for the Defense Program Transportation Risk Assessment (DPTRA). Many simplifying assumptions are required to make the subject problem tractable. MELTER incorporates modeling which balances the competing requirements of execution speed, generality, completeness of essential physics, and robustness. Input parameters affecting the analysis include those defining the fire scenario, those defining the cargo loaded in the SST, and those defining properties of the SST. For a specified fire, SST, and cargo geometry MELTER predicts the critical fire duration that will lead to a failure. The principal features of the analysis include: (a) Geometric considerations to interpret fire-scenario descriptors in terms of a thermal radiation boundary condition, (b) a simple model of the SST's wall combining the diffusion model for radiation through optically-thick media with an endothermic reaction front to describe the charring of dimensional, rigid foam in the SST wall, (c) a transient radiation enclosure model, (d) a one-dimensional, spherical idealization of the shipped cargos providing modularity so that cargos of interest can be inserted into the model, and (e) associated numerical methods to integrate coupled, differential equations and find roots

  18. Safe society safe mobility

    CSIR Research Space (South Africa)

    Holtmann, B

    2007-07-01

    Full Text Available . Journal of research in crime and delinquency, 21, 233-50. Metropolitan Transportation Authority, 2007. What is Bus Rapid Transit? [O]. Available: http://www.mta.info/mta/planning/brt/whatis.htm Accessed on 28/05/2007 Mijanovich, T., and Weitzman..., 2006. South African Police Service Statistics. [O]. Available: http://www.saps.gov.za/statistics/reports/crimestats/2006/crime_stats.htm Accessed on 29/03/2007 Security.co.za., 2007. Window washers beat up motorist. [O]. Available: http...

  19. How safe is safe?

    International Nuclear Information System (INIS)

    Hughes, C.F.; Flood, M.

    1996-01-01

    60 and 70 degree convexo-concave valve. Nine hundred and one valves were implanted in Australia. Twelve strut fractures were reported. Two other patients have been explanted and have demonstrated 'single leg separation'. This particular problem was only investigated when two patients died of a fractured valve in the same hospital on the same day. A retrospective study of all known patients in Australia has shown poor follow up, lack of knowledge and indeed lack of interest in device failure modes. Consequently, the Australian and New Zealand Heart Valve Registry was established to track all implanted valves and to notify physicians of any new information. This is perhaps the first device-specific register in Australia. The safety of individual devices is often not known by manufacturers, regulators and clinicians alike. No follow up is available and large volume long term studies are yet to be implemented for the majority of devices. Without such studies and without mandatory problem reporting, the relative safety of medical devices will continue to be measured by banner headlines, sensational TV 'grabs' and protracted law suits. At present, only schemes such as the Problem Reporting Scheme can tell us (albeit vaguely) 'how safe is safe'

  20. How Safe Are Our Libraries?

    Science.gov (United States)

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  1. Communication of 10 June 2009 received from the Permanent Mission of the United Kingdom with regard to the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power

    International Nuclear Information System (INIS)

    2009-01-01

    The Secretariat has received a communication dated 10 June 2009 from the Permanent Mission of the United Kingdom of Great Britain and Northern Ireland, attaching a note from the United Kingdom and the final remarks of the Chairman of the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power, held in London on 17 and 18 March 2009. As requested in that communication, the note and final remarks are herewith circulated for the information of Member States

  2. Using intervention mapping for the development of a targeted secure web-based outreach strategy named SafeFriend, for Chlamydia trachomatis testing in young people at risk.

    Science.gov (United States)

    Theunissen, Kevin A T M; Hoebe, Christian J P A; Crutzen, Rik; Kara-Zaïtri, Chakib; de Vries, Nanne K; van Bergen, Jan E A M; van der Sande, Marianne A B; Dukers-Muijrers, Nicole H T M

    2013-10-22

    Many young people at high risk for Chlamydia trachomatis (Ct) are not reached by current sexual health care systems, such as general practitioners and public sexual health care centres (sexually transmitted infection clinics).Ct is the most frequently diagnosed bacterial sexually transmitted infection (STI) among sexually active people and in particular young heterosexuals. Innovative screening strategies are needed to interrupt the transmission of Ct among young people and connect the hidden cases to care. Intervention Mapping (IM), a systematic approach to develop theory- and evidence-based interventions, was used to develop a strategy to target Ct testing towards young people who are currently hidden to care in The Netherlands. Both clinical users (i.e. sexual health care nurses) and public users (i.e., young people at risk for Ct) were closely involved in the IM process. A needs assessment study was carried out using semi-structured interviews among users (N = 21), a literature search and by taking lessons learned from existing screening programmes. Theoretical methods and practical applications to reach high risk young people and influence testing were selected and translated into specific programme components. The IM approach resulted in the development of a secure and web-based outreach Ct screening strategy, named SafeFriend. It is developed to target groups of high-risk young people who are currently hidden to care. Key methods include web-based Respondent Driven Sampling, starting from young Ct positive sexual health care centre clients, to reach and motivate peers (i.e., sex partners and friends) to get tested for Ct. Testing and the motivation of peers were proposed as the desired behavioural outcomes and the Precaution Adoption Process Model was chosen as theoretical framework. End users, i.e., young people and sexual health care nurses were interviewed and included in the development process to increase the success of implementation. IM proved useful

  3. Radioactive cesium isotope ratios as a tool for determining dispersal and re-dispersal mechanisms downwind from the Nevada Nuclear Security Site.

    Science.gov (United States)

    Snyder, Darin C; Delmore, James E; Tranter, Troy; Mann, Nick R; Abbott, Michael L; Olson, John E

    2012-08-01

    Fractionation of the two longer-lived radioactive cesium isotopes ((135)Cs and (137)Cs) produced by above ground nuclear tests have been measured and used to clarify the dispersal mechanisms of cesium deposited in the area between the Nevada Nuclear Security Site and Lake Mead in the southwestern United States. Fractionation of these isotopes is due to the 135-decay chain requiring several days to completely decay to (135)Cs, and the 137-decay chain less than one hour decay to (137)Cs. Since the Cs precursors are gases, iodine and xenon, the (135)Cs plume was deposited farther downwind than the (137)Cs plume. Sediment core samples were obtained from the Las Vegas arm of Lake Mead, sub-sampled and analyzed for (135)Cs/(137)Cs ratios by thermal ionization mass spectrometry. The layers proved to have nearly identical highly fractionated isotope ratios. This information is consistent with a model where the cesium was initially deposited onto the land area draining into Lake Mead and the composite from all of the above ground shots subsequently washed onto Lake Mead by high intensity rain and wind storms producing a layering of Cs activity, where each layer is a portion of the composite. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. SAFE Newsletter

    OpenAIRE

    2013-01-01

    The Center of Excellence SAFE – “Sustainable Architecture for Finance in Europe” – is a cooperation of the Center for Financial Studies and Goethe University Frankfurt. It is funded by the LOEWE initiative of the State of Hessen (Landes-Offensive zur Entwicklung wissenschaftlich-ökonomischer Exzellenz). SAFE brings together more than 40 professors and just as many junior researchers who are all dedicated to conducting research in support of a sustainable financial architecture. The Center has...

  5. Safeness of radiological machinery

    International Nuclear Information System (INIS)

    Yokoyama, Shun

    1979-01-01

    The human factors affecting the safeness of radiological machinery, which are often very big and complicated machines, are described from the stand point of handling. 20 to 50% of the troubles on equipments seem to be caused by men. This percentage will become even higher in highly developed equipments. Human factors have a great influence on the safeness of radiological equipments. As the human factors, there are sensory factors and knowledge factors as well as psychological factors, and the combination of these factors causes mishandling and danger. Medical services at present are divided in various areas, and consist of the teamwork of the people in various professions. Good human relationship, education and control are highly required to secure the safeness. (Kobatake, H.)

  6. Safe Haven.

    Science.gov (United States)

    Bush, Gail

    2003-01-01

    Discusses school libraries as safe havens for teenagers and considers elements that foster that atmosphere, including the physical environment, lack of judgments, familiarity, leisure, and a welcoming nature. Focuses on the importance of relationships, and taking the time to listen to teens and encourage them. (LRW)

  7. Plutonium safe handling

    International Nuclear Information System (INIS)

    Tvehlov, Yu.

    2000-01-01

    The abstract, prepared on the basis of materials of the IAEA new leadership on the plutonium safe handling and its storage (the publication no. 9 in the Safety Reports Series), aimed at presenting internationally acknowledged criteria on the radiation danger evaluation and summarizing the experience in the safe management of great quantities of plutonium, accumulated in the nuclear states, is presented. The data on the weapon-class and civil plutonium, the degree of its danger, the measures for provision of its safety, including the data on accident radiation consequences with the fission number 10 18 , are presented. The recommendations, making it possible to eliminate the super- criticality danger, as well as ignition and explosion, to maintain the tightness of the facility, aimed at excluding the radioactive contamination and the possibility of internal irradiation, to provide for the plutonium security, physical protection and to reduce irradiation are given [ru

  8. When is the liquefaction of coal economic. [Including safe and secure supplies, low interest, multiplier effect of money spent inside the country, employment, etc

    Energy Technology Data Exchange (ETDEWEB)

    1980-09-01

    Usually the commercialization of a technology is determined by the economic viability. However, looking at coal conversion we recognize that there is also a strategic factor to be considered. Before entering into what is almost a political debate about the strategic value of coal conversion, let us look at the economic data. Table 2 shows specific cost numbers for coal gasification, coal liquefaction and electricity from coal. When the total cost of the different fuels is calculated with capital charges as would be required by private industry, one would arrive at indeed high figures, high compared to the present day cost of liquid energy. However, in the capital intensive electricity industry, capital can be accounted for on a capital charge basis of 7 to 17%. If this type of soft financing is applied to coal, coal liquids and coal gas, the figures already become much more attractive. Money internally spent within a country will turnover a few times. This is described by economists as the effect of the multiplier. To even further improve the prospects of home-made liquids one can add the value of avoiding unemployment. A labor intensive industry like the coal gasification and liquefaction industry may give a boost to the number of jobs and as a result have even another additional value to the country involved. Such an analysis leads to the conclusion that coal gasification and liquefaction could develop as a utility type industry under rather tight Government control. This has its strategic advantages with respect to stability and security of supply. On the other hand it may discourage private industry from getting involved in this business. Much will therefore depend on the political decision making process and that maybe is one of the biggest unknowns left in answer to the question when coal conversion will become of economic significance.

  9. Validation of an in situ solidification/stabilization technique for hazardous barium and cyanide waste for safe disposal into a secured landfill.

    Science.gov (United States)

    Vaidya, Rucha; Kodam, Kisan; Ghole, Vikram; Surya Mohan Rao, K

    2010-09-01

    The aim of the present study was to devise and validate an appropriate treatment process for disposal of hazardous barium and cyanide waste into a landfill at a Common Hazardous Waste Treatment Storage Disposal Facility (CHWTSDF). The waste was generated during the process of hardening of steel components and contains cyanide (reactive) and barium (toxic) as major contaminants. In the present study chemical fixation of the contaminants was carried out. The cyanide was treated by alkali chlorination with calcium hypochlorite and barium by precipitation with sodium sulfate as barium sulfate. The pretreated mixture was then solidified and stabilized by binding with a combination of slag cement, ordinary Portland cement and fly ash, molded into blocks (5 x 5 x 5 cm) and cured for a period of 3, 7 and 28 days. The final experiments were conducted with 18 recipe mixtures of waste + additive:binder (W:B) ratios. The W:B ratios were taken as 80:20, 70:30 and 50:50. The optimum proportions of additives and binders were finalized on the basis of the criteria of unconfined compressive strength and leachability. The leachability studies were conducted using the Toxicity Characteristic Leaching Procedure. The blocks were analyzed for various physical and leachable chemical parameters at the end of each curing period. Based on the results of the analysis, two recipe mixtures, with compositions - 50% of [waste + (120 g Ca(OCl)(2) + 290 g Na(2)SO(4)) kg(-1) of waste] + 50% of binders, were validated for in situ stabilization into a secured landfill of CHWTSDF. 2010 Elsevier Ltd. All rights reserved.

  10. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  11. Safe cycling!

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    The HSE Unit will be running a cycling safety campaign at the entrances to CERN's restaurants on 14, 15 and 16 May. Pop along to see if they can persuade you to get back in the saddle!   With summer on its way, you might feel like getting your bike out of winter storage. Well, the HSE Unit has come up with some original ideas to remind you of some of the most basic safety rules. This year, the prevention campaign will be focussing on three themes: "Cyclists and their equipment", "The bicycle on the road", and "Other road users". This is an opportunity to think about the condition of your bike as well as how you ride it. From 14 to 16 May, representatives of the Swiss Office of Accident Prevention and the Touring Club Suisse will join members of the HSE Unit at the entrances to CERN's restaurants to give you advice on safe cycling (see box). They will also be organising three activity stands where you can test your knowle...

  12. Nuclear Security in Action at Facilities in Ghana

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    Nuclear security is a national responsibility. An Integrated Nuclear Security Support Plan (INSSP) is a tool that enables States to address nuclear security in a comprehensive way and to strengthen its national nuclear security regime, beginning with the legislative and regulatory framework within a State. Operating areas in nuclear facilities like research reactors which use highly enriched uranium, require additional physical protection measures to ensure the security of the nuclear material and prevent acts of sabotage. Other radioactive materials, like sealed radioactive sources used in radiotherapy machines in hospitals for cancer treatment, need to be protected so that they are not stolen and used with malicious intent. Nuclear and other radioactive material needs to be kept in safe and secure storage, which incorporates various types of physical barriers to prevent theft and unauthorized access. Intrusion detection and assessment systems, like cameras and sensors, help to ensure timely and adequate responses to any security incident. Responding to a nuclear security incident, and mitigating its consequences, requires specialized equipment like isotope identifiers, and competent and well trained personnel. Nuclear Security Support Centres (NSSCs) focus on human resource development as well as technical and scientific support which contribute to the sustainability of nuclear security in a State

  13. Staying Safe on Social Network Sites

    Science.gov (United States)

    ... Tips Security Tip (ST06-003) Staying Safe on Social Networking Sites Original release date: January 26, 2011 | Last revised: ... so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as "friend- ...

  14. How safe is safe enough?

    International Nuclear Information System (INIS)

    Desnoyers, B.; Chanzy, Y.

    2004-01-01

    The IAEA Regulations for the Safe Transport of Radioactive Material, were historically established with the objective to reduce the probability that persons be exposed to unacceptable doses due to normal operation or accident situations during transport of radioactive material. Based on the International Basic Safety Standards for Protection against Ionizing Radiation (BSS), the definition, which was adopted for an unacceptable dose for an accident situation, is the excess of the maximum dose limits permissible in a single year for the occupational exposure of a worker in the BSS. Concerning the severity of accident situations, it has always be clearly stated that the objective of the tests for demonstrating ability to withstand accident conditions of transport was not to cover every accident condition, but solely most of them. The last available evaluations regarding the rate of accidents which are covered by the standardised accident conditions of transport defined in the IAEA Regulations give a range of about 80%, plus or minus 15% which depends on transport mode and studies. Consequently, slight variations in the capabilities of the packages to meet the specified performance would probably not have significant consequences on the protection level in case of accident. In the assessment of the compliance with the regulations, the tendency of experts, taking advantage of the enhanced performances of computer calculation codes, is to ask more and more calculations, with more and more accuracy, leading to more and more restrictions. Consequently, cost and delay are considerably increased without any evidence of an equivalent effect on the level of protection. This paper will initiate a reflection on the general objectives and principles when implementing the Regulations, in such a way that demonstrations remain cost effective, taking into account evolution of the techniques and a high level of safety

  15. Traveling Safely with Medicines

    Science.gov (United States)

    ... Medications Safely My Medicine List How to Administer Traveling Safely with Medicines Planes, trains, cars – even boats ... your trip, ask your pharmacist about how to travel safely with your medicines. Make sure that you ...

  16. Safe actinide disposition in molten salt reactors

    International Nuclear Information System (INIS)

    Gat, U.

    1997-01-01

    Safe molten salt reactors (MSR) can readily accommodate the burning of all fissile actinides. Only minor compromises associated with plutonium are required. The MSRs can dispose safely of actinides and long lived isotopes to result in safer and simpler waste. Disposing of actinides in MSRs does increase the source term of a safety optimized MSR. It is concluded that the burning and transmutation of actinides in MSRs can be done in a safe manner. Development is needed for the processing to handle and separate the actinides. Calculations are needed to establish the neutron economy and the fuel management. 9 refs

  17. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  18. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  19. 78 FR 68784 - Cargo Securing Manuals

    Science.gov (United States)

    2013-11-15

    .../Circ.) 1352 (``Cargo Stowage and Securing (CSS Code) Annex 14 Guidance on Providing Safe Working... Providing Safe Working Conditions for the Securing of Containers'') of the IMO 2010 CSS Code. A cargo safe.... Indian Tribal Governments K. Energy Effects L. Technical Standards M. Environment I. Public Participation...

  20. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  1. Isotopic clusters

    International Nuclear Information System (INIS)

    Geraedts, J.M.P.

    1983-01-01

    Spectra of isotopically mixed clusters (dimers of SF 6 ) are calculated as well as transition frequencies. The result leads to speculations about the suitability of the laser-cluster fragmentation process for isotope separation. (Auth.)

  2. Safe Kids Worldwide

    Science.gov (United States)

    ... Blog Videos Newsletter facebook twitter instagram pinterest gplus youtube Search Menu Why It Matters Who We Are What We Do Find Your Safe Kids Safe Kids Day Main menu Keeping All Kids Safe Safety Tips Get Involved 4 Star Charity Donate Text Burns and Scalds 4 tips ...

  3. Stable isotopes

    International Nuclear Information System (INIS)

    Evans, D.K.

    1986-01-01

    Seventy-five percent of the world's stable isotope supply comes from one producer, Oak Ridge Nuclear Laboratory (ORNL) in the US. Canadian concern is that foreign needs will be met only after domestic needs, thus creating a shortage of stable isotopes in Canada. This article describes the present situation in Canada (availability and cost) of stable isotopes, the isotope enrichment techniques, and related research programs at Chalk River Nuclear Laboratories (CRNL)

  4. Isotope separation

    International Nuclear Information System (INIS)

    Eerkens, J.W.

    1979-01-01

    A method of isotope separation is described which involves the use of a laser photon beam to selectively induce energy level transitions of an isotope molecule containing the isotope to be separated. The use of the technique for 235 U enrichment is demonstrated. (UK)

  5. "Same Room, Safe Place".

    Science.gov (United States)

    Keene Woods, Nikki

    2017-04-01

    There are many different professional stances on safe sleep and then there is the reality of caring for a newborn. There is a debate among professionals regarding safe sleep recommendations. The continum of recommendations vary from the American Academy of Pediatrics (AAP) Safe Sleep Guidelines to the bed-sharing recommendations from the Mother-Baby Behavioral Sleep Laboratory. The lack of consistent and uniform safe sleep recommendations from health professionals has been confusing for families but has more recently raised a real professional ethical dilemma. Despite years of focused safe sleep community education and interventions, sleep-related infant deaths are on the rise in many communities. This commentary calls for a united safe sleep message from all health professionals to improve health for mothers and infants most at-risk, "Same Room, Safe Place."

  6. The Safe Transportation of Radioactive Materials

    International Nuclear Information System (INIS)

    Megrahi, Abdulhafeed; Abu-Ali, Giuma; Enhaba; Ahmed

    2008-01-01

    In this paper, we present the essential conditions that should be required for transporting the radioactive materials. We demonstrate the procedure for transporting the radioactive iodine-131 from the Centre of Renewable Energies and Desalination of Water in Tajoura, Libya to Tripoli Medical Center. The safe measures were taken during the process of the transportation of the isotope produced in the centre including dosimetry analysis and the thickness of the container. (author)

  7. Disabled Children: The Right to Feel Safe

    Science.gov (United States)

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  8. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... shall have, at a minimum, the following security devices: (1) A means of protecting cash or other liquid assets, such as a vault, safe, or other secure space; (2) A lighting system for illuminating, during the...

  9. Safe havens in Europe

    DEFF Research Database (Denmark)

    Paldam, Martin

    2013-01-01

    Eleven safe havens exist in Europe providing offshore banking and low taxes. Ten of these states are very small while Switzerland is moderately small. All 11 countries are richer than their large neighbors. It is shown that causality is from small to safe haven to wealth, and that theoretically...... equilibriums are likely to exist where a certain regulation is substantially lower in a small country than in its big neighbor. This generates a large capital inflow to the safe havens. The pool of funds that may reach the safe havens is shown to be huge. It is far in excess of the absorptive capacity...... of the safe havens, but it still explains, why they are rich. Microstates offer a veil of anonymity to funds passing through, and Switzerland offers safe storage of funds....

  10. SMS security system for smart home detectors

    OpenAIRE

    Cekova, Katerina; Gelev, Saso

    2016-01-01

    Security has always been an important problem everywhere. Home security has been a major issue where crime is increasing and everybody wants home security to protect the home. Safety from theft and flame are the most important requirements of a home security system for people. A remote home security system offers many benefits from keeping homeowners, and their property safe. This paper present controlling of the home security system remotely from Android Application. Owners can turn on or...

  11. Isotope enrichment

    International Nuclear Information System (INIS)

    Garbuny, M.

    1979-01-01

    The invention discloses a method for deriving, from a starting material including an element having a plurality of isotopes, derived material enriched in one isotope of the element. The starting material is deposited on a substrate at less than a critical submonatomic surface density, typically less than 10 16 atoms per square centimeter. The deposit is then selectively irradiated by a laser (maser or electronic oscillator) beam with monochromatic coherent radiation resonant with the one isotope causing the material including the one istope to escape from the substrate. The escaping enriched material is then collected. Where the element has two isotopes, one of which is to be collected, the deposit may be irradiated with radiation resonant with the other isotope and the residual material enriched in the one isotope may be evaporated from the substrate and collected

  12. Stable isotopes

    International Nuclear Information System (INIS)

    Brazier, J.L.; Guinamant, J.L.

    1995-01-01

    According to the progress which has been realised in the technology of separating and measuring isotopes, the stable isotopes are used as preferable 'labelling elements' for big number of applications. The isotopic composition of natural products shows significant variations as a result of different reasons like the climate, the seasons, or their geographic origins. So, it was proved that the same product has a different isotopic composition of alimentary and agriculture products. It is also important in detecting the pharmacological and medical chemicals. This review article deals with the technology, like chromatography and spectrophotometry, adapted to this aim, and some important applications. 17 refs. 6 figs

  13. Isotope separation

    International Nuclear Information System (INIS)

    Bartlett, R.J.; Morrey, J.R.

    1978-01-01

    A method and apparatus is described for separating gas molecules containing one isotope of an element from gas molecules containing other isotopes of the same element in which all of the molecules of the gas are at the same electronic state in their ground state. Gas molecules in a gas stream containing one of the isotopes are selectively excited to a different electronic state while leaving the other gas molecules in their original ground state. Gas molecules containing one of the isotopes are then deflected from the other gas molecules in the stream and thus physically separated

  14. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-01-01

    The SAFE procedure is an efficient method of evaluating the physical protection system of a nuclear facility. Since the algorithms used in SAFE for path generation and evaluation are analytical, many paths can be evaluated with a modest investment in computer time. SAFE is easy to use because the information required is well-defined and the interactive nature of this procedure lends itself to straightforward operation. The modular approach that has been taken allows other functionally equivalent modules to be substituted as they become available. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  15. Securing a better future for all: Nuclear techniques for global development and environmental protection. NA factsheet on isotope hydrology: Ensuring water now and for the future

    International Nuclear Information System (INIS)

    2012-01-01

    Providing adequate freshwater of a desired quality to their populations is one of the foremost development challenges faced by Member States. Although water is a basic human need, it is estimated that nearly one billion people in developing countries do not have access to safe drinking water and more than two billion lack basic sanitation facilities due to inadequate water availability. According to the World Health Organization, nearly five million people - mostly children - die each year from preventable, water-borne diseases. Increasing population, irrigated agriculture and industrial growth together have stressed global freshwater resources over the past several decades. In addition, climate change and the need for greater energy production are now significant drivers of stress on water resources. Nearly 40% of world food production is achieved by means of irrigated agriculture, which accounts for about 70% of total freshwater withdrawals. A significant proportion of groundwater used for irrigation comes from fossil or non-renewable sources, making the food supply unsustainable for a growing human population. Nearly one in three people depends upon water from rivers that are fed by glaciers and snow melt. Increased variability and vulnerability of river flows in a warmer climate (due to increased glacial melt and changes in precipitation patterns) will drive the need for changes in water use and management practices. These changes may also include greater dependence on already stressed groundwater resources. Nearly four billion people - half of the world's population - may live under conditions of water stress in the next two decades.

  16. Are Detox Diets Safe?

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Are Detox Diets Safe? KidsHealth / For Teens / Are Detox Diets ... seguras las dietas de desintoxicación? What Is a Detox Diet? The name sounds reassuring — everyone knows that ...

  17. Chernobyl new safe confinement

    International Nuclear Information System (INIS)

    Dodd, L.

    2011-01-01

    The author presents the new safe confinement that will be commissioned at Unit 4 of the Chernobyl NPP in 2015. The confinement will ensure that Chernobyl Unit 4 will be placed in an environmentally safe condition for at least next 100 years. The article highlights the current work status, future perspectives and the feasibility of confinement concept [ru

  18. Asymptotically Safe Dark Matter

    DEFF Research Database (Denmark)

    Sannino, Francesco; Shoemaker, Ian M.

    2015-01-01

    We introduce a new paradigm for dark matter (DM) interactions in which the interaction strength is asymptotically safe. In models of this type, the coupling strength is small at low energies but increases at higher energies, and asymptotically approaches a finite constant value. The resulting...... searches are the primary ways to constrain or discover asymptotically safe dark matter....

  19. Some Questions on the Fixation of Radioisotopes in Connexion with the Problem of their Safe Burial

    Energy Technology Data Exchange (ETDEWEB)

    Zimakov, P. V.; Kulichenko, V. V.

    1960-07-01

    For the safe disposal of radioactive wastes it is essential that they be securely fixed in a suitable material for a long period. This is true regardless of the place or medium chosen for disposal. The chief source of danger in any given 'burial ground' is the threat of possible leakage resulting in the buried radioisotopes being dispersed in the environment. In recent times attention has been primarily directed to the question of disposing of the fission-produced radioisotopes which are formed in large quantities in many-countries during the release of energy through the fission of heavy nuclei in various nuclear power units (reactors). The present paper will discuss certain questions connected with the processing and disposal of wastes containing fission-produced isotopes.

  20. Compelling Research Opportunities using Isotopes

    International Nuclear Information System (INIS)

    2009-01-01

    Isotopes are vital to the science and technology base of the US economy. Isotopes, both stable and radioactive, are essential tools in the growing science, technology, engineering, and health enterprises of the 21st century. The scientific discoveries and associated advances made as a result of the availability of isotopes today span widely from medicine to biology, physics, chemistry, and a broad range of applications in environmental and material sciences. Isotope issues have become crucial aspects of homeland security. Isotopes are utilized in new resource development, in energy from bio-fuels, petrochemical and nuclear fuels, in drug discovery, health care therapies and diagnostics, in nutrition, in agriculture, and in many other areas. The development and production of isotope products unavailable or difficult to get commercially have been most recently the responsibility of the Department of Energy's Nuclear Energy program. The President's FY09 Budget request proposed the transfer of the Isotope Production program to the Department of Energy's Office of Science in Nuclear Physics and to rename it the National Isotope Production and Application program (NIPA). The transfer has now taken place with the signing of the 2009 appropriations bill. In preparation for this, the Nuclear Science Advisory Committee (NSAC) was requested to establish a standing subcommittee, the NSAC Isotope Subcommittee (NSACI), to advise the DOE Office of Nuclear Physics. The request came in the form of two charges: one, on setting research priorities in the short term for the most compelling opportunities from the vast array of disciplines that develop and use isotopes and two, on making a long term strategic plan for the NIPA program. This is the final report to address charge 1. NSACI membership is comprised of experts from the diverse research communities, industry, production, and homeland security. NSACI discussed research opportunities divided into three areas: (1) medicine

  1. Compelling Research Opportunities using Isotopes

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-04-23

    Isotopes are vital to the science and technology base of the US economy. Isotopes, both stable and radioactive, are essential tools in the growing science, technology, engineering, and health enterprises of the 21st century. The scientific discoveries and associated advances made as a result of the availability of isotopes today span widely from medicine to biology, physics, chemistry, and a broad range of applications in environmental and material sciences. Isotope issues have become crucial aspects of homeland security. Isotopes are utilized in new resource development, in energy from bio-fuels, petrochemical and nuclear fuels, in drug discovery, health care therapies and diagnostics, in nutrition, in agriculture, and in many other areas. The development and production of isotope products unavailable or difficult to get commercially have been most recently the responsibility of the Department of Energy's Nuclear Energy program. The President's FY09 Budget request proposed the transfer of the Isotope Production program to the Department of Energy's Office of Science in Nuclear Physics and to rename it the National Isotope Production and Application program (NIPA). The transfer has now taken place with the signing of the 2009 appropriations bill. In preparation for this, the Nuclear Science Advisory Committee (NSAC) was requested to establish a standing subcommittee, the NSAC Isotope Subcommittee (NSACI), to advise the DOE Office of Nuclear Physics. The request came in the form of two charges: one, on setting research priorities in the short term for the most compelling opportunities from the vast array of disciplines that develop and use isotopes and two, on making a long term strategic plan for the NIPA program. This is the final report to address charge 1. NSACI membership is comprised of experts from the diverse research communities, industry, production, and homeland security. NSACI discussed research opportunities divided into three areas: (1

  2. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  3. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  4. Designing Safe Facilities

    Science.gov (United States)

    McLester, Susan

    2011-01-01

    In the spring of 1999, 12 students and a teacher were killed by two gun-toting teenage boys at Columbine High School in Littleton, Colorado, making school safety and security an overnight priority in communities across the nation. Many schools are starting to borrow security methods and technology from the business world such as video intercoms,…

  5. Isotopic separation

    International Nuclear Information System (INIS)

    Castle, P.M.

    1979-01-01

    This invention relates to molecular and atomic isotope separation and is particularly applicable to the separation of 235 U from other uranium isotopes including 238 U. In the method described a desired isotope is separated mechanically from an atomic or molecular beam formed from an isotope mixture utilising the isotropic recoil momenta resulting from selective excitation of the desired isotope species by radiation, followed by ionization or dissociation by radiation or electron attachment. By forming a matrix of UF 6 molecules in HBr molecules so as to collapse the V 3 vibrational mode of the UF 6 molecule the 235 UF 6 molecules are selectively excited to promote reduction of UF 6 molecules containing 235 U and facilitate separation. (UK)

  6. Isotopic separation

    International Nuclear Information System (INIS)

    Chen, C.L.

    1979-01-01

    Isotopic species in an isotopic mixture including a first species having a first isotope and a second species having a second isotope are separated by selectively exciting the first species in preference to the second species and then reacting the selectively excited first species with an additional preselected radiation, an electron or another chemical species so as to form a product having a mass different from the original species and separating the product from the balance of the mixture in a centrifugal separating device such as centrifuge or aerodynamic nozzle. In the centrifuge the isotopic mixture is passed into a rotor where it is irradiated through a window. Heavier and lighter components can be withdrawn. The irradiated mixture experiences a large centrifugal force and is separated in a deflection area into lighter and heavier components. (UK)

  7. Safe Sleep for Babies

    Science.gov (United States)

    ... 5 MB] Read the MMWR Science Clips Safe Sleep for Babies Eliminating hazards Recommend on Facebook Tweet ... Page Problem Every year, there are thousands of sleep-related deaths among babies. View large image and ...

  8. Safe operating envelope

    Energy Technology Data Exchange (ETDEWEB)

    Oliva, N [Ontario Hydro, Toronto, ON (Canada)

    1997-12-01

    Safe Operating Envelope is described representing: The outer bound of plant conditions within which day-to-day plant operation must be maintained in order to comply with regulatory requirements, associated safety design criteria and corporate nuclear safety goals. Figs.

  9. The first safe country

    Directory of Open Access Journals (Sweden)

    Raffaela Puggioni

    2012-06-01

    Full Text Available The Dublin II Regulation makes the first safe country of refuge solelyresponsible for refugees and asylum seekers. In the case of Italy, thefirst responsible country has not been acting responsibly.

  10. Buying & Using Medicine Safely

    Science.gov (United States)

    ... Reducers Safe Daily Use of Aspirin Medication Health Fraud Resources for You FDA Consumer Updates (Drugs) Page ... feeds Follow FDA on Twitter Follow FDA on Facebook View FDA videos on YouTube View FDA photos ...

  11. Karate: Keep It Safe.

    Science.gov (United States)

    Jordan, David

    1981-01-01

    Safety guidelines for each phase of a karate practice session are presented to provide an accident-free and safe environment for teaching karate in a physical education or traditional karate training program. (JMF)

  12. Safe operating envelope

    International Nuclear Information System (INIS)

    Oliva, N.

    1997-01-01

    Safe Operating Envelope is described representing: The outer bound of plant conditions within which day-to-day plant operation must be maintained in order to comply with regulatory requirements, associated safety design criteria and corporate nuclear safety goals. Figs

  13. Safe driving for teens

    Science.gov (United States)

    Driving and teenagers; Teens and safe driving; Automobile safety - teenage drivers ... months before taking friends as passengers. Teenage-related driving deaths occur more often in certain conditions. OTHER SAFETY TIPS FOR TEENS Reckless driving is still a ...

  14. Removing Hair Safely

    Science.gov (United States)

    ... For Consumers Home For Consumers Consumer Updates Removing Hair Safely Share Tweet Linkedin Pin it More sharing ... related to common methods of hair removal. Laser Hair Removal In this method, a laser destroys hair ...

  15. Medications: Using Them Safely

    Science.gov (United States)

    ... to Safely Give Ibuprofen Childproofing and Preventing Household Accidents Medicines for Diabetes Complementary and Alternative Medicine How Do Pain Relievers Work? What Medicines Are and What They Do Medicines ...

  16. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  17. DroidSafe

    Science.gov (United States)

    2016-12-01

    Massachusetts Avenue, Build E19-750 Cambridge , MA 02139-4307 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS...Activity objects illustrating the challenges of points-to and information flow analysis...measure how many malicious flows Droid- Safe was able to detect). As these results illustrate , DroidSafe implements an analysis of unprece- dented

  18. Safe biodegradable fluorescent particles

    Science.gov (United States)

    Martin, Sue I [Berkeley, CA; Fergenson, David P [Alamo, CA; Srivastava, Abneesh [Santa Clara, CA; Bogan, Michael J [Dublin, CA; Riot, Vincent J [Oakland, CA; Frank, Matthias [Oakland, CA

    2010-08-24

    A human-safe fluorescence particle that can be used for fluorescence detection instruments or act as a safe simulant for mimicking the fluorescence properties of microorganisms. The particle comprises a non-biological carrier and natural fluorophores encapsulated in the non-biological carrier. By doping biodegradable-polymer drug delivery microspheres with natural or synthetic fluorophores, the desired fluorescence can be attained or biological organisms can be simulated without the associated risks and logistical difficulties of live microorganisms.

  19. Container for hydrogen isotopes

    Energy Technology Data Exchange (ETDEWEB)

    1976-01-12

    A container is described for storage, shipping and and dispensing of hydrogen isotopes such as hydrogen, deuterium, tritium, or mixtures of the same. The container is compact, safe against fracture or accident, and is reusable. It consists of an outer housing with suitable inlet and outlet openings and electrical feed elements, the housing containing an activated sorber material in the form, for example of titanium sponge or an activated zirconium aluminate cartridge. The gas to be stored is introduced into the chamber under conditions of heat and vacuum and is retained in the sorber material. Subsequently, it may be released by heating the unit to drive off the stored gas at desired rates.

  20. Container for hydrogen isotopes

    International Nuclear Information System (INIS)

    1976-01-01

    A container is described for storage, shipping and and dispensing of hydrogen isotopes such as hydrogen, deuterium, tritium, or mixtures of the same. The container is compact, safe against fracture or accident, and is reusable. It consists of an outer housing with suitable inlet and outlet openings and electrical feed elements, the housing containing an activated sorber material in the form, for example of titanium sponge or an activated zirconium aluminate cartridge. The gas to be stored is introduced into the chamber under conditions of heat and vacuum and is retained in the sorber material. Subsequently, it may be released by heating the unit to drive off the stored gas at desired rates

  1. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  2. Learning with Security

    Science.gov (United States)

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  3. Isotope angiocardiography

    International Nuclear Information System (INIS)

    Stepinska, J.; Ruzyllo, W.; Konieczny, W.

    1979-01-01

    Method of technetium isotope 99 m pass through the heart recording with the aid of radioisotope scanner connected with seriograph and computer is being presented. Preliminary tests were carried out in 26 patients with coronary disease without or with previous myocardial infarction, cardiomyopathy, ventricular septal defect and in patients with artificial mitral and aortic valves. The obtained scans were evaluated qualitatively and compared with performed later contrast X-rays of the heart. Size of the right ventricle, volume and rate of left atrial evacuation, size and contractability of left ventricle were evaluated. Similarity of direct and isotope angiocardiographs, non-invasional character and repeatability of isotope angiocardiography advocate its usefulness. (author)

  4. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  5. Leatherback Isotopes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — SWFSC is currently working on a project identifying global marine isotopes using leatherback turtles (Dermochelys coriacea) as the indicator species. We currently...

  6. Isotope Identification

    Energy Technology Data Exchange (ETDEWEB)

    Karpius, Peter Joseph [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-09-18

    The objective of this training modules is to examine the process of using gamma spectroscopy for radionuclide identification; apply pattern recognition to gamma spectra; identify methods of verifying energy calibration; and discuss potential causes of isotope misidentification.

  7. Isotope laboratories

    International Nuclear Information System (INIS)

    1978-01-01

    This report from the Dutch Ministry of Health is an advisory document concerned with isotope laboratories in hospitals, in connection with the Dutch laws for hospitals. It discusses which hospitals should have isotope laboratories and concludes that as many hospitals as possible should have small laboratories so that emergency cases can be dealt with. It divides the Netherlands into regions and suggests which hospitals should have these facilities. The questions of how big each lab. is to be, what equipment each has, how each lab. is organised, what therapeutic and diagnostic work should be carried out by each, etc. are discussed. The answers are provided by reports from working groups for in vivo diagnostics, in vitro diagnostics, therapy, and safety and their results form the criteria for the licences of isotope labs. The results of a questionnaire for isotope labs. already in the Netherlands are presented, and their activities outlined. (C.F.)

  8. Isotopic chirality

    Energy Technology Data Exchange (ETDEWEB)

    Floss, H.G. [Univ. of Washington, Seattle, WA (United States)

    1994-12-01

    This paper deals with compounds that are chiral-at least in part, due to isotope substitution-and their use in tracing the steric course of enzyme reaction in vitro and in vivo. There are other applications of isotopically chiral compounds (for example, in analyzing the steric course of nonenzymatic reactions and in probing the conformation of biomolecules) that are important but they will not be discussed in this context.

  9. Isotopic separation

    International Nuclear Information System (INIS)

    Chen, C.L.

    1982-01-01

    A method is described for separating isotopes in which photo-excitation of selected isotope species is used together with the reaction of the excited species with postive ions of predetermined ionization energy, other excited species, or free electrons to produce ions or ion fragments of the selected species. Ions and electrons are produced by an electrical discharge, and separation is achieved through radial ambipolar diffusion, electrostatic techniques, or magnetohydrodynamic methods

  10. Isotope enrichment

    International Nuclear Information System (INIS)

    Lydtin, H-J.; Wilden, R.J.; Severin, P.J.W.

    1978-01-01

    The isotope enrichment method described is based on the recognition that, owing to mass diffusion and thermal diffusion in the conversion of substances at a heated substrate while depositing an element or compound onto the substrate, enrichment of the element, or a compound of the element, with a lighter isotope will occur. The cycle is repeated for as many times as is necessary to obtain the degree of enrichment required

  11. THE CONSEQUENCES OF GLOBALIZATION UPON SAFE TOURISM

    Directory of Open Access Journals (Sweden)

    Svetlana Mihić

    2009-11-01

    Full Text Available Globalization, a phenomenon on the rise, is characterized by the free cross-bor- der movement of individuals, technologies, and capital. It has far- reaching consequen- ces for tourism, too, as it implies travel for leisure and business, and correspondingly, financial transfers between various nation states. Startinf from the status quo in the field, the current paper sets out to analyze the consequences and implications of globalization upon safe tourism and conduct a marketing research into the perceptions of consumers upon Serbia as a safe vacation destination for the purpose of safe tourism. Finally the research results will be presented and several solutions will be provided for improving security in tourism zones

  12. Keeping Food Safe

    Centers for Disease Control (CDC) Podcasts

    2009-05-27

    This CDC Kidtastics podcast discusses things kids and parents can do to help prevent illness by keeping food safe.  Created: 5/27/2009 by National Center for Zoonotic, Vector-Borne, and Enteric Diseases (NCZVED).   Date Released: 5/27/2009.

  13. Effective and Safe Ships

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup; Amdahl, Jørgen; Rutgersson, Olle

    1996-01-01

    A Joint Nordic Research project "Effecive and Safe Ships" is presented. The project is aiming to develop methods and tools for quantitative evaluation fo ship safety. This report is the report of the preliminary phase where the plan for the main project is developed. The objectives of the project...

  14. Are EU Banks Safe?

    NARCIS (Netherlands)

    R.J. Theissen (Roel)

    2013-01-01

    markdownabstract__Abstract__ What exactly are the rules banks are subject to, and are they fit for purpose? These are the two questions addressed in this book ‘Are EU banks safe?’ and its descriptive companion book ‘EU banking supervision’. The full rulebook on banks is difficult to find

  15. The safe home project.

    Science.gov (United States)

    Arphorn, Sara; Jiraniratisai, Sopaphan; Rungtakul, Rungsri; Phutta, Nikom

    2011-12-01

    The Thai Health Promotion Foundation supported the Improvement of Quality of Life of Informal Workers project in Ban Luang District, Amphur Photaram, Ratchaburi Province. There were many informal workers in Ban Luang District. Sweet-crispy fish producers in Ban Luang were the largest group among the sweet-crispy fish producers in Thailand. This project was aimed at improving living and working conditions of informal workers, with a focus on the sweet-crispy fish group. Good practices of improved living and working conditions were used to help informal workers build safe, healthy and productive work environments. These informal workers often worked in substandard conditions and were exposed to various hazards in the working area. These hazards included risk of exposure to hot work environment, ergonomics-related injuries, chemical hazards, electrical hazards etc. Ergonomics problems were commonly in the sweet-crispy fish group. Unnatural postures such as prolonged sitting were performed dominantly. One hundred and fifty informal workers participated in this project. Occupational health volunteers were selected to encourage occupational health and safety in four groups of informal workers in 2009. The occupational health volunteers trained in 2008 were farmers, beauty salon workers and doll makers. The occupational health and safety knowledge is extended to a new informal worker group: sweet-crispy fish producer, in 2009. The occupational health and safety training for sweet-crispy fish group is conducted by occupational health volunteers. The occupational health volunteers increased their skills and knowledge assist in to make safe home and safe community through participatory oriented training. The improvement of living and working condition is conducted by using a modified WISH, Work Improvement for Safe Home, checklist. The plans of improvement were recorded. The informal workers showed improvement mostly on material handling and storage. The safe uses and safe

  16. Isotopes Project

    International Nuclear Information System (INIS)

    Dairiki, J.M.; Browne, E.; Firestone, R.B.; Lederer, C.M.; Shirley, V.S.

    1984-01-01

    The Isotopes Project compiles and evaluates nuclear structure and decay data and disseminates these data to the scientific community. From 1940-1978 the Project had as its main objective the production of the Table of Isotopes. Since publication of the seventh (and last) edition in 1978, the group now coordinates its nuclear data evaluation efforts with those of other data centers via national and international nuclear data networks. The group is currently responsible for the evaluation of mass chains A = 167-194. All evaluated data are entered into the International Evaluated Nuclear Structure Data File (ENSDF) and are published in Nuclear Data Sheets. In addition to the evaluation effort, the Isotopes Project is responsible for production of the Radioactivity Handbook

  17. Isotope production

    Energy Technology Data Exchange (ETDEWEB)

    Lewis, Dewi M.

    1995-07-15

    Some 2 0% of patients using radiopharmaceuticals receive injections of materials produced by cyclotrons. There are over 200 cyclotrons worldwide; around 35 are operated by commercial companies solely for the production of radio-pharmaceuticals with another 25 accelerators producing medically useful isotopes. These neutron-deficient isotopes are usually produced by proton bombardment. All commonly used medical isotopes can be generated by 'compact' cyclotrons with energies up to 40 MeV and beam intensities in the range 50 to 400 microamps. Specially designed target systems contain gram-quantities of highly enriched stable isotopes as starting materials. The targets can accommodate the high power densities of the proton beams and are designed for automated remote handling. The complete manufacturing cycle includes large-scale target production, isotope generation by cyclotron beam bombardment, radio-chemical extraction, pharmaceutical dispensing, raw material recovery, and labelling/packaging prior to the rapid delivery of these short-lived products. All these manufacturing steps adhere to the pharmaceutical industry standards of Good Manufacturing Practice (GMP). Unlike research accelerators, commercial cyclotrons are customized 'compact' machines usually supplied by specialist companies such as IBA (Belgium), EBCO (Canada) or Scanditronix (Sweden). The design criteria for these commercial cyclotrons are - small magnet dimensions, power-efficient operation of magnet and radiofrequency systems, high intensity extracted proton beams, well defined beam size and automated computer control. Performance requirements include rapid startup and shutdown, high reliability to support the daily production of short-lived isotopes and low maintenance to minimize the radiation dose to personnel. In 1987 a major step forward in meeting these exacting industrial requirements came when IBA, together with the University of Louvain-La-Neuve in Belgium, developed the Cyclone-30

  18. Feeling safe during an inpatient hospitalization: a concept analysis.

    Science.gov (United States)

    Mollon, Deene

    2014-08-01

    This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.

  19. Safe use of nanomaterials

    CERN Multimedia

    2013-01-01

    The use of nanomaterials  is on the increase worldwide, including at CERN. The HSE Unit has established a safety guideline to inform you of the main requirements for the safe handling and disposal of nanomaterials at CERN.   A risk assessment tool has also been developed which guides the user through the process of evaluating the risk for his or her activity. Based on the calculated risk level, the tool provides a list of recommended control measures.   We would therefore like to draw your attention to: Safety Guideline C-0-0-5 - Safe handling and disposal of nanomaterials; and Safety Form C-0-0-2 - Nanomaterial Risk Assessment   You can consult all of CERN’s safety rules and guidelines here. Please contact the HSE Unit for any questions you may have.   The HSE Unit

  20. Isotopes in Hydrology, Marine Ecosystems and Climate Change Studies. Vol. I. Proceedings of an International Symposium

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-15

    Humanity is facing many water related challenges, including access to safe water, pollution of continental and coastal waters and ocean acidification, as well as the growing impact of climate change on the hydrological cycle. Many countries are confronted by increasingly stressed water resources due to rapidly growing populations, increasing agricultural and energy production demands, industrial development, and pollution. The greatest issues of the 21st century, including competition for resources and possible related conflicts, may well focus on the role of water in food and energy security. For more than 50 years, the IAEA has played a key role in advancing and promoting the development and use of isotope techniques to address global environmental issues, such as water resources assessment and management, the study of marine ecosystems, and more recently the impact of climate change. This symposium was jointly organized by theWater Resources Programme and IAEA Environment Laboratories to commemorate the 50th anniversary of the establishment of the IAEA laboratory in the P rincipality of Monaco, and represented the 13th edition of the quadrennial symposium on isotope hydrology and water resources management, which has been regularly organized by the IAEA since 1963. The main objectives of the symposium were to review the state of the art in isotope hydrology, the use of isotopes in the study of climatic systems and in marine ecosystems and to outline recent developments in the application of isotope techniques, as well as to identify future trends and developments for research and applications. The contributions submitted by the authors are included in two volumes of proceedings with editorial corrections. These proceedings are intended to serve as an aid for those using isotopes for applied problems in hydrology as well as for the research community.

  1. Isotopes in Hydrology, Marine Ecosystems and Climate Change Studies, Vol. 2. Proceedings of the International Symposium

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-15

    Humanity is facing many water related challenges, including access to safe water, pollution of continental and coastal waters and ocean acidification, as well as the growing impact of climate change on the hydrological cycle. Many countries are confronted by increasingly stressed water resources due to rapidly growing populations, increasing agricultural and energy production demands, industrial development, and pollution. The greatest issues of the 21st century, including competition for resources and possible related conflicts, may well focus on the role of water in food and energy security. For more than 50 years, the IAEA has played a key role in advancing and promoting the development and use of isotope techniques to address global environmental issues, such as water resources assessment and management, the study of marine ecosystems, and more recently the impact of climate change. This symposium was jointly organized by the Water Resources Programme and IAEA Environment Laboratories to commemorate the 50th anniversary of the establishment of the IAEA laboratory in the Principality of Monaco, and represented the 13th edition of the quadrennial symposium on isotope hydrology and water resources management, which has been regularly organized by the IAEA since 1963. The main objectives of the symposium were to review the state of the art in isotope hydrology, the use of isotopes in the study of climatic systems and in marine ecosystems and to outline recent developments in the application of isotope techniques, as well as to identify future trends and developments for research and applications. The contributions submitted by the authors are included in two volumes of proceedings with editorial corrections. These proceedings are intended to serve as an aid for those using isotopes for applied problems in hydrology as well as for the research community.

  2. Isotopically modified compounds

    International Nuclear Information System (INIS)

    Kuruc, J.

    2009-01-01

    In this chapter the nomenclature of isotopically modified compounds in Slovak language is described. This chapter consists of following parts: (1) Isotopically substituted compounds; (2) Specifically isotopically labelled compounds; (3) Selectively isotopically labelled compounds; (4) Non-selectively isotopically labelled compounds; (5) Isotopically deficient compounds.

  3. Isotope generator

    International Nuclear Information System (INIS)

    1979-01-01

    The patent describes an isotope generator incorporating the possibility of stopping elution before the elution vessel is completely full. Sterile ventilation of the whole system can then occur, including of both generator reservoir and elution vessel. A sterile, and therefore pharmaceutically acceptable, elution fluid is thus obtained and the interior of the generator is not polluted with non-sterile air. (T.P.)

  4. Shielding container for radioactive isotopes

    International Nuclear Information System (INIS)

    Sumi, Tetsuo; Tosa, Masayoshi; Hatogai, Tatsuaki.

    1975-01-01

    Object: To effect opening and closing bidirectional radiation used particularly for a gamma densimeter or the like by one operation. Structure: This device comprises a rotatable shielding body for receiving radioactive isotope in the central portion thereof and having at least two radiation openings through which radiation is taken out of the isotope, and a shielding container having openings corresponding to the first mentioned radiation openings, respectively. The radioactive isotope is secured to a rotational shaft of the shielding body, and the shielding body is rotated to register the openings of the shielding container with the openings of the shielding body or to shield the openings, thereby effecting radiation and cut off of gamma ray in the bidirection by one operation. (Kamimura, M.)

  5. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  6. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  7. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  8. Escola segura Safe school

    Directory of Open Access Journals (Sweden)

    Edson Ferreira Liberal

    2005-11-01

    Full Text Available OBJETIVO: Revisão das estratégias para tornar o ambiente escolar seguro. Inicialmente os autores contextualizam a violência e os acidentes no ambiente escolar e fazem recomendações, baseadas em dados da literatura, para a implantação de escolas seguras. FONTE DE DADOS: Artigos publicados entre 1993 e 2005 na base de dados MEDLINE. Dados nacionais epidemiológicos e da literatura também foram pesquisados. SÍNTESE DOS DADOS: Há evidência crescente de que a intervenção tem múltiplos componentes. O foco político é a prática em educação em saúde com o envolvimento de toda a comunidade. O norte dessas intervenções é ajudar estudantes e toda a comunidade a adotar um comportamento seguro e saudável. As escolas estão assumindo um envolvimento crescente na promoção da saúde, prevenção de doenças e prevenção de trauma. Nesse contexto de prevenção de causas externas de morbimortalidade, é importante reconhecer o risco ambiental, locais e comportamentos de risco como favoráveis ao trauma e à violência, além de um novo conceito de acidentes como algo que possa ser evitado. CONCLUSÃO: A implementação da escola segura representa uma nova direção promissora para o trabalho preventivo baseado na escola. É importante notar que uma escola segura deve intervir não meramente na sua estrutura física, mas também torná-la tão segura quanto possível, trabalhando com a comunidade escolar por meio de educação em saúde, discutindo principalmente o comportamento saudável.OBJECTIVE: To review the strategies to make school a safe environment. The paper first addresses the social context of accidents and violence in the school environment, and makes recommendations, based on the literature data, for the implementation of safe schools. SOURCE OF DATA: Articles published between 1993 and 2005 in the MEDLINE database. Brazilian epidemiological and literature data have also been searched. SUMMARY OF THE FINDINGS: There is

  9. Safe motherhood at risk?

    Science.gov (United States)

    Thompson, A

    1996-12-01

    Health professionals' negative attitudes toward clients often exacerbate the problems women face in terms of health status and access to health care. Thus, the health professionals can themselves be obstacles to women seeking the health care they need. A key challenge to midwives, in addition to providing technically competent services, is gaining insight into the people for whom they are responsible so that childbirth traditions are treated with respect and women are offered dignity. Safe motherhood requires intersectoral collaboration. Many innovative approaches to safe motherhood are based on the community's participation in planning services that meet the needs of women. Other approaches are based on decentralization of services. For example, a large university teaching hospital in Lusaka, Zambia, set up birthing centers around the city to take the pressure off the hospital. Midwives head up these centers, which are close to the women's homes. Decentralization of delivery services has improved the physical and emotional outcomes for mothers and newborns. Midwives must be prepared to articulate concerns about inequalities and deficiencies in the health care system in order to persuade the government to change. Women, including midwives, need to form multidisciplinary alliances to work together to effect change. The front-line workers in maternity care are midwives. They should adopt the following strategies to become even more effective in their efforts to make motherhood safer. They should listen to what women say about their needs. They should scale services to a manageable, human scale. They should learn the skills to become politically active advocates. They should work with other midwives, women, leaders, and other professional groups. Motherhood can be safe when women have more control over their own decision making, the education to liberate themselves to make their own decisions, and access to skilled care.

  10. Inherently safe reactors

    International Nuclear Information System (INIS)

    Maartensson, Anders

    1992-01-01

    A rethinking of nuclear reactor safety has created proposals for new designs based on inherent and passive safety principles. Diverging interpretations of these concepts can be found. This article reviews the key features of proposed advanced power reactors. An evaluation is made of the degree of inherent safety for four different designs: the AP-600, the PIUS, the MHTGR and the PRISM. The inherent hazards of today's most common reactor principles are used as reference for the evaluation. It is concluded that claims for the new designs being inherently, naturally or passively safe are not substantiated by experience. (author)

  11. Procedures for the Safe Transport of Radioactive Material

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Lyul; Chung, K. K.; Lee, J. I.; Chang, S. Y.; Lee, T. Y

    2007-11-15

    This technical report describes the procedure and work responsibility along with the regulation and standard necessary for the safe transport of radioactive or contaminated materials. This report, therefore, can be effectively used to secure the public safety as well as to prevent the disastrous event which might be resulted from the transport process of radioactive materials by establishing a procedure and method on the safe packing, handling and transport of radioactive materials.

  12. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  13. The US national isotope program: Current status and strategy for future success

    International Nuclear Information System (INIS)

    Rivard, Mark J.; Bobek, Leo M.; Butler, Ralph A.; Garland, Marc A.; Hill, David J.; Krieger, Jeanne K.; Muckerheide, James B.; Patton, Brad D.; Silberstein, Edward B.

    2005-01-01

    Since their introduction in the 1940s, peaceful use of stable isotopes and radioisotopes in the United States has expanded continuously. Today, new isotopes for diagnostic and therapeutic uses are not being developed, critical isotopes for national security are in short supply, and demand for isotopes critical to homeland security exceeds supply. While commercial suppliers, both domestic and foreign, can only meet specific needs, the nation needs a consistent, reliable supply of radioactive and stable isotopes for research, medical, security, and space power applications. The national isotope infrastructure, defined as both facilities and trained staff at national laboratories and universities, is in danger of being lost due to chronic underfunding. With the specific recommendations given herein, the US Department of Energy may realign and refocus its Isotope Program to provide a framework for a successful National Isotope Program

  14. Safe handling of tritium

    International Nuclear Information System (INIS)

    1991-01-01

    The main objective of this publication is to provide practical guidance and recommendations on operational radiation protection aspects related to the safe handling of tritium in laboratories, industrial-scale nuclear facilities such as heavy-water reactors, tritium removal plants and fission fuel reprocessing plants, and facilities for manufacturing commercial tritium-containing devices and radiochemicals. The requirements of nuclear fusion reactors are not addressed specifically, since there is as yet no tritium handling experience with them. However, much of the material covered is expected to be relevant to them as well. Annex III briefly addresses problems in the comparatively small-scale use of tritium at universities, medical research centres and similar establishments. However, the main subject of this publication is the handling of larger quantities of tritium. Operational aspects include designing for tritium safety, safe handling practice, the selection of tritium-compatible materials and equipment, exposure assessment, monitoring, contamination control and the design and use of personal protective equipment. This publication does not address the technologies involved in tritium control and cleanup of effluents, tritium removal, or immobilization and disposal of tritium wastes, nor does it address the environmental behaviour of tritium. Refs, figs and tabs

  15. Vitamins, Are They Safe?

    Directory of Open Access Journals (Sweden)

    Hadi Hamishehkar

    2016-12-01

    Full Text Available The consumption of a daily multivitamin among people all over the world is dramatically increasing in recent years. Most of the people believe that if vitamins are not effective, at least they are safe. However, the long term health consequences of vitamins consumption are unknown. This study aimed to assess the side effects and possible harmful and detrimental properties of vitamins and to discuss whether vitamins can be used as safe health products or dietary supplements. We performed a MEDLINE/PubMed, EMBASE, Scopus and Google Scholar search and assessed reference lists of the included studies which were published from 1993 through 2015. The studies, with an emphasis on RCTs (randomized controlled clinical trials, were reviewed. As some vitamins such as fat-soluble vitamins (vitamin A, vitamin D, vitamin E, and also some of the water-soluble vitamins like folic acid may cause adverse events and some like vitamin C is widely taken assuming that it has so many benefits and no harm, we included relevant studies with negative or undesired results regarding the effect of these vitamins on health. Our recommendation is that taking high-dose supplements of vitamins A, E, D, C, and folic acid is not always effective for prevention of disease, and it can even be harmful to the health.

  16. Cool and Safe: Multiplicity in Safe Innovation at Unilever

    Science.gov (United States)

    Penders, Bart

    2011-01-01

    This article presents the making of a safe innovation: the application of ice structuring protein (ISP) in edible ices. It argues that safety is not the absence of risk but is an active accomplishment; innovations are not "made safe afterward" but "safe innovations are made". Furthermore, there are multiple safeties to be accomplished in the…

  17. Better Safe than Sorry

    DEFF Research Database (Denmark)

    Justesen, Mogens Kamp

    2014-01-01

    A growing literature argues that division of powers matter for economic growth by increasing the security of property rights. However, less effort has been devoted to examining the political and institutional conditions under which property rights have economic effects. This paper emphasizes...... that the economic effects of property rights depend on the division of powers between veto players, meaning that the interaction of veto players and property rights matters for economic growth. This argument is tested empirically on a panel of developing countries. The results show that the economic effects...

  18. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-08-01

    An automated approach to facility safeguards effectiveness evaluation has been developed. This automated process, called Safeguards Automated Facility Evaluation (SAFE), consists of a collection of a continuous stream of operational modules for facility characterization, the selection of critical paths, and the evaluation of safeguards effectiveness along these paths. The technique has been implemented on an interactive computer time-sharing system and makes use of computer graphics for the processing and presentation of information. Using this technique, a comprehensive evaluation of a safeguards system can be provided by systematically varying the parameters that characterize the physical protection components of a facility to reflect the perceived adversary attributes and strategy, environmental conditions, and site operational conditions. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  19. Isotope hydrology

    International Nuclear Information System (INIS)

    Drost, W.

    1978-01-01

    The International Symposium on Isotope Hydrology was jointly organized by the IAEA and UNESCO, in co-operation with the National Committee of the Federal Republic of Germany for the International Hydrological Programme (IHP) and the Gesellschaft fuer Strahlen- und Umweltforschung mbH (GSF). Upon the invitation of the Federal Republic of Germany the Symposium was held from 19-23 June 1978 in Neuherberg on the GSF campus. The Symposium was officially opened by Mr. S. Eklund, Director General of the IAEA. The symposium - the fifth meeting held on isotope hydrology - was attended by over 160 participants from 44 countries and four international organizations and by about 30 observers from the Federal Republic of Germany. Due to the absence of scientists from the USSR five papers were cancelled and therefore only 46 papers of the original programme were presented in ten sessions

  20. Container for hydrogen isotopes

    International Nuclear Information System (INIS)

    Solomon, D.E.

    1977-01-01

    A container for the storage, shipping and dispensing of hydrogen isotopes such as hydrogen, deuterium, tritium, or mixtures of the same which has compactness, which is safe against fracture or accident, and which is reusable is described. The container consists of an outer housing with suitable inlet and outlet openings and electrical feed elements, the housing containing an activated sorber material in the form, for example, of titanium sponge or an activated zirconium aluminate cartridge. The gas to be stored is introduced into the chamber under conditions of heat and vacuum and will be retained in the sorber material. Subsequently, it may be released by heating the unit to drive off the stored gas at desired rates

  1. Radio-isotopic tracers

    International Nuclear Information System (INIS)

    Wolfangel, R.G.

    1976-01-01

    The invention concerns the dispersions that may be used for preparing radio-isotopic tracers, technetium labelled dispersions, processes for preparing these dispersions and their use as tracers. Technetium 99m sulphur colloids are utilized as scintillation tracers to give a picture of the reticulo-endothelial system, particularly the liver and spleen. A dispersion is provided which only requires the addition of a radioactive nuclide to form a radioactively labelled dispersion that can be injected as a tracer. It is formed of a colloid of tin sulphur dispersed in an aqueous buffer solution. Such a reagent has the advantage of being safe and reliable and is easier to use. The colloid can be prepared more quickly since additions of several different reagents are avoided. There is no need to heat up and no sulphuretted hydrogen, which is a toxic gas, is used [fr

  2. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  3. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  4. Safe pill-dispensing.

    Science.gov (United States)

    Testa, Massimiliano; Pollard, John

    2007-01-01

    Each patient is supplied with a smart-card containing a Radio Frequency IDentification (RFID) chip storing a unique identification code. The patient places the Smart-card on a pill-dispenser unit containing an RFID reader. The RFID chip is read and the code sent to a Base-station via a wireless Bluetooth link. A database containing both patient details and treatment information is queried at the Base-station using the RFID as the search key. The patient's treatment data (i.e., drug names, quantities, time, etc.) are retrieved and sent back to the pill-dispenser unit via Bluetooth. Appropriate quantities of the required medications are automatically dispensed, unless the patient has already taken his/her daily dose. Safe, confidential communication and operation is ensured.

  5. A safe workplace

    International Nuclear Information System (INIS)

    Rittsel, Hans; Andersson, Bengt A.

    1993-01-01

    Full text: The video 'A safe workplace' has been produced by ABB Atom in order to create a tool for showing different target audiences that ABB Atom Nuclear Fuel Production Plant is a safe workplace and to 'de-mystify' nuclear fuel production. The main target audiences are visitor groups and employees of the company, but the video also qualifies for use as an information tool for other target groups who ask for a proper explanation of the way nuclear fuel is produced. The summarized content of the video is as follows: All individual steps of the production process are described with focus on the safety, quality and environmental requirements. The first part shows the delivery of UF 6 (uranium hexafluoride) to the plant and the following process for the conversion to UO 2 (uranium dioxide). The conversion method used is wet conversion that includes evaporation, precipitation, filtration, washing, reduction and stabilization. The next part is a description of the fuel pellet manufacture including uranium oxide blending, pellet pressing, sintering, grinding and a final visual inspection. A separate part, describing the manufacture of fuel pellets with a burnable neutron absorber, is included. The third part shows how to produce fuel rods and complete assemblies. Some of the moments of quality supervision that support the entire manufacturing process are also shown. The last part of the video comprises a brief description of the manufacture of fuel channels and other reactor core components like control rods. The video is produced with a Swedish spoken narrative. The playing time is 15 minutes. The video will be delivered with a text printed in English and copies reproduced in the PAL/VHS system may be ordered from ABB Atom Communication Dept. telefax no +4621-11 41 90, at the price of USD 100.- or SEK 750.- each. (author)

  6. Strategies for safe motherhood.

    Science.gov (United States)

    Chatterjee, A

    1995-02-01

    The Safe Motherhood Initiative was launched in 1988 as a global effort to halve maternal mortality and morbidity by the year 2000. The program uses a combination of health and nonhealth strategies to emphasize the need for maternal health services, extend family planning services, and improve the status of women. The maternal mortality rate (per 100,000 live births) is 390 for the world, 20-30 for developed countries, 450 for developing countries, and 420 for Asia. This translates into 308,000 maternal deaths in Asia, of which 100,000 occur in India. The direct causes of maternal mortality include sepsis, hemorrhage, eclampsia, and ruptured uterus. Indirect causes occur when associated medical conditions, such as anemia and jaundice, are exacerbated by pregnancy. Underlying causes are ineffective health services, inadequate obstetric care, unregulated fertility, infections, illiteracy, early marriage, poverty, malnutrition, and ignorance. India's Child Survival and Safe Motherhood Program seeks to achieve immediate improvements by improving health care. Longterm improvements will occur as nutrition, income, education, and the status of women improve. Improvements in health care will occur in through the provision of 1) essential obstetric care for all women (which will be essentially designed for low-risk women), 2) early detection of complications during pregnancy and labor, and 3) emergency services. Services will be provided to pregnant women at their door by field staff, at a first referral hospital, perhaps at maternity villages where high risk cases can be housed in the latter part of their pregnancies, and through the continual accessibility of government vehicles. In addition, family planning services will be improved so that fertility regulation can have its expected beneficial effect on the maternal mortality rate. The professional health organizations in India will also play a vital role in the success of this effort to reduce maternal mortality.

  7. Isotopes in agriculture

    International Nuclear Information System (INIS)

    1983-01-01

    Part 1: The stable isotope of nitrogen 15N has become widely used as tracer in agriculture, medicine and biology research. The film gives an overview of the sample preparation and analytical procedures followed in the analysis of the nitrogen isotopic composition (14N/15N ratio) by optical emission spectrometry at the Seibersdorf Laboratory. The subsampling of plant material and the several steps of chemical pretreatment such as Kjeldahl digestion, distillation, titration and adjustment of the proper N concentration in the extract are demonstrated. The preparation of the discharge tubes is shown in detail. Final measurement of the 14N/15N ratio is carried out with the NOI-5 and JASCO emission spectrometers. Part 2: This training film deals with the use of 32P-labelled materials in field and greenhouse experimentation in soil-plant relationships studies. All technical aspects, including safe handling and radiation protection procedures to be considered in the layout and harvesting of field experiments are documented in detail. Procedures followed up in the evaluation of P fertilizers such as rock phosphates under greenhouse conditions are described. Several soil injection techniques available for determination of the root activity pattern of trees are shown

  8. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2005-01-01

    .... One avenue of language-based work produced Cyclone, a type-safe variant of C. The Cyclone language retains the familiar syntax and semantics of C code, but provides the strong security guarantees of modem languages such as Java...

  9. Securing the safety of our most precious cargo: SAFE KIDS.

    Science.gov (United States)

    Vick, Judith W

    2010-01-01

    There are staggering and tragic statistics involving children, car seats, and motor vehicle accidents. According to the Centers for Disease Control and Prevention, motor vehicle injuries are the leading cause of death among children from 0 to 15 years of age, and in the United States during 2005, 1,335 children ages 14 years and younger died as occupants in motor vehicle accidents; approximately 184,000 were injured. That is an average of 4 deaths and 504 injuries each day. National Highway Traffic Safety Administration (NHTSA) statistics show that nearly one-half of deaths and injuries in children occurred because they were not properly restrained. Child safety seats and safety belts, when installed and used properly, can prevent injuries and save lives. Among children under age 5, an estimated 425 lives were saved in 2006 by child restraint use. Research on the effectiveness of child safety seats has found them to reduce fatal injury by 71% for infants, and by 54% for toddlers in passenger cars. This article discusses the need for increased education of parents and healthcare professionals about selection and installation of car safety restraints, and the importance of developing a child safety restraint program.

  10. Safe and secure South Africa. Vehicle landmine protection validation testing

    CSIR Research Space (South Africa)

    Reinecke, JD

    2008-11-01

    Full Text Available The objective of this paper is to provide an overview of vehicle landmine protection validation testing in South Africa. A short history of validation test standards is given, followed by a summary of current open test standards in general use...

  11. Production Situation and Technology Prospect of Medical Isotopes

    Directory of Open Access Journals (Sweden)

    GAO Feng;LIN Li;LIU Yu-hao;MA Xing-jun

    2016-10-01

    Full Text Available The isotope production technology was overviewed, including traditional and newest technology. The current situation of medical isotope production was introduced. The problems faced by isotope supply and demand were analyzed. The future development trend of medical isotopes and technology prospect were put forward. As the most populous country, nuclear medicine develops rapidly, however, domestic isotope mainly relies on imports. The highly productive and relatively safe MIPR is expected to be an effective way to breakthrough the bottleneck of the development of nuclear medicine. Traditional isotope production technologies with reactor can be improved. It's urgent to research and promote new isotope production technologies with reactor. Those technologies which do not depend on reactor will have a bright market prospects.

  12. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  13. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  14. Safe new reactor for radionuclide production

    International Nuclear Information System (INIS)

    Gray, P.L.

    1995-01-01

    In late 1995, DOE is schedule to announce a new tritium production unit. Near the end of the last NPR (New Production Reactors) program, work was directed towards eliminating risks in current designs and reducing effects of accidents. In the Heavy Water Reactor Program at Savannah River, the coolant was changed from heavy to light water. An alternative, passively safe concept uses a heavy-water-filled, zircaloy reactor calandria near the bottom of a swimming pool; the calandria is supported on a light-water-coolant inlet plenum and has upflow through assemblies in the calandria tubes. The reactor concept eliminates or reduces significantly most design basis and severe accidents that plague other deigns. The proven, current SRS tritium cycle remains intact; production within the US of medical isotopes such as Mo-99 would also be possible

  15. Safe percutaneous suprapubic catheterisation.

    Science.gov (United States)

    Goyal, N K; Goel, A; Sankhwar, S N

    2012-11-01

    We describe our technique of percutaneous suprapubic catheter insertion with special reference to steps that help to avoid common complications of haematuria and catheter misplacement. The procedure is performed using a stainless steel reusable trocar under local infiltrative anaesthesia, usually at the bedside. After clinical confirmation of a full bladder, the trocar is advanced into the bladder through a skin incision. Once the bladder is entered, the obturator is removed and the assistant inserts a Foley catheter followed by rapid balloon inflation. Slight traction is applied to the catheter for about five minutes. Patients with previous lower abdominal surgery, an inadequately distended bladder or acute pelvic trauma do not undergo suprapubic catheterisation using this method. The procedure was performed in 72 men (mean age: 42.4 years, range: 18-78 years) with urinary retention with a palpable bladder. The average duration of the procedure was less than five minutes. No complications were noted in any of the patients. Trocar suprapubic catheter insertion is a safe and effective bedside procedure for emergency bladder drainage and can be performed by resident surgeons. The common complications associated with the procedure can be avoided with a few careful steps.

  16. Making Our Food Safe

    International Nuclear Information System (INIS)

    Madsen, Michael

    2013-01-01

    Full text: As civilization has progressed societies have strived to make food safer; from using fire to cook our food, and boiling our water to make it safe to drink, advances in technology have helped kill microorganisms that can make food unsafe. The FAO/IAEA Joint Division helps provide technical assistance to Member States that want to implement irradiation technology in making their food safer. Food and waterborne diarrhoeal diseases are estimated to kill roughly 2.2 million people annually, of which 1.9 million are children. Irradiating some of the foods we eat can save many of these lives by reducing the risk of food poisoning and killing the organisms that cause disease. Irradiation works by treating food with a small dose of ionizing radiation, this radiation disrupts the bacteria’s DNA and cell membranes structure stopping the organism from reproducing or functioning, but does not make the food radioactive. It can be applied to a variety of foods from spices and seasonings, to fruits and vegetables and is similar to pasteurization, but without the need for high temperatures that might impair food quality. (author)

  17. Safe Handling of Radioisotopes

    International Nuclear Information System (INIS)

    1958-01-01

    Under its Statute the International Atomic Energy Agency is empowered to provide for the application of standards of safety for protection against radiation to its own operations and to operations making use of assistance provided by it or with which it is otherwise directly associated. To this end authorities receiving such assistance are required to observe relevant health and safety measures prescribed by the Agency. As a first step, it has been considered an urgent task to provide users of radioisotopes with a manual of practice for the safe handling of these substances. Such a manual is presented here and represents the first of a series of manuals and codes to be issued by the Agency. It has been prepared after careful consideration of existing national and international codes of radiation safety, by a group of international experts and in consultation with other international bodies. At the same time it is recommended that the manual be taken into account as a basic reference document by Member States of the Agency in the preparation of national health and safety documents covering the use of radioisotopes.

  18. OPINION: Safe exponential manufacturing

    Science.gov (United States)

    Phoenix, Chris; Drexler, Eric

    2004-08-01

    In 1959, Richard Feynman pointed out that nanometre-scale machines could be built and operated, and that the precision inherent in molecular construction would make it easy to build multiple identical copies. This raised the possibility of exponential manufacturing, in which production systems could rapidly and cheaply increase their productive capacity, which in turn suggested the possibility of destructive runaway self-replication. Early proposals for artificial nanomachinery focused on small self-replicating machines, discussing their potential productivity and their potential destructiveness if abused. In the light of controversy regarding scenarios based on runaway replication (so-called 'grey goo'), a review of current thinking regarding nanotechnology-based manufacturing is in order. Nanotechnology-based fabrication can be thoroughly non-biological and inherently safe: such systems need have no ability to move about, use natural resources, or undergo incremental mutation. Moreover, self-replication is unnecessary: the development and use of highly productive systems of nanomachinery (nanofactories) need not involve the construction of autonomous self-replicating nanomachines. Accordingly, the construction of anything resembling a dangerous self-replicating nanomachine can and should be prohibited. Although advanced nanotechnologies could (with great difficulty and little incentive) be used to build such devices, other concerns present greater problems. Since weapon systems will be both easier to build and more likely to draw investment, the potential for dangerous systems is best considered in the context of military competition and arms control.

  19. Aflatoxins & Safe Storage

    Directory of Open Access Journals (Sweden)

    Philippe eVillers

    2014-04-01

    Full Text Available The paper examines both field experience and research on the prevention of the exponential growth of aflatoxins during multi-month post harvest storage in hot, humid countries. The approach described is the application of modern safe storage methods using flexible, Ultra Hermetic™ structures that create an unbreatheable atmosphere through insect and microorganism respiration alone, without use of chemicals, fumigants, or pumps. Laboratory and field data are cited and specific examples are given describing the uses of Ultra Hermetic storage to prevent the growth of aflatoxins with their significant public health consequences. Also discussed is the presently limited quantitative information on the relative occurrence of excessive levels of aflatoxin (>20 ppb before versus after multi-month storage of such crops as maize, rice and peanuts when under high humidity, high temperature conditions and, consequently, the need for further research to determine the frequency at which excessive aflatoxin levels are reached in the field versus after months of post-harvest storage. The significant work being done to reduce aflatoxin levels in the field is mentioned, as well as its probable implications on post harvest storage. Also described is why, with some crops such as peanuts, using Ultra Hermetic storage may require injection of carbon dioxide or use of an oxygen absorber as an accelerant. The case of peanuts is discussed and experimental data is described.

  20. EUROSAFE forum 2013. Safe disposal of nuclear waste

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    The proceedings of the EUROSAFE forum 2013 - safe disposal of nuclear waste include contributions to the following topics: Nuclear installation safety - assessment; nuclear installation safety - research; waste and decommissioning - dismantling; radiation protection, 3nvironment and emergency preparedness; security of nuclear installations and materials.

  1. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.

  2. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  3. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  4. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  5. Natural isotopes

    International Nuclear Information System (INIS)

    Vogel, J.C.

    1986-01-01

    14 C dates between 600 and 900 AD were obtained for early Iron Age sites in Natal, and from 1300 to 1450 AD for rock engraving sites in Bushmanland. Palaeoenvironmental data derived from the dating of samples related to sedimentary and geomorphic features in the central and northern Namib Desert enabled the production of a tentative graph for the changes in humidity in the region over the past 40000 years. These results suggest that relatively humid conditions came to an end in the Namib at ±25000 BP (before present). The increased precision of the SIRA mass spectrometer enabled the remeasurement of 13 C and 18 O in the Cango stalagmite. This data confirmed that the environmental temperatures in the Southern Cape remained constant to within ±1 o C during the past 5500 years. Techniques and applications for environmental isotopes in hydrology were developed to determine the origin and movement of ground water. Isotopic fractionation effects in light elements in nature were investigated. The 15 N/ 14 N ratio in bones of animals and humans increases in proportion to the aridity of the environment. This suggests that 15 N in bone from dated archaeological sites could be used to detect changes in past climatic conditions as naturally formed nitrate minerals are higly soluble and are only preserved in special, very dry environments. The sources and sinks of CO 2 on the South African subcontinent were also determined. The 13 C/ 12 C ratios of air CO 2 obtained suggest that the vegetation provides the major proportion of respired CO 2 . 9 refs., 1 fig

  6. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  7. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  8. Stable isotope studies

    International Nuclear Information System (INIS)

    Ishida, T.

    1992-01-01

    The research has been in four general areas: (1) correlation of isotope effects with molecular forces and molecular structures, (2) correlation of zero-point energy and its isotope effects with molecular structure and molecular forces, (3) vapor pressure isotope effects, and (4) fractionation of stable isotopes. 73 refs, 38 figs, 29 tabs

  9. Method for separating isotopes

    International Nuclear Information System (INIS)

    Jepson, B.E.

    1975-01-01

    Isotopes are separated by contacting a feed solution containing the isotopes with a cyclic polyether wherein a complex of one isotope is formed with the cyclic polyether, the cyclic polyether complex is extracted from the feed solution, and the isotope is thereafter separated from the cyclic polyether

  10. Safe Minimum Internal Temperature Chart

    Science.gov (United States)

    ... Internal Temperature Chart Safe steps in food handling, cooking, and storage are essential in preventing foodborne illness. You can't see, smell, or taste harmful bacteria that may cause illness. In every step of food preparation, follow the four guidelines to keep food safe: ...

  11. More than a Safe Space

    Science.gov (United States)

    Sadowski, Michael

    2016-01-01

    Over the past three decades, much of the conversation about LGBTQ students in schools has centered on safety--anti-bullying policies, the "safe space" of gay-straight alliances, and "safe zones" marked by rainbow-colored stickers on classroom doors. In this article, Michael Sadowski argues that it's time to move beyond safety…

  12. Staying Safe in the Water

    Centers for Disease Control (CDC) Podcasts

    In this podcast, Dr. Julie Gilchrist, a pediatrician and medical epidemiologist from CDC’s Injury Center, talks about staying safe in the water. Tips are for all audiences, with a focus on preventing drownings and keeping children safe in and around the pool, lake, or ocean.

  13. Safe Configuration of TLS Connections

    Science.gov (United States)

    2013-10-16

    comparison with observed flows to flag inconsistencies. Keywords: Transport Layer Security ( TLS ), Secure Socket Layer ( SSL ), configuration, secure...servers. SSL / TLS has evolved over 18 years from SSL 1.0 to TLS 1.2 and has been widely deployed and accepted across Internet servers. This has made...and provides a large-scale view of TLS properties across Internet web sites. The guidance provided in [10] describes best practices for SSL / TLS

  14. Safe Anesthesia For Every Tot

    DEFF Research Database (Denmark)

    Weiss, Markus; Vutskits, Laszlo; Hansen, Tom G

    2015-01-01

    PURPOSE OF REVIEW: The term 'safe use of anesthesia in children is ill-defined and requires definition of and focus on the 'safe conduct of pediatric anesthesia'. RECENT FINDINGS: The Safe Anesthesia For Every Tot initiative (www.safetots.org) has been set up during the last year to focus...... on the safe conduct of pediatric anesthesia. This initiative aims to provide guidance on markers of quality anesthesia care. The introduction and implementation of national regulations of 'who, where, when and how' are required and will result in an improved perioperative outcome in vulnerable children....... The improvement of teaching, training, education and supervision of the safe conduct of pediatric anesthesia are the main goals of the safetots.org initiative. SUMMARY: This initiative addresses the well known perioperative risks in young children, perioperative causes for cerebral morbidity as well as gaps...

  15. Method for separating isotopes

    International Nuclear Information System (INIS)

    Jepson, B.E.

    1976-01-01

    The invention comprises a method for separating different isotopes of elements from each other by contacting a feed solution containing the different isotopes with a macrocyclic polyether to preferentially form a macrocyclic polyether complex with the lighter of the different isotopes. The macrocyclic polyether complex is then separated from the lighter isotope depleted feed solution. A chemical separation of isotopes is carried out in which a constant refluxing system permits a continuous countercurrent liquid-liquid extraction. (LL)

  16. Method for separating isotopes

    International Nuclear Information System (INIS)

    Schlenker, R.F.

    1978-01-01

    A vortex tube for separating isotopes is described. A gas mixture containing the isotopic molecules enters the vortex tube under pressure and is separated into a hot discharge flow stream and a cold discharge flow stream. The hot discharge is enriched in lighter isotopic molecules whereas the cold discharge flow stream is enriched in the heavier isotopic molecules. The vortex tube can be used in a single stage or multistage isotope separation apparatus

  17. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  18. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  19. Surveillance and Maintenance Plan for the 105-C Reactor Safe Storage Enclosure

    International Nuclear Information System (INIS)

    Logan, T. E.

    1998-01-01

    This document provides a plan for implementing surveillance and maintenance activities to ensure that the 105-C Reactor Safe Storage Enclosure is maintained in a safe, environmentally secure, and cost-effective manner until subsequent closure during the final disposition phase of decommissioning

  20. 75 FR 81556 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2010-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... the public on recommendations for developing new or revised safe harbors and Special Fraud Alerts...

  1. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2012-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  2. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2013-12-27

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  3. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  4. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  5. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  6. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  7. Isotope cloud linked to failed neutrino source

    Science.gov (United States)

    Cartlidge, Edwin

    2018-02-01

    For 2 weeks in the fall of 2017, traces of the isotope ruthenium-106 wafted across Europe. The radioactive cloud was too thin to be dangerous, but it posed a mystery to scientists. Now, researchers at the French Institute of Radioprotection and Nuclear Security say the isotope may have been released from the Mayak nuclear facility in southern Russia. They argue the leak may have happened when technicians botched the fabrication of a cerium-144 source needed in the search for sterile neutrinos at the Gran Sasso National Laboratory in L'Aquila, Italy. The Russian government has vehemently denied that an accident took place, however.

  8. Indoor Tanning Is Not Safe

    Science.gov (United States)

    ... the sun is by using these tips for skin cancer prevention. Indoor tanning is not a safe way to get vitamin ... to previous findings on the association between indoor tanning and skin cancer. Only a small number of people reported ...

  9. Alcohol use and safe drinking

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/001944.htm Alcohol use and safe drinking To use the sharing features on this page, please enable JavaScript. Alcohol use involves drinking beer, wine, or hard liquor. ...

  10. Dukovany NPP - Safely 16 TERA

    International Nuclear Information System (INIS)

    Vlcek, J.

    2008-01-01

    In this presentation increasing of power output of the Dukovany NPP is reviewed. To operate all Dukovany Units safely with the perspective of long-term operation (LTO) of 50 - 60 years it is proposed.

  11. Safe drinking during cancer treatment

    Science.gov (United States)

    ... ency/patientinstructions/000060.htm Drinking water safely during cancer treatment To use the sharing features on this page, please enable JavaScript. During and right after your cancer treatment, your body may not be able to protect ...

  12. Safe handling of radiation sources

    International Nuclear Information System (INIS)

    Abd Nasir Ibrahim; Azali Muhammad; Ab Razak Hamzah; Abd Aziz Mohamed; Mohammad Pauzi Ismail

    2004-01-01

    This chapter discussed the subjects related to the safe handling of radiation sources: type of radiation sources, method of use: transport within premises, transport outside premises; Disposal of Gamma Sources

  13. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  14. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  15. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  16. Towards Safe Robotic Surgical Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer; Wisniewski, Rafael

    2015-01-01

    a controller for motion compensation in beating-heart surgery, and prove that it is safe, i.e., the surgical tool is kept within an allowable distance and orientation of the heart. We solve the problem by simultaneously finding a control law and a barrier function. The motion compensation system is simulated...... from several initial conditions to demonstrate that the designed control system is safe for every admissible initial condition....

  17. Safe use of ionizing radiations

    Energy Technology Data Exchange (ETDEWEB)

    1973-01-01

    Based on the ''Code of Practice for the protection of persons against ionizing radiations arising from medical and dental use'' (CIS 74-423), this handbook shows how hospital staff can avoid exposing themselves and others to these hazards. It is designed particularly for junior and student nurses. Contents: ionizing radiations, their types and characteristics; their uses and dangers; basic principles in their safe use; safe use in practice; explanation of terms.

  18. Staying Safe in the Water

    Centers for Disease Control (CDC) Podcasts

    2008-05-15

    In this podcast, Dr. Julie Gilchrist, a pediatrician and medical epidemiologist from CDC’s Injury Center, talks about staying safe in the water. Tips are for all audiences, with a focus on preventing drownings and keeping children safe in and around the pool, lake, or ocean.  Created: 5/15/2008 by National Center for Injury Prevention and Control (NCIPC).   Date Released: 5/19/2008.

  19. Isotope puzzle in sputtering

    International Nuclear Information System (INIS)

    Zheng Liping

    1998-01-01

    Mechanisms affecting multicomponent material sputtering are complex. Isotope sputtering is the simplest in the multicomponent materials sputtering. Although only mass effect plays a dominant role in the isotope sputtering, there is still an isotope puzzle in sputtering by ion bombardment. The major arguments are as follows: (1) At the zero fluence, is the isotope enrichment ejection-angle-independent or ejection-angle-dependent? (2) Is the isotope angular effect the primary or the secondary sputter effect? (3) How to understand the action of momentum asymmetry in collision cascade on the isotope sputtering?

  20. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  1. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  2. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  3. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  4. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  5. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  6. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  7. Isotopically exchangeable phosphorus

    International Nuclear Information System (INIS)

    Barbaro, N.O.

    1984-01-01

    A critique revision of isotope dilution is presented. The concepts and use of exchangeable phosphorus, the phosphate adsorption, the kinetics of isotopic exchange and the equilibrium time in soils are discussed. (M.A.C.) [pt

  8. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  9. Optical isotope shifts for unstable samarium isotopes

    International Nuclear Information System (INIS)

    Eastham, D.A.; Walker, P.M.; Griffith, J.A.R.; Evans, D.E.; Grant, I.S.; England, J.G.; Fawcett, M.J.

    1984-01-01

    Using a tunable dye laser beam intersecting a thermal atomic beam, optical isotope shifts and hyperfine splittings have been measured for the four unstable samarium isotopes between 144 Sm and 154 Sm, covering the well known transition region from spherical to deformed shapes. (orig.)

  10. LACK OF AWARENESS ABOUT SAFE BLOOD IN PAKISTANI POPULATION

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2014-12-01

    Full Text Available Blood transfusion is a life saving procedure in various transfusion-dependent life threatening conditions and donation of safe blood is a prerequisite for achieving this goal. This study was designed to evaluate the awareness regarding “safe blood” in Pakistani population. This study was conducted at a large scale through a population survey. The test population was divided into two groups i.e. general population and students. The Performa was designed for a general and student population and included 20 questions related to awareness of safe blood. A total of 4900 individuals belonging to different ethnic groups were included in this population survey. Results of social survey were analyzed by using Usman and Moin awareness chart. Results of this study revealed profound unawareness about safe blood in Pakistani population. This study found lack of awareness about safe blood as a major factor that is playing a vital role in the propagation of blood borne diseases in Pakistan. To secure the recipients from blood borne complications through blood donation, it is necessary to create effective awareness about safe blood in Pakistani population.

  11. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-02-06

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.  Created: 2/6/2014 by MMWR.   Date Released: 2/6/2014.

  12. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  13. Inherently safe light water reactors

    International Nuclear Information System (INIS)

    Ise, Takeharu

    1987-01-01

    Today's large nuclear power reactors of world-wise use have been designed based on the philosophy. It seems that recent less electricity demand rates, higher capital cost and the TMI accident let us acknowledge relative small and simplified nuclear plants with safer features, and that Chernobyl accident in 1983 underlines the needs of intrinsic and passive safety characteristics. In such background, several inherently safe reactor concepts have been presented abroad and domestically. First describing 'Can inherently safe reactors be designed,' then I introduce representative reactor concepts of inherently safe LWRs advocated abroad so far. All of these innovative reactors employ intrinsic and passive features in their design, as follows: (1) PIUS, an acronym for Process Inherent Ultimate Safety, or an integral PWR with passive heat sink and passive shutdown mechanism, advocated by ASEA-ATOM of Sweden. (2) MAP(Minimum Attention Plant), or a self-pressurized, natural circulation integral PWR, promoted by CE Inc. of the U.S. (3) TPS(TRIGA Power System), or a compact PWR with passive heat sink and inherent fuel characteristics of large prompt temperature coefficient, prompted by GA Technologies Inc. of the U.S. (4) PIUS-BWR, or an inherently safe BWR employing passively actuated fluid valves, in competition with PIUS, prompted by ORNL of the U.S. Then, I will describe the domestic trends in Japan and the innovative inherently safe LWRs presented domestically so far. (author)

  14. Mobile security how to secure, privatize and recover your devices

    CERN Document Server

    Speed, Timothy; Anderson, Joseph; Nampalli, Jaya

    2013-01-01

    Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

  15. Authorization gives the personnel he/she gives the center he/she gives Isotopes for the acting he/she gives tied functions with the security and the radiological protection

    International Nuclear Information System (INIS)

    Perez Pijuan, S.; Hernandez Alvarez, R.; Peres Reyes, Y.; Venegas Bernal, M.C.

    1998-01-01

    The conception is described used in a center production labelled compound and radiopharmaceuticals for the authorization to the support, operation and supervision personnel The approaches are exposed used to define the excellent positions for the security the installation. The are described the training programs, designed starting from the indentification the specific competitions for each duty station and with particular emphasis in the development gives abilities you practice. It is used for the administration and evaluation gives the programs training the Automated System Administration Programs Training (GESAT)

  16. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  17. Safe Handling of Radioisotopes. 1973 Edition

    International Nuclear Information System (INIS)

    1973-01-01

    Under its Statute the International Atomic Energy Agency is empowered to provide for the application of standards of safety for protection against radiation to its own operations and to operations making use of assistance provided by it or with which it is otherwise directly associated. To this end authorities receiving such assistance are required to observe relevant health and safety measures prescribed by the Agency. As a first step, it was considered an urgent task to provide users of radionuclides with a manual of practice for the safe handling of these substances. The first edition of such a manual was published in 1958 and represented the first of the ''Safety Series'', a series of manuals and codes on health and safety published by the Agency. It was prepared after careful consideration of existing national and international codes of radiation safety by a group of international experts and in consultation with other international bodies. This edition presents the second revision. In response to the suggestion made by some Member States, the term 'radioisotopes' has been changed to 'radionuclides' in the title and, as appropriate, in the text because the term 'radionuclides' includes the radioactive element itself as well as the isotopes. The series of manuals and codes published in the Safety Series and the Technical Reports Series give more complete advice to the user on specialized topics.

  18. Prospects for inherently safe reactors

    International Nuclear Information System (INIS)

    Barkenbus, J.N.

    1988-01-01

    Public fears over nuclear safety have led some within the nuclear community to investigate the possibility of producing inherently safe nuclear reactors; that is, reactors that are transparently incapable of producing a core melt. While several promising designs of such reactors have been produced, support for large-scale research and development efforts has not been forthcoming. The prospects for commercialization of inherently safe reactors, therefore, are problematic; possible events such as further nuclear reactor accidents and superpower summits, could alter the present situation significantly. (author)

  19. Is nuclear power safe enough

    Energy Technology Data Exchange (ETDEWEB)

    Andresen, A F [Institutt for Atomenergi, Kjeller (Norway)

    1979-01-01

    The lecture formed a commentary on the report of the Norwegian Government's Commission on Nuclear power Safety which was published in October 1978. It was introductorily pointed out that 'safe' and 'safety' are not in themselves meaningful terms and that the probability of an occurrence is the real measure. The main items in the Commission's report have been core meltdown, releases during reprocessing, waste disposal, plutonium diversion and environmental impacts. The 21 members of the Commission were unanimous in 7 of the 8 chapters. In chapter 2, 'Summary and Conclusions', 3 members dissented from the majority opinion, that, subject to certain conditions, nuclear power was a safe and acceptable source of energy.

  20. Safe and Liquid Mortgage Bonds

    DEFF Research Database (Denmark)

    Dick-Nielsen, Jens; Gyntelberg, Jacob; Lund, Jesper

    This paper shows that strict match pass-through funding of covered bonds provides safe and liquid mortgage bonds. Despite a 30% drop in house prices during the 2008 global crisis Danish mortgage bonds remained as liquid as most European government bonds. The Danish pass-through system effectively...... eliminates credit risk from the investor's perspective. Similar to other safe bonds, funding liquidity becomes the main driver of mortgage bond liquidity and this creates commonality in liquidity across markets and countries. These findings have implications for how to design a robust mortgage bond system...

  1. Nuclear Resonance Fluorescence and Isotopic Mapping of Containers

    Science.gov (United States)

    Johnson, Micah S.; McNabb, Dennis P.

    2009-03-01

    National security programs have expressed interest in developing systems to isotopically map shipping containers, fuel assemblies, and waste barrels for various materials including special nuclear material (SNM). Current radiographic systems offer little more than an ambiguous density silhouette of a container's contents. In this paper we will present a system being developed at LLNL to isotopically map containers using the nuclear resonance fluorescence (NRF) method. Recent experimental measurements on NRF strengths in SNM are discussed.

  2. Isotopes in heterogeneous catalysis

    CERN Document Server

    Hargreaves, Justin SJ

    2006-01-01

    The purpose of this book is to review the current, state-of-the-art application of isotopic methods to the field of heterogeneous catalysis. Isotopic studies are arguably the ultimate technique in in situ methods for heterogeneous catalysis. In this review volume, chapters have been contributed by experts in the field and the coverage includes both the application of specific isotopes - Deuterium, Tritium, Carbon-14, Sulfur-35 and Oxygen-18 - as well as isotopic techniques - determination of surface mobility, steady state transient isotope kinetic analysis, and positron emission profiling.

  3. Geochemistry of silicon isotopes

    Energy Technology Data Exchange (ETDEWEB)

    Ding, Tiping; Li, Yanhe; Gao, Jianfei; Hu, Bin [Chinese Academy of Geological Science, Beijing (China). Inst. of Mineral Resources; Jiang, Shaoyong [China Univ. of Geosciences, Wuhan (China).

    2018-04-01

    Silicon is one of the most abundant elements in the Earth and silicon isotope geochemistry is important in identifying the silicon source for various geological bodies and in studying the behavior of silicon in different geological processes. This book starts with an introduction on the development of silicon isotope geochemistry. Various analytical methods are described and compared with each other in detail. The mechanisms of silicon isotope fractionation are discussed, and silicon isotope distributions in various extraterrestrial and terrestrial reservoirs are updated. Besides, the applications of silicon isotopes in several important fields are presented.

  4. Applications of stable isotopes

    International Nuclear Information System (INIS)

    Letolle, R.; Mariotti, A.; Bariac, T.

    1991-06-01

    This report reviews the historical background and the properties of stable isotopes, the methods used for their measurement (mass spectrometry and others), the present technics for isotope enrichment and separation, and at last the various present and foreseeable application (in nuclear energy, physical and chemical research, materials industry and research; tracing in industrial, medical and agronomical tests; the use of natural isotope variations for environmental studies, agronomy, natural resources appraising: water, minerals, energy). Some new possibilities in the use of stable isotope are offered. A last chapter gives the present state and forecast development of stable isotope uses in France and Europe

  5. Isotope production technologies from a regulatory perspective

    Energy Technology Data Exchange (ETDEWEB)

    Murthy, K. [Canadian Nuclear Safety Committee, Ottawa, Ontario (Canada)

    2012-07-01

    This paper discusses isotope production technologies from a regulatory perspective. The regulator is the CNSC which has the mandate to protect the health, safety and security of persons and the environment and to implement Canada's international commitments on the peaceful use of nuclear energy. Nuclear facilities regulated by CNSC include linear accelerator (medical), pool irradiator (industrial) and Pelletron (research) as well as cyclotrons.

  6. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  7. Overview of Accelerator Applications for Security and Defense

    Science.gov (United States)

    Antolak, Arlyn J.

    Particle accelerators play a key role in a broad set of defense and security applications, including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization, and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat to developing a radiological dispersal device, and, can be used to produce isotopes for medical, industrial, and research purposes. An overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security is presented.

  8. Android: Analysis of its architecture and security mechanism

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    As Android operation system platform is widely used in smart phone, one important aspect should not be ignored -its security. As android is an open mobile platform, and also a programmable software framework, is it more safe than his competitor - Iphone, Symbian and so on? This paper will present some security issues on the mobile phones, analyze the security principles and mechanisms based on the architecture and features of Android OS platform, then it will compare Android with some other mobile operation systems like Iphone, Symbian in area of security to make a conclusion that Android is a safe mobile OS to a certain extent.

  9. Safe-haven CDS Premia

    DEFF Research Database (Denmark)

    Klingler, Sven; Lando, David

    We argue that Credit Default Swap (CDS) premia for safe-haven sovereigns, like Germany and the United States, are driven to a large extent by regulatory requirements under which derivatives dealing banks have an incentive to buy CDS to hedge counterparty credit risk of their counterparties. We...

  10. Thermodynamics of asymptotically safe theories

    DEFF Research Database (Denmark)

    Rischke, Dirk H.; Sannino, Francesco

    2015-01-01

    We investigate the thermodynamic properties of a novel class of gauge-Yukawa theories that have recently been shown to be completely asymptotically safe, because their short-distance behaviour is determined by the presence of an interacting fixed point. Not only do all the coupling constants freeze...

  11. Safe disposal of radioactive wastes

    International Nuclear Information System (INIS)

    Hooker, P.; Metcalfe, R.; Milodowski, T.; Holliday, D.

    1997-01-01

    A high degree of international cooperation has characterized the two studies reported here which aim to address whether radioactive waste can be disposed of safely. Using hydrogeochemical and mineralogical surveying techniques earth scientists from the British Geological Survey have sought to identify and characterise suitable disposal sites. Aspects of the studies are explored emphasising their cooperative nature. (UK)

  12. Staying Safe on the Water

    Centers for Disease Control (CDC) Podcasts

    2008-06-05

    In this podcast for all audiences, Dr. Julie Gilchrist from CDC's Injury Center outlines tips for safe boating.  Created: 6/5/2008 by National Center for Injury Prevention and Control (NCIPC).   Date Released: 6/8/2008.

  13. Safe transport of radioactive material

    International Nuclear Information System (INIS)

    1994-01-01

    Delivering radioactive material to where it is needed is a vital service to industry and medicine. Millions of packages are shipped all over the world by all modes of transport. The shipments pass through public places and must meet stringent safety requirements. This video explains how radioactive material is safely transported and describes the rules that carriers and handlers must follow

  14. Working safely with ionising radiation

    International Nuclear Information System (INIS)

    McDowell, D.J.

    1990-01-01

    A small leaflet provides information on working safely with ionizing radiation. Topics covered include the types of radiation, radiological units, external radiation, contamination and internal radiation, methods of protection form radiation, radiation monitors, protective clothing for contamination, personal dosemeters, radiation dose limits for classified workers and finally the Ionising Radiations Regulations 1985. (UK)

  15. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  16. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  17. SECURE nuclear district heating plant

    International Nuclear Information System (INIS)

    Nilsson; Hannus, M.

    1978-01-01

    The role foreseen for the SECURE (Safe Environmentally Clean Urban REactor) nuclear district heating plant is to provide the baseload heating needs of primarily the larger and medium size urban centers that are outside the range of waste heat supply from conventional nuclear power stations. The rationale of the SECURE concept is that the simplicity in design and the inherent safety advantages due to the use of low temperatures and pressures should make such reactors economically feasible in much smaller unit sizes than nuclear power reactors and should make their urban location possible. It is felt that the present design should be safe enough to make urban underground location possible without restriction according to any criteria based on actual risk evaluation. From the environmental point of view, this is a municipal heat supply plant with negligible pollution. Waste heat is negligible, gaseous radioactivity release is negligible, and there is no liquid radwaste release. Economic comparisons show that the SECURE plant is competitive with current fossil-fueled alternatives. Expected future increase in energy raw material prices will lead to additional energy cost advantages to the SECURE plant

  18. Agricultural Production, Food and Nutrition Security in Rural Benin ...

    African Journals Online (AJOL)

    Agricultural Production, Food and Nutrition Security in Rural Benin, Nigeria. ... that rural-urban migration results in shortage of manpower for agricultural activities. ... to support education, health care, sanitation and safe drinking water supply.

  19. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  20. Ensuring a Safe Technological Revolution

    Science.gov (United States)

    2016-12-01

    much lower, and the performance gained can dramatically reduce life -cycle costs. Validated cost data are scarce, and accurate AM cost models need to be...reduce costs, minimize obsolescence issues and improve both capability and readi- ness across the entire life cycle of naval systems—including both the...of naval weapon systems. The Navy is actively engaging its various communi- ties to align needs and ensure that AM can be safely acceler- ated and

  1. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  2. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  3. Process for isotope separation

    International Nuclear Information System (INIS)

    Emile, B.F.M.

    1983-11-01

    A process is claimed for isotopic separation applied to isotopes of elements that can be placed in at least a physicochemical form in which the isotopic atoms or the molecules containing these atoms can be easily displaced and for which there are selective radiations preferentially absorbed by the isotopes of a certain type or by the molecules containing them, said absorption substantially increasing the probability of ionization of said atoms or molecules relative to the atoms or molecules that did not absorb the radiation. The process consists of placing the isotopic mixture in such a form, subjecting it in a separation zone to selective radiations and to an electrical field that produces migration of positive ions toward the negative electrodes and negative ions toward the positive electrodes, and withdrawing from certain such zones the fractions thus enriched in certain isotopes

  4. Transfer pricing and safe harbours

    Directory of Open Access Journals (Sweden)

    Veronika Solilová

    2013-01-01

    Full Text Available Transfer prices are significant for both taxpayers and tax administrations because they determine in large part taxable profits of associated enterprises in different tax jurisdictions. Moreover, in the context of taxation, transfer prices must be complied with the arm’s length principle. However, Multinational Enterprises have been faced daily by conflicting rules and approaches to applying the arm’s length principle, burdensome documentation requirements, inconsistent audit standards and unpredictable competent authority outcomes. Therefore, the Committee on Fiscal Affairs launched another project on the administrative aspects of transfer pricing in 2010. On 16 May 2013 as a partial solution of this project was approved by the OECD Council the Revised Section E on Safe Harbours in Chapter IV of the Transfer Pricing Guidelines for Multinational Enterprises and Tax Authorities. The paper is focused on significant changes of newly approved chapter IV of the Transfer Pricing Guidelines for Multinational Enterprises and Tax Authorities, further on analysis of practice in this area, on advantages and disadvantages of safe harbours for taxpayers and competent authorities with aim to suggest recommendations on use of safe harbours in the Czech Republic.

  5. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  6. Isotope hydrology and its impact in the developing world

    International Nuclear Information System (INIS)

    Verhagen, B.Th.

    2003-01-01

    Ground water has increasingly taken its place in the provision of safe, potable supply in the developing world. Large investments have been made in infrastructural development for rural ground water supply schemes, but far too little attention has been given to assess the sustainability of these supplies. Overexploitation of aquifers, evident in failing boreholes and deteriorating water quality, has become a world-wide concern. Developments in physics half a century ago established the basis of isotope hydrology. Radioactive isotopes give information on ground water dynamics and recharge rates whilst non-radioactive - or stable - isotopes indicate origins of ground water and delineate ground water bodies. Environmental isotope hydrology is increasingly seen as a powerful discipline in assessing ground water systems. This is particularly important in developing environments, where historical data is rarely available. Brief examples are presented of isotope applications to collaborative ground water studies conducted at the University of the Witwatersrand. Recharge estimates based on isotope 'snapshot' data conform well with results from subsequent long-term water level observations in the Kalahari of Botswana. The importance is demonstrated of irrigation return flow and pollution hazard to the Lomagundi dolomite of Zimbabwe. Isotopes suggest the source of high nitrate concentrations to an important ground water supply in Tanzania. Mechanisms of the release of arsenic into millions of tube wells in Bangladesh are put into perspective. Isotope hydrology as appropriate technology is highlighted in terms of its cost-effectiveness and the investigative empowerment of local investigators. (author)

  7. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  9. Isotopic marking and tracers

    International Nuclear Information System (INIS)

    Morel, F.

    1997-01-01

    The use of radioactive isotopes as tracers in biology has been developed thanks to the economic generation of the required isotopes in accelerators and nuclear reactors, and to the multiple applications of tracers in the life domain; the most usual isotopes employed in biology are carbon, hydrogen, phosphorus and sulfur isotopes, because these elements are present in most of organic molecules. Most of the life science knowledge appears to be dependent to the extensive use of nuclear tools and radioactive tracers; the example of the utilization of radioactive phosphorus marked ATP to study the multiple reactions with proteins, nucleic acids, etc., is given

  10. Isotopes in oxidation reactions

    International Nuclear Information System (INIS)

    Stewart, R.

    1976-01-01

    The use of isotopes in the study of organic oxidation mechanisms is discussed. The help provided by tracer studies to demonstrate the two-equivalent path - hydride transfer, is illustrated by the examples of carbonium oxidants and the Wacker reaction. The role of kinetic isotope effects in the study of the scission of carbon-hydrogen bonds is illustrated by hydride abstraction, hydrogen atom abstraction, proton abstraction and quantum mechanical tunnelling. Isotopic studies on the oxidation of alcohols, carbonyl compounds, amines and hydrocarbons are discussed. The role of isotopes in the study of biochemical oxidation is illustrated with a discussion on nicotinamide and flavin coenzymes. (B.R.H.)

  11. Isotope separation process

    International Nuclear Information System (INIS)

    Lyon, R.K.

    1976-01-01

    The instant invention relates to a process for separating a material into two or more parts in each of which the abundances of the isotopes of a given element differ from the abundances of the isotopes of the same material in said material. In one embodiment, the invention relates to a method for the isotopically selective excitation of gas phase molecules by multiple infrared photon absorption followed by selective dissociation of said excited molecules by the absorption of a single photon of visible or ultraviolet light. This invention is useful for, but not limited to, the separation of the principal isotopes of uranium. 11 Claims, 2 Drawing Figures

  12. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  13. ORNL Isotopes Facilities Shutdown Program Plan

    International Nuclear Information System (INIS)

    Gibson, S.M.; Patton, B.D.; Sears, M.B.

    1990-10-01

    This plan presents the results of a technical and economic assessment for shutdown of the Oak Ridge National Laboratory (ORNL) isotopes production and distribution facilities. On December 11, 1989, the Department of Energy (DOE), Headquarters, in a memorandum addressed to DOE Oak Ridge Operations Office (DOE-ORO), gave instructions to prepare the ORNL isotopes production and distribution facilities, with the exception of immediate facility needs for krypton-85, tritium, and yttrium-90, for safe shutdown. In response to the memorandum, ORNL identified 17 facilities for shutdown. Each of these facilities is located within the ORNL complex with the exception of Building 9204-3, which is located at the Y-12 Weapons Production Plant. These facilities have been used extensively for the production of radioactive materials by the DOE Isotopes Program. They currently house a large inventory of radioactive materials. Over the years, these aging facilities have inherited the problems associated with storing and processing highly radioactive materials (i.e., facilities' materials degradation and contamination). During FY 1990, ORNL is addressing the requirements for placing these facilities into safe shutdown while maintaining the facilities under the existing maintenance and surveillance plan. The day-to-day operations associated with the surveillance and maintenance of a facility include building checks to ensure that building parameters are meeting the required operational safety requirements, performance of contamination control measures, and preventative maintenance on the facility and facility equipment. Shutdown implementation will begin in FY 1993, and shutdown completion will occur by the end of FY 1994

  14. Isotope Fuels Impact Tester (IFIT)

    International Nuclear Information System (INIS)

    Frantz, C.E.; Taylor, J.W.; Court, D.B.

    1975-07-01

    The Isotope Fuels Impact Tester (IFIT) is used for safely impacting 238 PuO 2 heat sources that have been heated to 2000 0 C. Impact velocities reach 300 m/s (1000 ft/s). A gas gun with a 178-mm (7-in.) bore is used to accelerate the heat source, which is heated by a furnace built into the projectile. Double containment of the impacted heat source is obtained by two vessels that are sealed directly to the gun muzzle. The impact occurs in the inner vessel, and parts of the projectile jam into and thereby close each vessel. The inner vessel, containing the impacted heat source, is removed from the gun and is placed inside a glovebox for disassembly and heat-source recovery. IFIT's modular structure makes it versatile and adaptable to many types of tests. Many applications have demonstrated its versatility and, more important, its capability for impacting 238 PuO 2 heat sources safely. An approximate theoretical relation is used to predict proper conditions for achieving desired impact velocities. Bore lubricants and projectile-seal design are also important for achieving proper impact velocities

  15. How safe are nuclear plants? How safe should they be?

    International Nuclear Information System (INIS)

    Kouts, H.

    1988-01-01

    It has become customary to think about safety of nuclear plants in terms of risk as defined by the WASH-1400 study that some of the implications for the non-specialist escape our attention. Yet it is known that a rational program to understand safety, to identify unsafe events, and to use this kind of information or analysis to improve safety, requires us to use the methods of quantitative risk assessment. How this process can be made more understandable to a broader group of nontechnical people and how can a wider acceptance of the results of the process be developed have been questions under study and are addressed in this report. These are questions that have been struggled with for some time in the world of nuclear plant safety. The Nuclear Regulatory Commission examined them for several years as it moved toward developing a position on safety goals for nuclear plants, a requirement that had been assigned it by Congress. Opinion was sought from a broad spectrum of individuals, within the field of nuclear power and outside it, on the topic that was popularly called, ''How safe is safe enough?'' Views were solicited on the answer to the question and also on the way the answer should be framed when it was adopted. This report discusses the public policy and its implementation

  16. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  17. The struggle for safe nuclear expansion in China

    International Nuclear Information System (INIS)

    Xu, Y.C.

    2014-01-01

    After a temporary halt following the Fukushima nuclear disaster in March 2011, China resumed its fast, yet cautious, expansion of nuclear energy programme. Nuclear energy is considered as part of the general strategy to deal with the challenges of energy security and climate change and to advance with ‘state of the art’ technology in its development. This article briefly discusses recent development in and driving forces behind nuclear industry in China, and several challenges it has been facing: how to adopt, adapt, standardise and indigenise whose technologies, and how to address the shortage of qualified nuclear engineers, scientists, skilled labour force and qualified regulators. More importantly, it argues that safe and secure nuclear development requires consistent policies and effective regulations. Therefore, it is crucial to build policy and regulatory capacities based on coordination, planning and management of government agencies and the industry. - Highlights: • Nuclear energy development in China. • Nuclear technology selection. • Human capital. • Regulatory regime. • Safe and secure development

  18. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  19. Intracellular Cadmium Isotope Fractionation

    Science.gov (United States)

    Horner, T. J.; Lee, R. B.; Henderson, G. M.; Rickaby, R. E.

    2011-12-01

    Recent stable isotope studies into the biological utilization of transition metals (e.g. Cu, Fe, Zn, Cd) suggest several stepwise cellular processes can fractionate isotopes in both culture and nature. However, the determination of fractionation factors is often unsatisfactory, as significant variability can exist - even between different organisms with the same cellular functions. Thus, it has not been possible to adequately understand the source and mechanisms of metal isotopic fractionation. In order to address this problem, we investigated the biological fractionation of Cd isotopes within genetically-modified bacteria (E. coli). There is currently only one known biological use or requirement of Cd, a Cd/Zn carbonic anhydrase (CdCA, from the marine diatom T. weissfloggii), which we introduce into the E. coli genome. We have also developed a cleaning procedure that allows for the treating of bacteria so as to study the isotopic composition of different cellular components. We find that whole cells always exhibit a preference for uptake of the lighter isotopes of Cd. Notably, whole cells appear to have a similar Cd isotopic composition regardless of the expression of CdCA within the E. coli. However, isotopic fractionation can occur within the genetically modified E. coli during Cd use, such that Cd bound in CdCA can display a distinct isotopic composition compared to the cell as a whole. Thus, the externally observed fractionation is independent of the internal uses of Cd, with the largest Cd isotope fractionation occurring during cross-membrane transport. A general implication of these experiments is that trace metal isotopic fractionation most likely reflects metal transport into biological cells (either actively or passively), rather than relating to expression of specific physiological function and genetic expression of different metalloenzymes.

  20. Discovery of the iron isotopes

    International Nuclear Information System (INIS)

    Schuh, A.; Fritsch, A.; Heim, M.; Shore, A.; Thoennessen, M.

    2010-01-01

    Twenty-eight iron isotopes have been observed so far and the discovery of these isotopes is discussed here. For each isotope a brief summary of the first refereed publication, including the production and identification method, is presented.

  1. Discovery of the silver isotopes

    International Nuclear Information System (INIS)

    Schuh, A.; Fritsch, A.; Ginepro, J.Q.; Heim, M.; Shore, A.; Thoennessen, M.

    2010-01-01

    Thirty-eight silver isotopes have been observed so far and the discovery of these isotopes is discussed here. For each isotope a brief summary of the first refereed publication, including the production and identification method, is presented.

  2. Discovery of the cadmium isotopes

    International Nuclear Information System (INIS)

    Amos, S.; Thoennessen, M.

    2010-01-01

    Thirty-seven cadmium isotopes have been observed so far and the discovery of these isotopes is discussed here. For each isotope a brief summary of the first refereed publication, including the production and identification method, is presented.

  3. Small intrinsically safe reactor implications

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1985-01-01

    Reviewing the history of nuclear power, it is found that peaceful uses of nuclear power are children of the war-like atom. Importance of special growth in a shielded environment is emphasized to exploit fully the advantages of nuclear power. Nuclear power reactors must be safe for their assimilation into society from the points of view of both technology and social psychology. ISR/ISER is identified as a missing link in the development of nuclear power reactors from this perspective and advocated for international development and utilization, being unleashed from the concerns of politicization, safety, and proliferation

  4. Mifrenz: Safe email for children

    Directory of Open Access Journals (Sweden)

    Tim Hunt

    Full Text Available Products currently available for monitoring children\\'s email usage are either considered to encourage dubious ethical behaviour or are time consuming for parents to administer. This paper describes the development of a new email client application for children called Mifrenz. This new application gives parents the ability to let their children safely use email, with the minimum of intervention. It was developed using mostly free software and also with the desire to provide real first hand programming examples to demonstrate to students.

  5. Type-safe pattern combinators

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2009-01-01

    Macros still haven't made their way into typed higher-order programming languages such as Haskell and Standard ML. Therefore, to extend the expressiveness of Haskell or Standard ML, one must express new linguistic features in terms of functions that fit within the static type systems of these lan...... of these languages. This is particularly challenging when introducing features that span across multiple types and that bind variables. We address this challenge by developing, in a step by step manner, mechanisms for encoding patterns and pattern matching in Haskell in a type-safe way....

  6. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  7. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  8. The Replacement of Safe Assets: Evidence from the U.S. Bond Portfolio

    OpenAIRE

    Bertaut, Carol C.; Tabova, Alexandra M.; Wong, Vivian

    2014-01-01

    The expansion in financial sector "safe" assets, largely in the form of structured products from the U.S. and the Caribbean, in the lead-up to the global financial crisis has by now been fairly well documented. Using a unique dataset derived from security-level data on U.S. portfolio holdings of foreign securities, we show that since the crisis, it is mostly the foreign financial sector that appears to have met U.S. demand for safe and liquid investment assets by expanding its supply of debt ...

  9. Development of Cyber Security Scheme for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Choi, Y. S.; Cho, J. W. (and others)

    2009-12-15

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures.

  10. Development of Cyber Security Scheme for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Choi, Y. S.; Cho, J. W.

    2009-12-01

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures

  11. Isotopic research in Antarctica

    International Nuclear Information System (INIS)

    Schuetze, H.

    1983-01-01

    Since 1978 scientists of the Central Institute of Isotope- and Radiation Research of the Academy of Sciences of the GDR have participated in antarctic research. Substantial results have been achieved in research on isotope ratios, on the dynamics of water resources, on concentration of deuterium in lichens, and on age determination of a mummified seal and a penguin colony

  12. Uses of stable isotopes

    International Nuclear Information System (INIS)

    Axente, Damian

    1998-01-01

    The most important fields of stable isotope use with examples are presented. These are: 1. Isotope dilution analysis: trace analysis, measurements of volumes and masses; 2. Stable isotopes as tracers: transport phenomena, environmental studies, agricultural research, authentication of products and objects, archaeometry, studies of reaction mechanisms, structure and function determination of complex biological entities, studies of metabolism, breath test for diagnostic; 3. Isotope equilibrium effects: measurement of equilibrium effects, investigation of equilibrium conditions, mechanism of drug action, study of natural processes, water cycle, temperature measurements; 4. Stable isotope for advanced nuclear reactors: uranium nitride with 15 N as nuclear fuel, 157 Gd for reactor control. In spite of some difficulties of stable isotope use, particularly related to the analytical techniques, which are slow and expensive, the number of papers reporting on this subject is steadily growing as well as the number of scientific meetings organized by International Isotope Section and IAEA, Gordon Conferences, and regional meeting in Germany, France, etc. Stable isotope application development on large scale is determined by improving their production technologies as well as those of labeled compound and the analytical techniques. (author)

  13. Detecting isotopic ratio outliers

    International Nuclear Information System (INIS)

    Bayne, C.K.; Smith, D.H.

    1985-01-01

    An alternative method is proposed for improving isotopic ratio estimates. This method mathematically models pulse-count data and uses iterative reweighted Poisson regression to estimate model parameters to calculate the isotopic ratios. This computer-oriented approach provides theoretically better methods than conventional techniques to establish error limits and to identify outliers. 6 refs., 3 figs., 3 tabs

  14. Stable isotopes labelled compounds

    International Nuclear Information System (INIS)

    1982-09-01

    The catalogue on stable isotopes labelled compounds offers deuterium, nitrogen-15, and multiply labelled compounds. It includes: (1) conditions of sale and delivery, (2) the application of stable isotopes, (3) technical information, (4) product specifications, and (5) the complete delivery programme

  15. ICT: isotope correction toolbox.

    Science.gov (United States)

    Jungreuthmayer, Christian; Neubauer, Stefan; Mairinger, Teresa; Zanghellini, Jürgen; Hann, Stephan

    2016-01-01

    Isotope tracer experiments are an invaluable technique to analyze and study the metabolism of biological systems. However, isotope labeling experiments are often affected by naturally abundant isotopes especially in cases where mass spectrometric methods make use of derivatization. The correction of these additive interferences--in particular for complex isotopic systems--is numerically challenging and still an emerging field of research. When positional information is generated via collision-induced dissociation, even more complex calculations for isotopic interference correction are necessary. So far, no freely available tools can handle tandem mass spectrometry data. We present isotope correction toolbox, a program that corrects tandem mass isotopomer data from tandem mass spectrometry experiments. Isotope correction toolbox is written in the multi-platform programming language Perl and, therefore, can be used on all commonly available computer platforms. Source code and documentation can be freely obtained under the Artistic License or the GNU General Public License from: https://github.com/jungreuc/isotope_correction_toolbox/ {christian.jungreuthmayer@boku.ac.at,juergen.zanghellini@boku.ac.at} Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  16. Separation of uranium isotopes

    International Nuclear Information System (INIS)

    Porter, J.T.

    1980-01-01

    Methods and apparatus are disclosed for separation of uranium isotopes by selective isotopic excitation of photochemically reactive uranyl salt source material at cryogenic temperatures, followed by chemical separation of selectively photochemically reduced U+4 thereby produced from remaining uranyl source material

  17. Isotope research materials

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    Preparation of research isotope materials is described. Topics covered include: separation of tritium from aqueous effluents by bipolar electrolysis; stable isotope targets and research materials; radioisotope targets and research materials; preparation of an 241 Am metallurgical specimen; reactor dosimeters; ceramic and cermet development; fission-fragment-generating targets of 235 UO 2 ; and wire dosimeters for Westinghouse--Bettis

  18. Isotope separation process

    International Nuclear Information System (INIS)

    Lyon, R.K.

    1979-01-01

    A method is described for the isotopically selective excitation of gas phase molecules by multiple infrared photon absorption after which more of the excited molecules than nonexcited molecules are converted to a chemically different form which may be separated by means known in the art. This invention is useful for, but not limited to, the separation of the principal isotopes of uranium

  19. Superdeformation in Pb isotopes

    International Nuclear Information System (INIS)

    Naz, Tabassum; Ahmad, Shakeb

    2017-01-01

    The Relatvistic Hartree-Bogoliubov (RHB) theory is used to explore the structure of superdeformed (SD) 190,212 Pb isotopes using the non-linear NL3* and density dependent (DD-ME2, DD-PC1) interactions. We have studied the the excitation energy, the potential depth and the deformation of these Pb isotopes

  20. Detecting isotopic ratio outliers

    Science.gov (United States)

    Bayne, C. K.; Smith, D. H.

    An alternative method is proposed for improving isotopic ratio estimates. This method mathematically models pulse-count data and uses iterative reweighted Poisson regression to estimate model parameters to calculate the isotopic ratios. This computer-oriented approach provides theoretically better methods than conventional techniques to establish error limits and to identify outliers.

  1. Detecting isotopic ratio outliers

    International Nuclear Information System (INIS)

    Bayne, C.K.; Smith, D.H.

    1986-01-01

    An alternative method is proposed for improving isotopic ratio estimates. This method mathematically models pulse-count data and uses iterative reweighted Poisson regression to estimate model parameters to calculate the isotopic ratios. This computer-oriented approach provides theoretically better methods than conventional techniques to establish error limits and to identify outliers

  2. Isotope dilution analysis

    Energy Technology Data Exchange (ETDEWEB)

    Fudge, A.

    1978-12-15

    The following aspects of isotope dilution analysis are covered in this report: fundamental aspects of the technique; elements of interest in the nuclear field, choice and standardization of spike nuclide; pre-treatment to achieve isotopic exchange and chemical separation; sensitivity; selectivity; and accuracy.

  3. Wide angle isotope separator

    International Nuclear Information System (INIS)

    Kantrowitz, A.

    1976-01-01

    A method and apparatus is described for particle separation. The method uses a wide angle radially expanding vapor of a particle mixture. In particular, selective ionization of one isotope type in the particle mixture is produced in a multichamber separator and the ionized isotope type is accelerated out of the path of the vapor expansion for separate collection

  4. Environmental isotope hydrology

    International Nuclear Information System (INIS)

    1973-01-01

    Environmental isotope hydrology is a relatively new field of investigation based on isotopic variations observed in natural waters. These isotopic characteristics have been established over a broad space and time scale. They cannot be controlled by man, but can be observed and interpreted to gain valuable regional information on the origin, turnover and transit time of water in the system which often cannot be obtained by other techniques. The cost of such investigations is usually relatively small in comparison with the cost of classical hydrological studies. The main environmental isotopes of hydrological interest are the stable isotopes deuterium (hydrogen-2), carbon-13, oxygen-18, and the radioactive isotopes tritium (hydrogen-3) and carbon-14. Isotopes of hydrogen and oxygen are ideal geochemical tracers of water because their concentrations are usually not subject to change by interaction with the aquifer material. On the other hand, carbon compounds in groundwater may interact with the aquifer material, complicating the interpretation of carbon-14 data. A few other environmental isotopes such as 32 Si and 238 U/ 234 U have been proposed recently for hydrological purposes but their use has been quite limited until now and they will not be discussed here. (author)

  5. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  6. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  7. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    Science.gov (United States)

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  8. Laser assisted aerodynamic isotope separation

    International Nuclear Information System (INIS)

    Berg, H. van den

    1985-01-01

    It is shown that the efficiency of conventional aerodynamic isotope seperation can be improved by two orders of magnitude with the aid of a relatively weak cw infrared laser which is used to induce isotopically selective condensation. Overall isotope enrichment factors in excess of 2 are obtained as compared to about 1.02 in the conventional seperation. Sulphur isotopes in SF 6 as well as Silicon isotopes in SiF 4 and Bromine isotopes in CF 3 Br are seperated on a laboratory scale. Infrared vibrational predissociation by itself and in combination with isotopically selective condensation are also shown to be effective new ways of isotope separation. (orig.) [de

  9. A PC-based system for simulation of processes in the isotopic exchange column of a cryogenic pilot plant

    International Nuclear Information System (INIS)

    Retevoi, Carmen Maria; Stefan, Liviu; Baltateanu, Ovidiu; Stefan, Iuliana

    2001-01-01

    vapor pressure and the heavy water level in the column. The level is controlled via two dosing pumps, which work alternately to feed water to the column. In addition, we employ two monitoring systems for security. The first one monitors the temperature of hydrogen inside the heat exchanger and at the inlet of column and ensures that these are lower than the maximum safe temperatures (90 deg.C and 150 deg.C, respectively). The second security system monitors the pressure of the nitrogen used for cooling the electrical resistance rods inside the heaters. We created a front panel user interface with LabViewTM, which gave us interactive control of the system and a faster way to program instrumentation and data acquisition systems. By using LabViewTM in design, test and implementation we reduced the system development time and increased the productivity. Because LabViewTM has the same development tools and language capabilities as a standard computer language such as C - looping and case structure - it is well suited for modeling and simulation. (authors)

  10. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  11. Isotopes in Greenland Precipitation

    DEFF Research Database (Denmark)

    Faber, Anne-Katrine

    Greenland ice cores offer a unique opportunity to investigate the climate system behaviour. The objective of this PhD project is to investigate isotope modelling of present- day conditions and conduct model-data comparison using Greenland ice cores. Thus this thesis investigates how the integration...... of model and data can be used to improve the understanding of climate changes. This is done through analysis of isotope modelling, observations and ice core measurements. This dissertation comprises three projects: (1) Modelling the isotopic response to changes in Arctic sea surface conditions, (2......) Constructing a new Greenland database of observations and present-day ice core measurements, and (3) Performance test of isotope-enabled CAM5 for Greenland. The recent decades of rapid Arctic sea ice decline are used as a basis for an observational-based model experiment using the isotope-enabled CAM model 3...

  12. Applications of isotopes

    International Nuclear Information System (INIS)

    Kirby-Smith, J.S.

    1976-01-01

    Current and potential applications of stable isotopes as tracers in a number of biomedical and environmental areas are discussed. It is pointed out that a wide variety of problems exist in these fields whose solutions in principle are amenable to the isotopic approach. The number and diversity of these problems as well as the unique role stable isotopes can play in their solution illustrate the importance of achieving and maintaining a broad inventory of isotopic species. Experience has demonstrated unequivocally an additional overriding requirement for widespread exploration of stable isotopes by the scientific and technical community, i.e., the need for low cost availability of the materials in quantity. Some representative applications of 12 C, 13 C, 14 N, 15 N, 16 O, 17 O, and 18 O are discussed

  13. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  14. Safe transport of radioactive material

    International Nuclear Information System (INIS)

    1990-01-01

    Recently the Agency redefined its policy for education and training in radiation safety. The emphasis is now on long-term strategic planning of general education and training programmes. In line with this general policy the Agency's Standing Advisory Group for the Safe Transport of Radioactive Material (SAGSTRAM) in its 7th meeting (April 1989) agreed that increased training activity should be deployed in the area of transport. SAGSTRAM specifically recommended the development of a standard training programme on this subject area, including audio-visual aids, in order to assist Member States in the implementation of the Agency's Regulations for the Safe Transport of Radioactive Material. This training programme should be substantiated by a biennial training course which is thought to be held either as an Interregional or a Regional Course depending on demand. This training manual, issued as a first publication in the Training Course Series, represents the basic text material for future training courses in transport safety. The topic areas covered by this training manual and most of the texts have been developed from the course material used for the 1987 Bristol Interregional Course on Transport Safety. The training manual is intended to give guidance to the lecturers of a course and will be provided to the participants for retention. Refs, figs and tabs

  15. Safe Driving After Propofol Sedation.

    Science.gov (United States)

    Summerlin-Grady, Lee; Austin, Paul N; Gabaldon, Dion A

    2017-10-01

    Propofol is a short-acting medication with fast cognitive and psychomotor recovery. However, patients are usually instructed not to drive a motor vehicle for 24 hours after receiving propofol. The purpose of this article was to review the evidence examining when it is safe to drive after receiving propofol for sedation for diagnostic and surgical procedures. This is a systematic review of the literature. A search of the literature was conducted using Google Scholar, PubMed, and the Cochrane Library for the time period 1990 to 2015. Two randomized controlled trials and two observational studies met the inclusion criteria. Using a simulator, investigators examined driving ability of subjects who received modest doses (about 100 mg) of propofol for endoscopic procedures and surveyed subjects who drove immediately after discharge. There were methodological concerns with the studies such as small sample sizes, modest doses of propofol, and three of the four studies were done in Japan by the same group of investigators limiting generalizability. This limited research suggests that it may be safe for patients to drive sooner than 24 hours after receiving propofol. However, large multicenter trials using heterogenous samples using a range of propofol doses are needed to support an evidence-based revision to the current discharge guidelines for patients receiving propofol. Copyright © 2016 American Society of PeriAnesthesia Nurses. Published by Elsevier Inc. All rights reserved.

  16. Keeping you safe by making machine tools safe

    CERN Multimedia

    2012-01-01

    CERN’s third safety objective for 2012 concerns the safety of equipment - and machine tools in particular.   There are three prerequisites for ensuring that a machine tool can be used safely: ·      the machine tool must comply with Directive 2009/104/EC, ·      the layout of the workshop must be compliant, and ·      everyone who uses the machine tool must be trained. Provided these conditions are met, the workshop head can grant authorisation to use the machine tool. To fulfil this objective, an inventory of the machine tools must be drawn up and the people responsible for them identified. The HSE Unit's Safety Inspection Service produces compliance reports for the machine tools. In order to meet the third objective set by the Director-General, the section has doubled its capacity to carry out inspections: ...

  17. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  18. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  19. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  20. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  1. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  2. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  3. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  4. Dementia - keeping safe in the home

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000031.htm Dementia - keeping safe in the home To use the ... make sure the homes of people who have dementia are safe for them. Safety Tips for the ...

  5. Breastfeeding FAQs: Safely Storing Breast Milk

    Science.gov (United States)

    ... Search English Español Breastfeeding FAQs: Safely Storing Breast Milk KidsHealth / For Parents / Breastfeeding FAQs: Safely Storing Breast ... may have. How do I store my breast milk? You can freeze and/or refrigerate your pumped ( ...

  6. Modeling, simulation and analysis of a securities settlement system:The case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F; Palacios, Arturo; Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  7. Modeling, simulation and analysis of a securities settlement system: the case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F.; Palacios, Arturo; de Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  8. Working safely with electronics racks

    CERN Document Server

    Simon Baird, HSE Unit Head

    2016-01-01

    Think of CERN and you’ll probably think of particle accelerators and detectors. These are the tools of the trade in particle physics, but behind them are the racks of electronics that include power supplies, control systems and data acquisition networks.   Inside an electronics rack: danger could be lurking if the rack is not powered off. In routine operation, these are no more harmful than the home entertainment system in your living room. But unscrew the cover and it’s a different matter. Even after following appropriate training, and with formal authorisation from your group leader or equivalent to carry out electrical work or any work in the vicinity of electrical hazards, and even with extensive experience of carrying out such operations, it’s important to incorporate safe working practices into your routine. At CERN, before the racks of electronics reach their operational configurations for the accelerators and detectors, they play a vital role in test set-ups ...

  9. Workshop on Developing Safe Software

    International Nuclear Information System (INIS)

    Lawrence, J.D.

    1994-11-01

    The Workshop on Developing Safe Software was held July 22--23, 1992, at the Hotel del Coronado, San Diego, California. The purpose of the workshop was to have four world experts discuss among themselves software safety issues which are of interest to the US Nuclear Regulatory Commission. These issues concern the development of software systems for use in nuclear power plant protection systems. The workshop comprised four sessions. Wednesday morning, July 22, consisted of presentations from each of the four panel members. On Wednesday afternoon, the panel members went through a list of possible software development techniques and commented on them. The Thursday morning, July 23, session consisted of an extended discussion among the panel members and the observers from the NRC. A final session on Thursday afternoon consisted of a discussion among the NRC observers as to what was learned from the workshop

  10. Workshop on developing safe software

    International Nuclear Information System (INIS)

    Lawrence, J.D.

    1992-01-01

    The Workshop on Developing Safe Software was held July 22--23 at the Hotel del Coronado, San Diego, California. The purpose of the workshop was to have four world experts discuss among themselves software safety issues which are of interest to the U. S. Nuclear Regulatory Commission (NRC). These issues concern the development of software systems for use in nuclear power plant protection systems. The workshop comprised four sessions. Wednesday morning, July 22, consisted of presentations from each of the four panel members. On Wednesday afternoon, the panel members went through a list of possible software development techniques and commented on them. The Thursday morning, July 23, session consisted of an extended discussion among the panel members and the observers from the NRC. A final session on Thursday afternoon consisted of a discussion among the NRC observers as to what was teamed from the workshop

  11. The Difference Safe Spaces Make

    Directory of Open Access Journals (Sweden)

    Kendric Coleman

    2016-05-01

    Full Text Available In the last decade, lesbian, gay, bisexual, and transgender (LGBT students have become very visible at Historically Black Colleges and Universities (HBCUs, but this visibility is not reflected in some colleges’ student programs and activities. Only a few notable HBCUs, such as Howard University and Spelman College, have made a concerted effort. Acknowledging that the LGBT community is significant and exists, and fostering such support, comes up against a steep wall of religious tradition and doctrines, and conservative administrations. It is imperative that HBCUs address LGBT issues and create and support a safe space for students to articulate their identity. Meanwhile, many LGBT students on these campuses find voice and understanding in Black scholars and writers such as Audre Lorde’s Zami: A New Spelling of My Name and Charles Michael Smith’s Fighting Words: Personal Essays by Black Gay Men.

  12. Safe Distribution of Declarative Processes

    DEFF Research Database (Denmark)

    Hildebrandt, Thomas; Mukkamala, Raghava Rao; Slaats, Tijs

    2011-01-01

    of projections that covers a DCR Graph that the network of synchronously communicating DCR Graphs given by the projections is bisimilar to the original global process graph. We exemplify the distribution technique on a process identified in a case study of an cross-organizational case management system carried...... process model generalizing labelled prime event structures to a systems model able to finitely represent ω-regular languages. An operational semantics given as a transition semantics between markings of the graph allows DCR Graphs to be conveniently used as both specification and execution model....... The technique for distribution is based on a new general notion of projection of DCR Graphs relative to a subset of labels and events identifying the set of external events that must be communicated from the other processes in the network in order for the distribution to be safe.We prove that for any vector...

  13. Spark-safe power source

    Energy Technology Data Exchange (ETDEWEB)

    Mester, I M; Konushkin, N A; Nevozinskiy, A K; Rubinshteyn, B Sh; Serov, V I; Vasnev, M A

    1981-01-01

    A shortcoming of the known power sources is their low reliability. The purpose of the invention is to improve the reliability of the device. This is achieved because the spark-safe power source is equipped with a by-passing transistor and potentiometer, and also a generator of control interruptions in the circuit, an I-element, first separating transformer, control block, second separating transformer whose secondary winding has a relay winding whose contacts are connected to the load circuit are connected in series. The generator of control separations of the circuit is connected to the base of the by-passing transistor and to the power source outlet, the potentiometer is connected in series to the main thyristor. The middle point of the potentiometer is connected to the second inlet of the I-element.

  14. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  15. Dynamic isotope studies in liver disease

    Energy Technology Data Exchange (ETDEWEB)

    Weits, J

    1978-01-01

    Much information in the field of liver research has been gained by dynamic isotope studies. Clinically, these studies can help to settle selection criteria for different types of surgical shunt, which relieve the complications of portal hypertension. By performing splenoportoscintigraphy, splenic and portal vein thrombosis can be easily and safely excluded. So-called hypoxaemia of cirrhosis can most easily be diagnosed. Suprahepatic caval vein obstruction in a patient with cryptogenic liver disease is easily excluded by a radionuclide cavogram after injection of pertechnetate into a foot vein.

  16. Impact analysis of a hydrogen isotopes container

    International Nuclear Information System (INIS)

    Lee, M. S.; Hwang, C. S.; Jeong, H. S.

    2003-01-01

    The container used for the radioactive materials, containing hydrogen isotopes is evaluated in a view of hypothetical accident. The computational analysis is a cost effective tool to minimize testing and streamline the regulatory procedures, and supports experimental programs to qualify the container for the safe transport of radioactive materials. The numerical analysis of 9m free-drop onto a flat unyielding, horizontal surface has been performed using the explicit finite element computer program ABAQUS. Especially free-drop simulations for 30 .deg. C tilted condition are precisely estimated

  17. Chromium isotope variations

    DEFF Research Database (Denmark)

    D'Arcy, Joan Mary

    the δ53Cr value of continental runoff into the ocean. The major findings were that river water is characterised by heavy δ53Cr values (+0.1‰ to +1.6‰), while soils are characterised by light δ53Cr values (-0.3‰), relative to the catchment bedrock (-0.17‰ to -0.21‰), indicating that Cr isotopes......, and the quantification the Cr isotope composition of major Cr fluxes into and out of ocean. This thesis adds to the current knowledge of the Cr isotope system and is divided into two studies. The focus of the first study was to determine what processes control the Cr isotopic compositionof river water and to quantify......Chromium (Cr) stable isotopes are a useful tracer of changes in redox conditions because changes in its oxidation state are accompanied by an isotopic fractionation. For this reason the Cr isotope system is being developed as a potential tool for paleo-redox reconstruction. Dissolved Cr in seawater...

  18. Sources of Radioactive Isotopes for Dirty Bombs

    Science.gov (United States)

    Lubenau, Joel

    2004-05-01

    From the security perspective, radioisotopes and radioactive sources are not created equal. Of the many radioisotopes used in industrial applications, medical treatments, and scientific research, only eight, when present in relatively large amounts in radioactive sources, pose high security risks primarily because of their prevalence and physical properties. These isotopes are americium-241, californium-252, cesium-137, cobalt-60, iridium-192, radium-226, plutonium-238, and strontium-90. Except for the naturally occurring radium-226, nuclear reactors produce the other seven in bulk commercial quantities. Half of these isotopes emit alpha radiation and would, thus, primarily pose internal threats to health; the others are mainly high-energy gamma emitters and would present both external and internal health hazards. Therefore, the response to a "dirty bomb" event depends on what type of radioisotope is chosen and how it is employed. While only a handful of major corporations produce the reactor-generated radioisotopes, they market these materials to thousands of smaller companies and users throughout the world. Improving the security of the high-risk radioactive sources will require, among other efforts, cooperation among source suppliers and regulatory agencies.

  19. Safe injection procedures, injection practices, and needlestick ...

    African Journals Online (AJOL)

    Results: Safe injection procedures regarding final waste disposal were sufficiently adopted, while measures regarding disposable injection equipment, waste containers, hand hygiene, as well as injection practices were inadequately carried out. Lack of job aid posters that promote safe injection and safe disposal of ...

  20. Developing Safe Schools Partnerships with Law Enforcement

    Science.gov (United States)

    Rosiak, John

    2009-01-01

    Safe schools are the concern of communities throughout the world. If a school is safe, and if children feel safe, students "are better able to learn. But what are the steps to make" this happen? First, it is important to understand the problem: What are the threats to school safety? These include crime-related behaviors that find their way to…

  1. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  2. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  3. Isotopically controlled semiconductors

    Energy Technology Data Exchange (ETDEWEB)

    Haller, Eugene E.

    2006-06-19

    The following article is an edited transcript based on the Turnbull Lecture given by Eugene E. Haller at the 2005 Materials Research Society Fall Meeting in Boston on November 29, 2005. The David Turnbull Lectureship is awarded to recognize the career of a scientist who has made outstanding contributions to understanding materials phenomena and properties through research, writing, and lecturing, as exemplified by the life work of David Turnbull. Haller was named the 2005 David Turnbull Lecturer for his 'pioneering achievements and leadership in establishing the field of isotopically engineered semiconductors; for outstanding contributions to materials growth, doping and diffusion; and for excellence in lecturing, writing, and fostering international collaborations'. The scientific interest, increased availability, and technological promise of highly enriched isotopes have led to a sharp rise in the number of experimental and theoretical studies with isotopically controlled semiconductor crystals. This article reviews results obtained with isotopically controlled semiconductor bulk and thin-film heterostructures. Isotopic composition affects several properties such as phonon energies, band structure, and lattice constant in subtle, but, for their physical understanding, significant ways. Large isotope-related effects are observed for thermal conductivity in local vibrational modes of impurities and after neutron transmutation doping. Spectacularly sharp photoluminescence lines have been observed in ultrapure, isotopically enriched silicon crystals. Isotope multilayer structures are especially well suited for simultaneous self- and dopant-diffusion studies. The absence of any chemical, mechanical, or electrical driving forces makes possible the study of an ideal random-walk problem. Isotopically controlled semiconductors may find applications in quantum computing, nanoscience, and spintronics.

  4. Isotope separation process

    International Nuclear Information System (INIS)

    1976-01-01

    The invention relates to a process for separating a given material into two or more parts, in each of which the abundances of the isotopes of a given element differ from the abundances of the isotopes of the same material in the said material. More particularly, the invention relates to a method for the isotopically selective excitation of gas phase UF 6 by infrared photon absorption followed by selective reaction of said excited UF 6 with atomic chlorine, bromine, or iodine to form a product which may be separated by means known in the art

  5. Radiation gradient isotope separator

    International Nuclear Information System (INIS)

    Hughes, J.L.

    1980-01-01

    A system is described for transporting, separating and storing charged particles, charged antiparticles and fully or partially ionized isotopes of any element comprising a laser beam generator, laser beam intensity profiler, a laser beam variable intensity attenuator, and means for injecting charged particles, charged antiparticles and ionized isotopes into the beam and extracting them from the system as required. The invention is particularly useful for channelling electrons and ions used for fuel pellet compression in inertial fusion systems, for separating the isotopes of elements and for the confinement of charged antiparticles and particle/antiparticle plasmas

  6. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  7. Safe Handover : Safe Patients - The Electronic Handover System.

    Science.gov (United States)

    Till, Alex; Sall, Hanish; Wilkinson, Jonathan

    2014-01-01

    Failure of effective handover is a major preventable cause of patient harm. We aimed to promote accurate recording of high-quality clinical information using an Electronic Handover System (EHS) that would contribute to a sustainable improvement in effective patient care and safety. Within our hospital the human factors associated with poor communication were compromising patient care and unnecessarily increasing the workload of staff due to the poor quality of handovers. Only half of handovers were understood by the doctors expected to complete them, and more than half of our medical staff felt it posed a risk to patient safety. We created a standardised proforma for handovers that contained specific sub-headings, re-classified patient risk assessments, and aided escalation of care by adding prompts for verbal handover. Sources of miscommunication were removed, accountability for handovers provided, and tasks were re-organised to reduce the workload of staff. Long-term, three-month data showed that each sub-heading achieved at least 80% compliance (an average improvement of approximately 40% for the overall quality of handovers). This translated into 91% of handovers being subjectively clear to junior doctors. 87% of medical staff felt we had reduced a risk to patient safety and 80% felt it increased continuity of care. Without guidance, doctors omit key information required for effective handover. All organisations should consider implementing an electronic handover system as a viable, sustainable and safe solution to handover of care that allows patient safety to remain at the heart of the NHS.

  8. Atomic and molecular isotope separation

    International Nuclear Information System (INIS)

    Melamed, N.T.

    1979-01-01

    A method for differentially exciting a selected isotopic species in a mixture of isotopic species is described characterized in that almost the entire isotopic mixture is placed in an excited gaseous state; and a preselected isotopic species is then selectively de-excited through stimulated emission

  9. Health and safety plan for the Isotopes Facilities Deactivation Project at Oak Ridge National Laboratory, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1996-08-01

    This HASP describes the process for identifying the requirements, written safety documentation, and procedures for protecting personnel involved in the Isotopes Facilities Deactivation Project. Objective of this project is to place 19 former isotope production facilities at ORNL in a safe condition in anticipation of an extended period of minimum surveillance and maintenance

  10. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  11. Safe management of spent radiation source

    International Nuclear Information System (INIS)

    Kosako, Toshiso; Sugiura, Nobuyuki; Valdezco, E.M.; Choi, Kwang-Sub

    2003-01-01

    Presented are 8 investigation reports concerning the safe management of spent radiation source (SRS) during the current 2 years. Four reports from Japan are: Scheme for SRS management (approach and present status of the SRS management and consideration toward solving problems); Current International Atomic Energy Agency (IAEA) activities related to safety of radiation sources (Chronology of action plan development, Outline of revised action plan, and Asian regional activities); Current status of SRS management in Japan (Regulation system, Obligations of licensed users, Regulatory system on sealed sources, Status in the incidents on sources occurred, Incident of source loss, and Incidents of orphan sources); and SRS management system in Japan (Current status of using of sealed sources, collection system of SRS-Japan Radioisotope Association (JRIA) services, and Disposal of SRS). Four reports from the Asian countries also concern the current statuses of SRS management in the Philippine (Radioactive waste sources, Waste management strategies, Conditioning of Ra sources, Ra project action plan, as low as reasonably achievable (ALARA) program, Dose assessment, Regulations on radioactive waste, Action plan on the safety and security of sources, IAEA Regional Demonstration Centers, and sitting studies for a near surface disposal facility); Thailand (Current status of using sealed sources, Inventory of SRS, and Current topics of SRS management); Indonesia (Principles of management of radiation sources, Legislative framework of SRS management practices, Regulatory on SRS, management of sealed SRS, management hurdles, and reported incidents); and Korea (Regulatory frame work, Collection systems of SRS, Radioisotope waste generation, Radiation exposure incident, and Scrap monitoring system). (N.I.)

  12. Proceedings of TopSafe 2008 Transactions

    International Nuclear Information System (INIS)

    2008-01-01

    The aim of the conference is to provide a forum for addressing the current status and future perspectives with regards to safety at nuclear installations worldwide. Previous TopSafe editions took place in Budapest (1995) and Valencia (1998). The conference is directed at a broad range of experts in the area of nuclear safety, including professionals from the different disciplines involved in the safety of nuclear power plants, installations in other parts of the fuel cycle, and research reactors. It is aimed at professionals coming from the research organisations, universities, vendors, operators, regulatory bodies as well as policy makers. Top level representatives of the Countries that are constructing new nuclear power plants are invited. Regulators of all individual Countries with nuclear programme are expected to contribute the Conference. The topics of the conference are: Safety Issues of Operating Power Plants PWR and BWR, CANDU, WWER, RBMK; Application of European Utilities Requirements; Probabilistic and Deterministic Analysis; Shutdown Safety; Advances in Safety: Analysis Codes and Techniques; Severe Accidents Management; International Safety Studies; Emergency Planning; Risk Informed Application and Licensing; Regulatory Safety Requirements; Ageing and Life Extension; Power Upgrades and Relevant Topics; Management of Safety and Quality; Safety Culture and Self Assessment; Political and Public Perception of Nuclear Energy; Nuclear Power Plant Security; Safety Issues of Future Power Plants-Near term deployment reactors (EPR, SWR1000, AP1000, ESBWR, SBWR, ACR-1000) and Generation IV reactors; Safety Issues of Research Reactors (pool type and others); Fuel Cycle Facilities Safety-Uranium mining and conversion, enrichment and fuel production, reprocessing and transmutation, waste disposal. (authors)

  13. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  14. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  15. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  16. Isotope Production Facility (IPF)

    Data.gov (United States)

    Federal Laboratory Consortium — The Los Alamos National Laboratory has produced radioactive isotopes for medicine and research since the mid 1970s, when targets were first irradiated using the 800...

  17. Calcium stable isotope geochemistry

    Energy Technology Data Exchange (ETDEWEB)

    Gausonne, Nikolaus [Muenster Univ. (Germany). Inst. fuer Mineralogie; Schmitt, Anne-Desiree [Strasbourg Univ. (France). LHyGeS/EOST; Heuser, Alexander [Bonn Univ. (Germany). Steinmann-Inst. fuer Geologie, Mineralogie und Palaeontologie; Wombacher, Frank [Koeln Univ. (Germany). Inst. fuer Geologie und Mineralogie; Dietzel, Martin [Technische Univ. Graz (Austria). Inst. fuer Angewandte Geowissenschaften; Tipper, Edward [Cambridge Univ. (United Kingdom). Dept. of Earth Sciences; Schiller, Martin [Copenhagen Univ. (Denmark). Natural History Museum of Denmark

    2016-08-01

    This book provides an overview of the fundamentals and reference values for Ca stable isotope research, as well as current analytical methodologies including detailed instructions for sample preparation and isotope analysis. As such, it introduces readers to the different fields of application, including low-temperature mineral precipitation and biomineralisation, Earth surface processes and global cycling, high-temperature processes and cosmochemistry, and lastly human studies and biomedical applications. The current state of the art in these major areas is discussed, and open questions and possible future directions are identified. In terms of its depth and coverage, the current work extends and complements the previous reviews of Ca stable isotope geochemistry, addressing the needs of graduate students and advanced researchers who want to familiarize themselves with Ca stable isotope research.

  18. Isotope separation process

    International Nuclear Information System (INIS)

    Lyon, R.K.

    1977-01-01

    The instant invention relates to a process for separating a material into two or more parts in each of which the abundances of the isotopes of a given element differ from the abundances of the isotopes of the same material in said material. More particularly, the invention relates to a method for the isotopically selective excitation of gas phase molecules by multiple infrared photon absorption followed by a step wherein more of the excited molecules than nonexcited molecules are converted to a chemically different form which may be separated by means known in the art. This invention is useful for, but not limited to, the separation of the principal isotopes of uranium. 15 claims, 1 figure

  19. Isotope separation process

    International Nuclear Information System (INIS)

    Thomas, W.R.L.

    1979-01-01

    The instant invention relates to an improved process for separating a material into two or more parts in each of which the abundances of the isotopes of a given element differ from the abundances of the isotopes of the same element in said material. More particularly, the invention relates to a method for the isotopically selective excitation of gas phase molecules by multiple infrared photon absorption followed by a step wherein more of the excited molecules than non-excited molecules are converted to a chemically different form which may be separated by means known in the art. This invention is useful for, but not limited to, the separation of the principal isotopes of uranium

  20. Calcium stable isotope geochemistry

    International Nuclear Information System (INIS)

    Gausonne, Nikolaus; Schmitt, Anne-Desiree; Heuser, Alexander; Wombacher, Frank; Dietzel, Martin; Tipper, Edward; Schiller, Martin

    2016-01-01

    This book provides an overview of the fundamentals and reference values for Ca stable isotope research, as well as current analytical methodologies including detailed instructions for sample preparation and isotope analysis. As such, it introduces readers to the different fields of application, including low-temperature mineral precipitation and biomineralisation, Earth surface processes and global cycling, high-temperature processes and cosmochemistry, and lastly human studies and biomedical applications. The current state of the art in these major areas is discussed, and open questions and possible future directions are identified. In terms of its depth and coverage, the current work extends and complements the previous reviews of Ca stable isotope geochemistry, addressing the needs of graduate students and advanced researchers who want to familiarize themselves with Ca stable isotope research.

  1. Laser separation of uranium isotopes

    International Nuclear Information System (INIS)

    Porter, J.T.

    1981-01-01

    Method and apparatus for separating uranium isotopes are claimed. The method comprises the steps of irradiating a uranyl source material at a wavelength selective to a desired isotope and at an effective temperature for isotope spectral line splitting below about 77 deg.K., further irradiating the source material within the fluorescent lifetime of the source material to selectively photochemically reduce the excited isotopic species, and chemically separating the reduced isotope species from the remaining uranyl salt compound

  2. High mass isotope separation arrangement

    International Nuclear Information System (INIS)

    Eerkens, J.W.

    1980-01-01

    This invention relates to the isotope separation art and, more particularly, to a selectively photon-induced energy level transition of an isotopic molecule containing the isotope to be separated and a chemical reaction with a chemically reactive agent to provide a chemical compound containing atoms of the isotope desired. In particular a description is given of a method of laser isotope separation applied to the separation of 235 UF 6 from 238 UF 6 . (U.K.)

  3. Safe Handover : Safe Patients – The Electronic Handover System

    Science.gov (United States)

    Till, Alex; Sall, Hanish; Wilkinson, Jonathan

    2014-01-01

    Failure of effective handover is a major preventable cause of patient harm. We aimed to promote accurate recording of high-quality clinical information using an Electronic Handover System (EHS) that would contribute to a sustainable improvement in effective patient care and safety. Within our hospital the human factors associated with poor communication were compromising patient care and unnecessarily increasing the workload of staff due to the poor quality of handovers. Only half of handovers were understood by the doctors expected to complete them, and more than half of our medical staff felt it posed a risk to patient safety. We created a standardised proforma for handovers that contained specific sub-headings, re-classified patient risk assessments, and aided escalation of care by adding prompts for verbal handover. Sources of miscommunication were removed, accountability for handovers provided, and tasks were re-organised to reduce the workload of staff. Long-term, three-month data showed that each sub-heading achieved at least 80% compliance (an average improvement of approximately 40% for the overall quality of handovers). This translated into 91% of handovers being subjectively clear to junior doctors. 87% of medical staff felt we had reduced a risk to patient safety and 80% felt it increased continuity of care. Without guidance, doctors omit key information required for effective handover. All organisations should consider implementing an electronic handover system as a viable, sustainable and safe solution to handover of care that allows patient safety to remain at the heart of the NHS. PMID:26734244

  4. Emission spectrometric isotope analyzer

    International Nuclear Information System (INIS)

    Mauersberger, K.; Meier, G.; Nitschke, W.; Rose, W.; Schmidt, G.; Rahm, N.; Andrae, G.; Krieg, D.; Kuefner, W.; Tamme, G.; Wichlacz, D.

    1982-01-01

    An emission spectrometric isotope analyzer has been designed for determining relative abundances of stable isotopes in gaseous samples in discharge tubes, in liquid samples, and in flowing gaseous samples. It consists of a high-frequency generator, a device for defined positioning of discharge tubes, a grating monochromator with oscillating slit and signal converter, signal generator, window discriminator, AND connection, read-out display, oscillograph, gas dosing device and chemical conversion system with carrier gas source and vacuum pump

  5. Isotope toolbox turns 10

    DEFF Research Database (Denmark)

    Wenander, Fredrik; Riisager, Karsten

    2012-01-01

    REX-ISOLDE, one of CERN’s most compact accelerators, has just celebrated its 10th anniversary. The machine’s versatility provides radioactive ion beams across the range of nuclear isotopes.......REX-ISOLDE, one of CERN’s most compact accelerators, has just celebrated its 10th anniversary. The machine’s versatility provides radioactive ion beams across the range of nuclear isotopes....

  6. Laser isotope separation

    International Nuclear Information System (INIS)

    1976-01-01

    The claimed invention is a method of isotope separation based on the unimolecular decomposition of vibrationally excited negative ions which are produced in the reaction of thermal electrons and molecules which have been vibrationally excited in an isotope selective manner. This method is especially applicable to molecules represented by the formula MF 6 wherein M is selected from the group consisting of U, S, W, Se, Te, Mo, Re and Tc

  7. UWIS isotope separator

    Energy Technology Data Exchange (ETDEWEB)

    Wojtasiewicz, A. [Warsaw Univ., Inst. of Experimental Physics, Nuclear Physics Div., Warsaw (Poland)

    1997-12-31

    Since 1995 the University of Warsaw Isotope Separator group has participated in the ISOL/IGISOL project at the Heavy Ion Cyclotron. This project consists in installation of an isotope separator (on line with cyclotron heavy ion beam) with a hot plasma ion source (ISOL system) and/or with an ion guide source (IGISOL system). In the report the short description of the present status of the project is presented. 2 figs, 10 refs.

  8. Laser isotope separation process

    International Nuclear Information System (INIS)

    Kaldor, A.

    1976-01-01

    The claimed invention is a method of isotope separation based on the unimolecular decomposition of vibrationally excited negative ions which are produced in the reaction of thermal electrons and molecules which have been vibrationally excited in an isotope selective manner. This method is especially applicable to molecules represented by the formula MF 6 wherein M is selected from the group consisting of U, S, W, Se, Te, Mo, Re, and Tc. 9 claims, 1 drawing figure

  9. Isotopes in environmental research

    International Nuclear Information System (INIS)

    Bowen, G.; Rozanski, K.; Vose, P.

    1990-01-01

    Radioactive and stable isotopes have long been considered a very efficient tool for studying physical and biological aspects of how the global ecosystem functions. Their applications in environmental research are numerous, embracing research at all levels. This article looks at only a few of the approaches to environmental problems that involve the use of isotopes. Special attention is given to studies of the Amazon Basin. Environmental isotopes are very efficient tools in water cycle studies. Tritium, a radioactive tracer, is especially useful in studying dynamics of water movement in different compartments of the hydrosphere, both on the local and global scales. Heavy stable isotopes of hydrogen and oxygen (deuterium and oxygen-18) provide information about steady-state characteristics of the water cycle. Isotope methods, some relatively new, have a major role in site-specific studies. Some indicative examples include: Studying turnover of organic matter. Changes in the carbon-13/carbon-12 isotopic ratio of organic matter were used to determine the respective contributions of organic carbon derived from forest and pasture. Studying biological nitrogen fixation. One of the ways nitrogen levels in soil can be maintained for productivity is by biological nitrogen fixation. Studying nitrogen availability and losses. The experimental use of nitrogen-15 is invaluable for defining losses of soil nitrogen to the atmosphere and to groundwater. Studies can similarly be done with stable and radioactive sulphur isotopes. This article indicates some potential uses of isotopes in environmental research. While the major problem of global climate change has not been specifically addressed here, the clearing of the Amazon forest, one focus of the IAEA's environmental programme, may have serious consequences for the global climate. These include substantial reduction of the amount of latent heat transported to the regions outside the tropics and acceleration of the greenhouse

  10. Isotopes in everyday life

    International Nuclear Information System (INIS)

    Seligman, H.; Gillen, V.A.

    1990-12-01

    Isotopes represent a tool which can do certain jobs better, easier, quicker, more simply and cheaper than competitive methods. Some measurements could not be done at all without the use of isotopes as there are no alternative methods available. A short review of these tools of science in their different fields is given: food and agriculture, human health applications, industry, hydrology, geology, geochemistry, geophysics and dating, environment, basic scientific research

  11. Isotope separation process

    International Nuclear Information System (INIS)

    Cabicar, J.; Stamberg, K.; Katzer, J.

    1983-01-01

    A process for separating isotopes by the method of controlled distribution is claimed. A first phase is either a solution of isotopic components and a ligand (from 10 - 6 M to a saturated solution), or a gaseous mixture of isotopic components, or a gaseous mixture of isotopic components and an inert gas. The isotopes are in the starting mixture in molar ratio from 1:10 5 to 1:10 - 5 . The second phase is a solid sorbent such as styrene-divinylbenzene ion exchangers, or bio-sorbents on the basis of mycelium of lower fungi and sorbents on the basis of cellulose, or an extraction agent such as tributyl phosphate and trioctyl amine, if need be, kept by a carrier such as teflon, silica gel and cellulose. The two-phase system exhibits non-linear equilibrium isotherm for sorption and/or desorption or for extraction and/or re-extraction. After bringing both phases into contact the rate of transport of isotopic components from one phase into another is not equal. Retardation of isotopic exchange takes place by complexation of isotopes with ligands such as cabonate, sulphate, citrate, chloride and ethylenediamine tetraacetate ions, or by using sorbents and extraction agents with chelating functional groups such as carboxyl and hyroxyl groups, groups on the basis of phosphorus, nitrogen and sulphur and/or by operating in darkness, or in the light having wave length between 2.5x10 2 and 10 9 nm. The contact time is between 10 - 2 and 10 6 s, temperature between 10 2 and 10 3 K, the number of stirrer revolutions between 10 - 2 and 10 4 revolutions per s, flow rate at column arrangement between 10 - 6 and 10 - 1 m/s and the size of particles of sorbent between 10 - 6 and 10 - 2 m

  12. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  13. Isotope separation apparatus

    International Nuclear Information System (INIS)

    Lyon, R.K.; Eisner, P.N.; Thomas, W.R.I.

    1983-01-01

    This application discloses a method for and an apparatus in which isotopes of an element in a compared are separated from each other while that compound, i.e., including a mixture of such isotopes, flows along a predetermined path. The apparatus includes a flow tube having a beginning and an end. The mixture of isotopes is introduced into the flow tube at a first introduction point between the beginning and the end thereof to flow the mixture toward the end thereof. A laser irradiates the flow tube dissociating compounds of a preselected one of said isotopes thereby converting the mixture in an isotopically selective manner. The dissociation products are removed from the tube at a first removal point between the first introduction point and the end. The dissociation product removed at the the first removal point are reconverted back into the comound thereby providing a first stage enriched compound. This first stage enriched compound is reintroduced into the flow tube at a second introduction point between the beginning thereof and the first introduction point. Further product is removed from the flow tube at a second removal point between the second introduction point and the first introduction point. The second introduction point is chosen so that the isotope composition of the first stage enriched compound is approximately the same as that of the compound in the flow tube

  14. International Isotopes Markets

    Directory of Open Access Journals (Sweden)

    Stanislaw Z. Zhiznin

    2016-01-01

    Full Text Available The paper studies world markets of stable and radioactive isotopes. Isotopes have found various applications in science, industry, agriculture and other sectors of the economy, but especially - in medicine. Nuclear medicine is developing intensively all over the world thanks to the success in the treatment of various diseases with the help of radioactive pharmaceuticals (radiopharmaceuticals. The article uses empirical data from a forecast study of the global radiopharmaceuticals market made in 2015 by a research company «Markets and Markets» for the European, North American and global markets. The paper also analyzes the statistical data on the global export and import of natural uranium, enriched and depleted uranium, plutonium, thorium and some stable isotopes of non-medical purposes, presented by a company «Trend economy» in 2014. Despite a unique industrial base for the production of isotopes created in the Soviet Union Russia occupies a modest position on the world market of nuclear medicine except for certain areas. More than 80% of isotopes, produced in USSR were consumed domestically, the export of the stable and radioactive isotopes was in equal proportions. Now the country's domestic radiopharmaceuticals market is poorly developed. To radically change the situation, it is necessary to carry out reforms that stimulate the development of nuclear medicine.

  15. Beneficial use of isotopes

    International Nuclear Information System (INIS)

    Bertel, E.; Stevens, G.H.

    1998-01-01

    The paper gives an outlook on the main isotopes currently used for beneficial applications, provides an overview on geographic distribution of isotope production capabilities and identifies the main suppliers world-wide. It analyses trends in different countries and regions, including the refurbishment and/or replacement of ageing facilities and the implementation of new capabilities. Issues related to adequate supply of isotopes and potential under or over capacity of production for some key products are discussed. The evolution of the isotope production sector is analysed. Issues such as lowering of governmental support to production facilities, emergence of international co-operation and agreements on production capabilities, and developments in non-OECD/NEA countries are addressed. The paper offers some concluding remarks on the importance of maintaining and enhancing beneficial uses of isotopes, the role of government policies, the need for co-operation between countries and between the private and public sectors. The paper addresses the role of international cooperation in making efficient use of existing isotope production capacity and investigates ways for reducing the need for investment in additional capacity. (author)

  16. Eye safe laser range finders

    International Nuclear Information System (INIS)

    Snir, M.; Margaliot, M.; Amitzi, A.

    2004-01-01

    During the 1970's, Ruby (Q switched) laser based range finders with a wavelength of 694nm were first used. These lasers operated in a pulse mode within the visible light range and produced a risk for the eye retina. The laser beam striking the macula could damage the eye and might cause blindness. Over the years, Nd:YAG (Q switched) lasers were developed (operating at 1064nm) for range finding and designation uses. The wavelength of these lasers, operating in the near Infra-Red range (invisible), is also focused tightly on the retina. The human eye does not respond to the invisible light so there is no natural protection (eye blink reflex) as in the visible light. The operation of these lasers worldwide, especially when the laser beam is exposed, causes occasional eye accidents. Another risk is stemming from the use of observation systems with a high optical gain, in the laser operation areas, which enlarge the range of risk quite significantly. Therefore, research and development efforts were invested in order to introduce eye safe lasers. One of the solutions for this problem is presented in following document

  17. Working safely with radioactive materials

    International Nuclear Information System (INIS)

    Davies, Wynne

    1993-01-01

    In common with exposure to many other laboratory chemicals, exposure to ionising radiations and to radioactive materials carries a small risk of causing harm. Because of this, there are legal limits to the amount of exposure to ionising radiations at work and special rules for working with radioactive materials. Although radiation protection is a complex subject it is possible to simplify to 10 basic things you should do -the Golden Rules. They are: 1) understand the nature of the hazard and get practical training; 2) plan ahead to minimise time spent handling radioactivity; 3) distance yourself appropriately from sources of radiation; 4) use appropriate shielding for the radiation; 5) contain radioactive materials in defined work areas; 6) wear appropriate protective clothing and dosimeters; 7) monitor the work area frequently for contamination control; 8) follow the local rules and safe ways of working; 9) minimise accumulation of waste and dispose of it by appropriate routes, and 10) after completion of work, monitor, wash, and monitor yourself again. These rules are expanded in this article. (author)

  18. Materials for passively safe reactors

    International Nuclear Information System (INIS)

    Simnad, T.

    1993-01-01

    Future nuclear power capacity will be based on reactor designs that include passive safety features if recent progress in advanced nuclear power developments is realized. There is a high potential for nuclear systems that are smaller and easier to operate than the current generation of reactors, especially when passive or intrinsic characteristics are applied to provide inherent stability of the chain reaction and to minimize the burden on equipment and operating personnel. Taylor, has listed the following common generic technical features as the most important goals for the principal reactor development systems: passive stability, simplification, ruggedness, case of operation, and modularity. Economic competitiveness also depends on standardization and assurance of licensing. The performance of passively safe reactors will be greatly influenced by the successful development of advanced fuels and materials that will provide lower fuel-cycle costs. A dozen new designs of advanced power reactors have been described recently, covering a wide spectrum of reactor types, including pressurized water reactors, boiling water reactors, heavy-water reactors, modular high-temperature gas-cooled reactors (MHTGRs), and fast breeder reactors. These new designs address the need for passive safety features as well as the requirement of economic competitiveness

  19. Safe and green nuclear power

    International Nuclear Information System (INIS)

    Kushwaha, H.S.

    2010-01-01

    Energy development plays an important role in the national economic growth. Presently the per capita consumption of energy in our country is about 750 kWh including captive power generation which is low in comparison to that in the developed countries like USA where it is about 12,000 kWh. As of now the total installed capacity of electricity generation is about 152,148 MW(e) which is drawn from Thermal (65%), Hydel (24%), Nuclear (3%) power plants and Renewables (8%). It is expected that by the end of year 2020, the required installed capacity would be more than 3,00,000 MW(e), if we assume per capita consumption of about 800-1000 kWh for Indian population of well over one billion. To meet the projected power requirement in India, suitable options need to be identified and explored for generation of electricity. For choosing better alternatives various factors such as availability of resources, potential to generate commercial power, economic viability, etc. need to be considered. Besides these factors, an important factor which must be taken into consideration is protection of environment around the operating power stations. This paper attempts to demonstrate that the nuclear power generation is an environmentally benign option for meeting the future requirement of electricity in India. It also discusses the need for creating the public awareness about the safe operations of the nuclear power plants and ionising radiation. (author)

  20. SAFE testing nuclear rockets economically

    International Nuclear Information System (INIS)

    Howe, Steven D.; Travis, Bryan; Zerkle, David K.

    2003-01-01

    Several studies over the past few decades have recognized the need for advanced propulsion to explore the solar system. As early as the 1960s, Werner Von Braun and others recognized the need for a nuclear rocket for sending humans to Mars. The great distances, the intense radiation levels, and the physiological response to zero-gravity all supported the concept of using a nuclear rocket to decrease mission time. These same needs have been recognized in later studies, especially in the Space Exploration Initiative in 1989. One of the key questions that has arisen in later studies, however, is the ability to test a nuclear rocket engine in the current societal environment. Unlike the Rover/NERVA programs in the 1960s, the rocket exhaust can no longer be vented to the open atmosphere. As a consequence, previous studies have examined the feasibility of building a large-scale version of the Nuclear Furnace Scrubber that was demonstrated in 1971. We have investigated an alternative that would deposit the rocket exhaust along with any entrained fission products directly into the ground. The Subsurface Active Filtering of Exhaust, or SAFE, concept would allow variable sized engines to be tested for long times at a modest expense. A system overview, results of preliminary calculations, and cost estimates of proof of concept demonstrations are presented. The results indicate that a nuclear rocket could be tested at the Nevada Test Site for under $20 M

  1. The Effects of Prompting and Reinforcement on Safe Behavior of Bicycle and Motorcycle Riders

    Science.gov (United States)

    Okinaka, Takeru; Shimazaki, Tsuneo

    2011-01-01

    A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was…

  2. 29 CFR 2550.404a-2 - Safe harbor for automatic rollovers to individual retirement plans.

    Science.gov (United States)

    2010-07-01

    ... retirement plans. 2550.404a-2 Section 2550.404a-2 Labor Regulations Relating to Labor (Continued) EMPLOYEE... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-2 Safe..., whether or not such return is guaranteed, consistent with liquidity; (ii) For purposes of paragraph (c)(3...

  3. 29 CFR 2550.404a-3 - Safe harbor for distributions from terminated individual account plans.

    Science.gov (United States)

    2010-07-01

    ... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-3 Safe... rate of return, whether or not such return is guaranteed, consistent with liquidity (except that... liquidity; (v) A statement explaining what fees, if any, will be paid from the participant or beneficiary's...

  4. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    Science.gov (United States)

    Jung, Jaewoo; Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  5. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  6. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  7. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  8. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  9. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  10. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  11. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  12. Security Measures to Protect Mobile Agents

    Science.gov (United States)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  13. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  14. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  15. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  16. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  17. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  18. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  19. Safe prescribing: a titanic challenge.

    Science.gov (United States)

    Routledge, Philip A

    2012-10-01

    The challenge to achieve safe prescribing merits the adjective 'titanic'. The organisational and human errors leading to poor prescribing (e.g. underprescribing, overprescribing, misprescribing or medication errors) have parallels in the organisational and human errors that led to the loss of the Titanic 100 years ago this year. Prescribing can be adversely affected by communication failures, critical conditions, complacency, corner cutting, callowness and a lack of courage of conviction, all of which were also factors leading to the Titanic tragedy. These issues need to be addressed by a commitment to excellence, the final component of the 'Seven C's'. Optimal prescribing is dependent upon close communication and collaborative working between highly trained health professionals, whose role is to ensure maximum clinical effectiveness, whilst also protecting their patients from avoidable harm. Since humans are prone to error, and the environments in which they work are imperfect, it is not surprising that medication errors are common, occurring more often during the prescribing stage than during dispensing or administration. A commitment to excellence in prescribing includes a continued focus on lifelong learning (including interprofessional learning) in pharmacology and therapeutics. This should be accompanied by improvements in the clinical working environment of prescribers, and the encouragement of a strong safety culture (including reporting of adverse incidents as well as suspected adverse drug reactions whenever appropriate). Finally, members of the clinical team must be prepared to challenge each other, when necessary, to ensure that prescribing combines the highest likelihood of benefit with the lowest potential for harm. © 2012 The Author. British Journal of Clinical Pharmacology © 2012 The British Pharmacological Society.

  20. Safe prescribing: a titanic challenge

    Science.gov (United States)

    Routledge, Philip A

    2012-01-01

    The challenge to achieve safe prescribing merits the adjective ‘titanic’. The organisational and human errors leading to poor prescribing (e.g. underprescribing, overprescribing, misprescribing or medication errors) have parallels in the organisational and human errors that led to the loss of the Titanic 100 years ago this year. Prescribing can be adversely affected by communication failures, critical conditions, complacency, corner cutting, callowness and a lack of courage of conviction, all of which were also factors leading to the Titanic tragedy. These issues need to be addressed by a commitment to excellence, the final component of the ‘Seven C's’. Optimal prescribing is dependent upon close communication and collaborative working between highly trained health professionals, whose role is to ensure maximum clinical effectiveness, whilst also protecting their patients from avoidable harm. Since humans are prone to error, and the environments in which they work are imperfect, it is not surprising that medication errors are common, occurring more often during the prescribing stage than during dispensing or administration. A commitment to excellence in prescribing includes a continued focus on lifelong learning (including interprofessional learning) in pharmacology and therapeutics. This should be accompanied by improvements in the clinical working environment of prescribers, and the encouragement of a strong safety culture (including reporting of adverse incidents as well as suspected adverse drug reactions whenever appropriate). Finally, members of the clinical team must be prepared to challenge each other, when necessary, to ensure that prescribing combines the highest likelihood of benefit with the lowest potential for harm. PMID:22738396

  1. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  2. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  3. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  4. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  5. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  6. National and international safety, safeguardability and security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    All nuclear power and fuel cycle facility development must comply with the predecided national regulation and security codes which each country's Atomic Energy Commission stipulates. Those codes will basically evolve as technologies and the social system will develop, change and shift. It is also to be noted that the IAEA's international guidelines have been adopted particularly by developing countries as a good reference for their proper establishment of their safety codes. The report first discusses the plant safety regulation of the inherently safe reactors in comparison to the existing code (or licensing guide) of the Japanese government. Then the new trend seen now in a regulatory body (the US NRC) is reviewed and a proposal of the smooth transition into the new philosophy is presented. In the second part of the paper, the fuel safeguarding and facility security (or physical protection) are discussed, because in the case of inherently safe reactors like ISER-PIUS, it seems that safety has much more to do with the safeguard and the security. In the third part, the international relevances to the security of the ISER-PIUS are discussed, because any ISER-PIUS will be meaningless unless they are used extensively and freely in any part of the world precluding the security concerns. In collaborative use of the state and international codes, regulatory guides and practices, it is evident that ISER-PIUS system can clear the requirements on all the aspects by ample margin. (Nogami, K.)

  7. Transportation of medical isotopes

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, D.L.

    1997-11-19

    A Draft Technical Information Document (HNF-1855) is being prepared to evaluate proposed interim tritium and medical isotope production at the Fast Flux Test Facility (FFTF). This assessment examines the potential health and safety impacts of transportation operations associated with the production of medical isotopes. Incident-free and accidental impacts are assessed using bounding source terms for the shipment of nonradiological target materials to the Hanford Site, the shipment of irradiated targets from the FFTF to the 325 Building, and the shipment of medical isotope products from the 325 Building to medical distributors. The health and safety consequences to workers and the public from the incident-free transportation of targets and isotope products would be within acceptable levels. For transportation accidents, risks to works and the public also would be within acceptable levels. This assessment is based on best information available at this time. As the medical isotope program matures, this analysis will be revised, if necessary, to support development of a final revision to the Technical Information Document.

  8. Isotope separation process

    International Nuclear Information System (INIS)

    Wexler, Sol; Young, C.E.

    1976-01-01

    Description is given of method for separating a specific isotope from a mixture of isotopes of an actinide element present as MF 6 , wherein M is the actinide element. It comprises: preparing a feed gas mixture of MF 6 in a propellant gas; passing the feed gas mixture under pressure through an expansion nozzle while heating the mixture to about 600 0 C; releasing the heated gas mixture from the nozzle into an exhaust chamber having a reduced pressure, whereby a gas jet of MF 6 molecules, MF 6 molecular clusters and propellant gas molecules is formed, the MF 6 molecules having a translational energy of about 3 eV; converting the MF 6 molecules to MF 6 ions by passing the jet through a cross jet of electron donor atoms so that an electron transfer takes place between the MF 6 - molecules and the electron donor atoms whereby the jet is now quasi-neutral, containing negative MF 6 - ions and positive donor ions; passing the quasi-neutral jet through a radiofrequency mass filter tuned to separate the MF 6 ions containing the specific isotope from the MF 6 - ions of the other isotopes and neutralizing and collecting the MF 6 molecules of the specific isotope [fr

  9. Noncovalent Hydrogen Isotope Effects

    Science.gov (United States)

    Buchachenko, A. L.; Breslavskaya, N. N.

    2018-02-01

    Zero-point energies (ZPE) and isotope effects, induced by intermolecular, noncovalent vibrations, are computed and tested by experimental data. The ZPE differences of H- and D-complexes of water with hydrogen, methane, and water molecules are about 100-300 cal/mol; they result to isotope effects IE of 1.20-1.70. Semi-ionic bonds between metal ions and water ligands in M(H2O) 6 2+ complexes are much stronger; their ZPEs are about 12-14 kcal/mol per molecule and result to IE of 1.9-2.1 at 300 K. Protonated (deuterated) water and biwater exhibit the largest ZPE differences and isotope effects; the latter are 25-28 and 12-13 for water and biwater, respectively. Noncovalent IEs contribute markedly into the experimentally measured effects and explain many anomalous and even magic properties of the effects, such as the dependence of IE on the solvents and on the presence of the third substances, enormously large isotope effects at the mild conditions, the difference between IEs measured in the reactions of individual protiated and deuterated compounds and those measured in their mixture. Noncovalent IEs are not negligible and should be taken into account to make correct and substantiated conclusions on the reaction mechanisms. The kinetic equations are derived for the total isotope effects, which include noncovalent IEs as additive factors.

  10. Transportation of medical isotopes

    International Nuclear Information System (INIS)

    Nielsen, D.L.

    1997-01-01

    A Draft Technical Information Document (HNF-1855) is being prepared to evaluate proposed interim tritium and medical isotope production at the Fast Flux Test Facility (FFTF). This assessment examines the potential health and safety impacts of transportation operations associated with the production of medical isotopes. Incident-free and accidental impacts are assessed using bounding source terms for the shipment of nonradiological target materials to the Hanford Site, the shipment of irradiated targets from the FFTF to the 325 Building, and the shipment of medical isotope products from the 325 Building to medical distributors. The health and safety consequences to workers and the public from the incident-free transportation of targets and isotope products would be within acceptable levels. For transportation accidents, risks to works and the public also would be within acceptable levels. This assessment is based on best information available at this time. As the medical isotope program matures, this analysis will be revised, if necessary, to support development of a final revision to the Technical Information Document

  11. Isotope methods in hydrology

    International Nuclear Information System (INIS)

    Moser, H.; Rauert, W.

    1980-01-01

    Of the investigation methods used in hydrology, tracer methods hold a special place as they are the only ones which give direct insight into the movement and distribution processes taking place in surface and ground waters. Besides the labelling of water with salts and dyes, as in the past, in recent years the use of isotopes in hydrology, in water research and use, in ground-water protection and in hydraulic engineering has increased. This by no means replaces proven methods of hydrological investigation but tends rather to complement and expand them through inter-disciplinary cooperation. The book offers a general introduction to the application of various isotope methods to specific hydrogeological and hydrological problems. The idea is to place the hydrogeologist and the hydrologist in the position to recognize which isotope method will help him solve his particular problem or indeed, make a solution possible at all. He should also be able to recognize what the prerequisites are and what work and expenditure the use of such methods involves. May the book contribute to promoting cooperation between hydrogeologists, hydrologists, hydraulic engineers and isotope specialists, and thus supplement proven methods of investigation in hydrological research and water utilization and protection wherever the use of isotope methods proves to be of advantage. (orig./HP) [de

  12. The right to adequate and safe working conditions in Ukraine

    Directory of Open Access Journals (Sweden)

    Едуард Валентинович Гаврилов

    2016-06-01

    Full Text Available The special attention is given to the rights of the citizens for independent and safe working conditions. The rights secured by law and guaranteed of each among workers and employers have been considered. The court case on infliction of harm to health in the performance of job duties has been analyzed. Taking this case as an example one can see different possible ways of its solution that cause controversy and contradictions. The Court of First Instance takes the side of the employer, Court of Appeal – on the side of the victim and consideration of the case on cassation appeal - shows only that the state taking the role of the judge is on the employer side not on the side of the worker as a victim. So, one can see that course of the state policy secured by legislators in the numerous normative acts and being reflection of the constitutional principle of the recognition by the state of  the human being, his or her life and health, honour and dignity, inviolability and security as the highest social value that is foreseen by Article 3 and by the provision of Part 4 Article 43 of the Basic Law does not correspond to the realities of life.

  13. Be-safe travel, a web-based geographic application to explore safe-route in an area

    Science.gov (United States)

    Utamima, Amalia; Djunaidy, Arif

    2017-08-01

    In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.

  14. Separation of uranium isotopes by accelerated isotope exchange reactions

    International Nuclear Information System (INIS)

    Seko, M.; Miyake, T.; Inada, K.; Ochi, K.; Sakamoto, T.

    1977-01-01

    A novel catalyst for isotope exchange reaction between uranium(IV) and uranium(VI) compounds enables acceleration of the reaction rate as much as 3000 times to make industrial separation of uranium isotopes economically possible

  15. Target-fueled nuclear reactor for medical isotope production

    Science.gov (United States)

    Coats, Richard L.; Parma, Edward J.

    2017-06-27

    A small, low-enriched, passively safe, low-power nuclear reactor comprises a core of target and fuel pins that can be processed to produce the medical isotope .sup.99Mo and other fission product isotopes. The fuel for the reactor and the targets for the .sup.99Mo production are the same. The fuel can be low enriched uranium oxide, enriched to less than 20% .sup.235U. The reactor power level can be 1 to 2 MW. The reactor is passively safe and maintains negative reactivity coefficients. The total radionuclide inventory in the reactor core is minimized since the fuel/target pins are removed and processed after 7 to 21 days.

  16. Safe management of waste from health-care activities

    International Nuclear Information System (INIS)

    Pruess, A.; Giroult, E.; Rushbrook, P.

    1999-01-01

    The waste produced in the course of health-care activities, from contaminated needles to radioactive isotopes, carries a greater potential for causing infection and injury than any other type of waste, and inadequate or inappropriate management is likely to have serious public health consequences and deleterious effects on the environment. This handbook - the result of extensive international consultation and collaboration - provides comprehensive guidance on safe, efficient, and environmentally sound methods for the handling and disposal of health-care wastes. The various categories of waste are clearly defined and the particular hazards that each poses are described. Considerable prominence is given to the careful planning that is essential for the success of waste management; workable means of minimizing waste production are outlined and the role of reuse and recycling of waste is discussed. Most of the text, however, is devoted to the collection, segregation, storage, transport, and disposal of wastes. Details of containers for each category of waste, labelling of waste packages, and storage conditions are provided, and the various technologies for treatment of waste and disposal of final residues are discussed at length. Advice is given on occupational safety for all personnel involved with waste handling, and a separate chapter is devoted to the closely related topic of hospital hygiene and infection control. The handbook pays particular attention to basic processes and technologies that are not only safe but also affordable, sustainable, and culturally appropriate. For health-care settings in which resources are severely limited there is a separate chapter on minimal programmes; this summarizes all the simplest and least costly techniques that can be employed for the safe management of health-care wastes. The guide is aimed at public health managers and policy-makers, hospital managers, environmental health professionals, and all administrators with an

  17. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  18. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  19. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  20. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  1. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  2. Stable Isotope Group 1982 progress report

    International Nuclear Information System (INIS)

    Stewart, M.K.

    1983-06-01

    The work of the Stable Isotope Group of the Institute of Nuclear Sciences during 1982, in the fields of isotope geology, isotope hydrology, geochronology, isotope biology and mass spectrometer instrumentation, is described

  3. Stable Isotope Group 1983 progress report

    International Nuclear Information System (INIS)

    Stewart, M.K.

    1984-06-01

    The work of the Stable Isotope Group of the Institute of Nuclear Sciences in the fields of isotope geology, isotope hydrology, geochronology, isotope biology and related fields, and mass spectrometer instrumentation, during 1983, is described

  4. Isotope separation system

    International Nuclear Information System (INIS)

    Lehmann, J.-C.

    1975-01-01

    A description is given of an isotope separation device comprising a system for converting into gaseous form a first and second isotope to be separated, a monochromatic excitation light source to excite the gaseous molecules of these two isotopes in a distinct manner, a first and second receiver to collect selectively the molecules of the first and second distinctly excited isotopes. The frequency FL of the excitation light is selected between a lower limit and a higher limit F2 + 1/2 LD, depending on the frequences F1 and F2 of two absorption lines near this first and second isotope. The difference DF between these two frequencies F1 and F2 is less than the Doppler width LD of each one of these lines and greater than the natural width LN of each of these two lines and also the width of line LR of the excitation light source. The probability that the molecules will be excited by this light depends on the direction of their displacement to a major and different extent for both isotopes. An ionising light source LI is set up to irradiate the seat of interaction between the excitation light and the gaseous molecules with an ionisation light able to ionise the excited molecules without ionising the molecules that are not excited. The receivers are able to collect selectively the ionised molecules. A sufficiently low gas pressure is selected for the distance between the place of interaction and the first receiver to be less than double the free mean travel of the molecules in the gas [fr

  5. Software Implementation of a Secure Firmware Update Solution in an IOT Context

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2016-01-01

    Full Text Available The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices.

  6. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  8. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  9. Climate and isotopic tracers

    International Nuclear Information System (INIS)

    Jean-Baptiste, Ph.

    1997-01-01

    The applications of natural radioactivity and isotopic measurements in the sciences concerning Earth and its atmosphere, are numerous: carbon 14 dating with the Tandetron apparatus at the Cea, measurement of oxygen 18 in coral or sediment limestone for the determination of ocean temperature and salinity, carbon 14 dating of corals for the determination of sea level variations, deuterium content in polar ice-cap leads to temperature variations determination; isotopic measurements also enable the determination of present climate features such as global warming, oceanic general circulation

  10. Method to separate isotopes

    International Nuclear Information System (INIS)

    Coenen, H.; Neuschuetz, D.

    1980-01-01

    An extraction by means of supercritical pure gases (e.g. CD 2 ) or gas mixtures is proposed to separate isotopes, especially H/D, Li-6/Li-7, and U-235/U-238, and water or benzol is used as entrainer. The extraction shall be carried out at pressure rates of about 350 bar above the critical pressure with the temperature being by up to 100 0 C above the critical temperature. A NaCl-solution and the change of the isotopic ratio Cl-35/Cl-37 are investigated for example purpose. (UWI) [de

  11. Environmental isotope survey

    International Nuclear Information System (INIS)

    Jacovides, J.S.

    1979-03-01

    Work was initiated on the 1st of September 1971 with the objective of finding out how best to use environmental isotopes in the interpretation of the hydrology, particularly subsurface hydrology, of Cyprus through a sparse reconnaissance sampling of all the major aquifers and springs covering the whole island. The distribution of sampling was such that the survey in itself could assist in clarifying particular hydrogeologic problems, provide a better understanding of the water systems of the island, establish a general environmental isotope - framework of the hydrologic regimen of Cyprus as well as to provide the basis for specific, more detailed, studies to be undertaken subsequently

  12. Lectures in isotope geology

    International Nuclear Information System (INIS)

    Jaeger, E.; Hunziker, J.C.

    1979-01-01

    Designed for a introductory course in geochronology and the geochemistry of stable isotopes, this text has been written by recognized experts in the field. Emphasis is on the interpretation and on applications, and examples of these are offered along with each technique. Extraterrestrial applications have been avoided and the treatment of pure experimentation has been kept at a minimum. This text will be appreciated by geologists who want to learn more about methods used in isotope geology, how they can be applied, and how to gauge their usefulness. (orig.) [de

  13. Personal security a guide for international travelers

    CERN Document Server

    Spencer, Tanya

    2013-01-01

    Personal Security: A Guide for International Travelers provides the perfect mix of lessons-learned, tools, and recommendations from experts so that readers can personalize their own approach to managing travel risks. If followed, the information provided will allow readers to get out and experience the local culture while still traveling safely.-Bernie Sullivan, Director Global Security, Hanesbrands Inc....a must-have for any traveler. Having worked in South and Southeast Asia, I know the advice provided in the book holds the key to keeping safe, avoiding dangerous situations, and managing threats when they occur. The book's methodological framework, combined with the author's extensive experience and hands-on knowledge, provide very practical and useful advice.-Kathrine Alexandrowiz, Independent consultant at Kathalyst, former coordinator for the "Regional Risk Management Project for NGOs in Asia Pacific" (ECHO)... a go-to guide for all travelers irrespective of mission or purpose. An excellent piece of work...

  14. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  15. Virus Alert: Ten Steps to Safe Computing.

    Science.gov (United States)

    Gunter, Glenda A.

    1997-01-01

    Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)

  16. Implementation of an Improved Safe Operating Envelope

    International Nuclear Information System (INIS)

    Prime, Robyn; McIntyre, Mark; Reeves, David

    2008-01-01

    This paper is a continuation of the paper presented at IYNC 2004 on 'The Definition of a Safe Operating Envelope'. The current paper concentrates on the implementation process of the Safe Operating Envelope employed at the Point Lepreau Generating Station. (authors)

  17. Creating Safe Spaces for Music Learning

    Science.gov (United States)

    Hendricks, Karin S.; Smith, Tawnya D.; Stanuch, Jennifer

    2014-01-01

    This article offers a practical model for fostering emotionally safe learning environments that instill in music students a positive sense of self-belief, freedom, and purpose. The authors examine the implications for music educators of creating effective learning environments and present recommendations for creating a safe space for learning,…

  18. Implementation of an Improved Safe Operating Envelope

    Energy Technology Data Exchange (ETDEWEB)

    Prime, Robyn; McIntyre, Mark [NB Power Nuclear, P.O. Box 600, Lepreau, NB (Canada); Reeves, David [Atlantic Nuclear Services Ltd., PO Box 1268 Fredericton, NB (Canada)

    2008-07-01

    This paper is a continuation of the paper presented at IYNC 2004 on 'The Definition of a Safe Operating Envelope'. The current paper concentrates on the implementation process of the Safe Operating Envelope employed at the Point Lepreau Generating Station. (authors)

  19. High mass isotope separation arrangement

    International Nuclear Information System (INIS)

    Eerkens, J.W.

    1976-01-01

    An isotope separation arrangement for separating a preselected isotope from a mixture of chemically-identical but isotopically-different molecules by either photon-induced pure revibrational or vibronic selective excitation of the molecules containing the atoms of the isotope to be separated from a lower to a higher energy state, and a chemical reaction of the higher energy state molecules with a chemically-reactive agent to form a chemical compound containing primarily the atoms of the isotope to be separated in a physicochemical state different from the physicochemical state of the mixture of chemically-identical but isotopically-different molecules. The chemical compound containing the atoms of the isotope to be separated may be subsequently processed to obtain the isotope. The laser configuration used to generate the photon beam is fully described

  20. Isotope separation method and apparatus

    International Nuclear Information System (INIS)

    Lyon, R.K.; Eisner, P.N.; Thomas, W.R.L.

    1980-01-01

    A method and apparatus are specified for separating a mixture of isotopes present in a compound, preferably a gaseous compound, into two or more parts in each of which the abundances of the isotopes differ from the natural abundances of the isotopes in the compound. The invention particularly relates to carrying out a laser induced, isotopically selective conversion of gaseous molecules in such a manner as to achieve more than one stage of isotope separation along the length of the laser beam. As an example, the invention is applied to the separation of the isotopes of uranium in UF 6 , in which either the U-235 or U-238 isotope is selectively excited by means of irradiation from an infrared laser, and the selectively excited isotope converted into a product that can be recovered from UF 6 by one of a variety of methods that are described. (U.K.)

  1. Techniques for preparing isotopic targets

    International Nuclear Information System (INIS)

    Xu Guoji; Guan Shouren; Luo Xinghua; Sun Shuhua

    1987-12-01

    The techniques of making isotopic targets for nuclear physics experiments are introduced. Vacuum evaporation, electroplating, centrifugal precipitation, rolling and focused heavy-ion beam sputtering used to prepare various isotopic targets at IAE are described. Reduction-distillation with active metals and electrolytic reduction for converting isotope oxides to metals are mentioned. The stripping processes of producing self-supporting isotopic targets are summarized. The store methods of metallic targets are given

  2. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  3. Autonomous Highway Systems Safety and Security

    OpenAIRE

    Sajjad, Imran

    2017-01-01

    Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, t...

  4. Isotope separation using tunable lasers

    International Nuclear Information System (INIS)

    Snavely, B.B.

    1975-01-01

    Various processes for laser isotope separation based upon the use of the spectroscopic isotope effect in atomic and molecular vapors are discussed. Emphasis is placed upon processes which are suitable for uranium enrichment. A demonstration process for the separation of uranium isotopes using selective photoionization is described. (U.S.)

  5. Isotope effects on nuclear shielding

    International Nuclear Information System (INIS)

    Hansen, P.E.

    1983-01-01

    This review concentrates upon empirical trends and practical uses of mostly secondary isotope effects, both of the intrinsic and equilibrium types. The text and the tables are arranged in the following fashion. The most 'popular' isotope effect is treated first, deuterium isotope effects on 13 C nuclear shielding, followed by deuterium on 1 H nuclear shieldings, etc. Focus is thus on the isotopes producing the effect rather than on the nuclei suffering the effect. After a brief treatment of each type of isotope effect, general trends are dealt with. Basic trends of intrinsic isotope effects such as additivity, solvent effects, temperature effects, steric effects, substituent effects and hyperconjugation are discussed. Uses of isotope effects for assignment purposes, in stereochemical studies, in hydrogen bonding and in isotopic tracer studies are dealt with. Kinetic studies, especially of phosphates, are frequently performed by utilizing isotope effects. In addition, equilibrium isotope effects are treated in great detail as these are felt to be new and very important and may lead to new uses of isotope effects. Techniques used to obtain isotope effects are briefly surveyed at the end of the chapter. (author)

  6. Isotope shifting capacity of rock

    International Nuclear Information System (INIS)

    Blattner, P.; Department of Scientific and Industrial Research, Lower Hutt

    1980-01-01

    Any oxygen isotope shifted rock volume exactly defines a past throughput of water. An expression is derived that relates the throughput of an open system to the isotope shift of reservoir rock and present-day output. The small isotope shift of Ngawha reservoir rock and the small, high delta oxygen-18 output are best accounted for by a magmatic water source

  7. Uranium Isotopic Analysis with the FRAM Isotopic Analysis Code

    International Nuclear Information System (INIS)

    Vo, D.T.; Sampson, T.E.

    1999-01-01

    FRAM is the acronym for Fixed-Energy Response-Function Analysis with Multiple efficiency. This software was developed at Los Alamos National Laboratory originally for plutonium isotopic analysis. Later, it was adapted for uranium isotopic analysis in addition to plutonium. It is a code based on a self-calibration using several gamma-ray peaks for determining the isotopic ratios. The versatile-parameter database structure governs all facets of the data analysis. User editing of the parameter sets allows great flexibility in handling data with different isotopic distributions, interfering isotopes, and different acquisition parameters such as energy calibration and detector type

  8. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Science.gov (United States)

    2010-04-01

    ... of No. 10 gauge steel fabric on a metal door frame in a metal door flange, and in all other respects... secured areas: (1) Where small quantities permit, a safe or steel cabinet; (i) Which safe or steel cabinet... radiological techniques; (ii) Which safe or steel cabinet, if it weighs less than 750 pounds, is bolted or...

  9. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  10. Isotopes in aquaculture research

    International Nuclear Information System (INIS)

    Ayyappan, S.; Dash, B.; Ghosh, A.S.

    1996-01-01

    The applications of isotopes in aquaculture research include areas like aquatic production process, nutrient cycles and food chain dynamics, fish nutrition, fish physiology, genetics and immunology. The radioisotopes commonly used are beta emitters. The use of different radioisotopes in aquaculture research are presented. 2 tabs

  11. Process for isotope separation

    International Nuclear Information System (INIS)

    Schuster, E.; Kersting, A.; Gebauhr, W.

    1980-01-01

    Isotope separation in UF 6 gas takes place on the principle of selective excitation by laser irradiation and separation by chemical conversion with a partner in a reaction. Atomic H, N or O or the CH 3 or CHO radicals are suitable partners in the reaction. The recombination takes place by catalytic acceleration on leaving the reaction area. (DG) [de

  12. SHELL ISOTOPE GEOCHEMISTRY

    African Journals Online (AJOL)

    ABSTRACT: The land snail Limicolaria kambeul chudeaui Germain was collected ... Key words/phrases: Ethiopia, isotope geochemistry, Lake Tilo, Limicolaria .... 1984), (c) 6'80 values of precipitation at Addis Ababa, with i 1 S.D. bars for the .... (breakfast cereal), deionised water and cuttlefish bone, the carbon and oxygen.

  13. Isotope separation process

    International Nuclear Information System (INIS)

    Cox, D.M.; Maas, E.T.

    1982-01-01

    Processes are disclosed for the separation of isotopes of an element comprising vaporizing uranyl compounds having the formula (UO2a2)n, where a is a monovalent anion and n in an integer from 2 to 4, the compounds having an isotopically shifted infrared absorption spectrum associated with uranyl ions containing said element which is to be separated, and then irradiating the uranyl compound with infrared radiation which is preferentially absorbed by a molecular vibration of uranyl ions of the compound containing a predetermined isotope of that element so that excited molecules of the compound are provided which are enriched in the molecules of the compound containing that predetermined isotope, thus enabling separation of these excited molecules. The processes disclosed include separation of the excited molecules by irradiating under conditions such that the excited molecules dissociate, and also separating the excited molecules by a discrete separation step. The latter includes irradiating the excited molecules by a second infrared laser in order to convert the excited molecules into a separable product, or also by chemically converting the excited molecules, preferably by reaction with a gaseous reactant

  14. Isotopic effect giant resonances

    International Nuclear Information System (INIS)

    Buenerd, M.; Lebrun, D.; Martin, P.; Perrin, G.; Saintignon, P. de; Chauvin, J.; Duhamel, G.

    1981-10-01

    The systematics of the excitation energy of the giant dipole, monopole, and quadrupole resonances are shown to exhibit an isotopic effect. For a given element, the excitation energy of the transition decreases faster with the increasing neutron number than the empirical laws fitting the overall data. This effect is discussed in terms of the available models

  15. Isotopes in action

    International Nuclear Information System (INIS)

    1987-01-01

    For most people the obvious application of nuclear technology is in power generation. But there are many other uses for radioactive materials or for products made with their help. They are found in our factories, hospitals, offices and homes. ''Isotopes in Action'' looks at the many applications of radioisotopes in our society. (author)

  16. Forensic Stable Isotope Biogeochemistry

    Science.gov (United States)

    Cerling, Thure E.; Barnette, Janet E.; Bowen, Gabriel J.; Chesson, Lesley A.; Ehleringer, James R.; Remien, Christopher H.; Shea, Patrick; Tipple, Brett J.; West, Jason B.

    2016-06-01

    Stable isotopes are being used for forensic science studies, with applications to both natural and manufactured products. In this review we discuss how scientific evidence can be used in the legal context and where the scientific progress of hypothesis revisions can be in tension with the legal expectations of widely used methods for measurements. Although this review is written in the context of US law, many of the considerations of scientific reproducibility and acceptance of relevant scientific data span other legal systems that might apply different legal principles and therefore reach different conclusions. Stable isotopes are used in legal situations for comparing samples for authenticity or evidentiary considerations, in understanding trade patterns of illegal materials, and in understanding the origins of unknown decedents. Isotope evidence is particularly useful when considered in the broad framework of physiochemical processes and in recognizing regional to global patterns found in many materials, including foods and food products, drugs, and humans. Stable isotopes considered in the larger spatial context add an important dimension to forensic science.

  17. Isotopes and atomic weights

    International Nuclear Information System (INIS)

    Zhang Qinglian

    1990-01-01

    A review of the chemical and mass spectrometric methods of determining the atomic weights of elements is presented. A, special discussion is devoted to the calibration of the mass spectrometer with highly enriched isotopes. It is illustrated by the recent work on europium. How to choose the candidate element for new atomic weight determination forms the last section of the article

  18. Actinide isotopic analysis systems

    International Nuclear Information System (INIS)

    Koenig, Z.M.; Ruhter, W.D.; Gunnink, R.

    1990-01-01

    This manual provides instructions and procedures for using the Lawrence Livermore National Laboratory's two-detector actinide isotope analysis system to measure plutonium samples with other possible actinides (including uranium, americium, and neptunium) by gamma-ray spectrometry. The computer program that controls the system and analyzes the gamma-ray spectral data is driven by a menu of one-, two-, or three-letter options chosen by the operator. Provided in this manual are descriptions of these options and their functions, plus detailed instructions (operator dialog) for choosing among the options. Also provided are general instructions for calibrating the actinide isotropic analysis system and for monitoring its performance. The inventory measurement of a sample's total plutonium and other actinides content is determined by two nondestructive measurements. One is a calorimetry measurement of the sample's heat or power output, and the other is a gamma-ray spectrometry measurement of its relative isotopic abundances. The isotopic measurements needed to interpret the observed calorimetric power measurement are the relative abundances of various plutonium and uranium isotopes and americium-241. The actinide analysis system carries out these measurements. 8 figs

  19. Application of the isotopic index in isotope geochemical investigation

    International Nuclear Information System (INIS)

    Schuetze, H.

    1982-06-01

    A method is described which allows to calculate approximately isotope exchange equilibria between different crystalline silicates. The algorithm uses a newly introduced isotopic index. It is defined using isotopic increments of the variant types of silicatic bonds. This isotopic index gives a quantitative measure of the ability to enrich 18 O or 30 Si, respectively. The dependence of isotopic fractionations on temperature can be calculated approximately by means of the isotopic index, too. On this theoretical base some problems of magmatism and two varieties of an isotope geochemical model of the evolution of the Earth's crust are treated. Finally, the possibility is demonstrated to give prognostic statements about the likelihood of ore bearing of different granites. (author)

  20. Technical testing of portable isotope identification instruments

    International Nuclear Information System (INIS)

    Smith, D.E.

    2001-01-01

    . First generation portable isotope identifiers were identified and evaluated by U.S. Customs. Instruments from five vendors were put through a battery of tests according to delineated test procedures. The tests fell into five categories: Basic operation verification; Medical isotope identification; Individual isotope identification; Isotope pair identification; Dose rate calculation. The tests can be summarized as an initial verification of correct instrument operation (including whatever calibration procedure was specified by the vendor), followed by three different isotope identification tests designed to verify the instrument's ability to correctly identify 19 isotopes specified by U.S. Customs. The final test determined each instrument's ability to correctly display the dose rate from a wide energy range of gamma emitters. The individual isotope identification test and the isotope pair identification test were performed with three types of intervening shielding. The first of these three types used the minimum packaging needed for safe source handling and was, in general, thin plastic. This type of shielding is virtually identical to a bare radiation source. The second type of shielding used 2.7 mm of steel to simulate the wall of a typical transportainer (or sea-tainer). The third type of shielding used 6.94 mm of lead to simulate typical industrial packaging or, perhaps, an attempt by the shipper to conceal the source without unduly increasing the weight of the shipment. The isotopes tested were broadly categorized as: Special nuclear material (SNM), Medical, and Industrial. These included 17 gamma emitters, 1 beta emitter, and 1 neutron emitter. Each instrument was subjected to the following testing regimen: First, each instrument was calibrated according to vendor's procedures. Instrument size and weight were recorded. Next, the instrument's response to medical isotopes in their usual shipping containers was measured. This represents the most commonly occurring

  1. InaSAFE applications in disaster preparedness

    Science.gov (United States)

    Pranantyo, Ignatius Ryan; Fadmastuti, Mahardika; Chandra, Fredy

    2015-04-01

    Disaster preparedness activities aim to reduce the impact of disasters by being better prepared to respond when a disaster occurs. In order to better anticipate requirements during a disaster, contingency planning activities can be undertaken prior to a disaster based on a realistic disaster scenario. InaSAFE is a tool that can inform this process. InaSAFE is a free and open source software that estimates the impact to people and infrastructure from potential hazard scenarios. By using InaSAFE, disaster managers can develop scenarios of disaster impacts (people and infrastructures affected) to inform their contingency plan and emergency response operation plan. While InaSAFE provides the software framework exposure data and hazard data are needed as inputs to run this software. Then InaSAFE can be used to forecast the impact of the hazard scenario to the exposure data. InaSAFE outputs include estimates of the number of people, buildings and roads are affected, list of minimum needs (rice and clean water), and response checklist. InaSAFE is developed by Indonesia's National Disaster Management Agency (BNPB) and the Australian Government, through the Australia-Indonesia Facility for Disaster Reduction (AIFDR), in partnership with the World Bank - Global Facility for Disaster Reduction and Recovery (GFDRR). This software has been used in many parts of Indonesia, including Padang, Maumere, Jakarta, and Slamet Mountain for emergency response and contingency planning.

  2. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  3. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  4. Integrity and security in an Ada runtime environment

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  5. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  6. Isotopic separation by ion chromatography

    International Nuclear Information System (INIS)

    Albert, M.G.; Barre, Y.; Neige, R.

    1994-01-01

    The isotopic exchange reaction and the isotopic separation factor are first recalled; the principles of ion chromatography applied to lithium isotope separation are then reviewed (displacement chromatography) and the process is modelled in the view of dimensioning and optimizing the industrial process; the various dimensioning parameters are the isotopic separation factor, the isotopic exchange kinetics and the material flow rate. Effects of the resin type and structure are presented. Dimensioning is also affected by physico-chemical and hydraulic parameters. Industrial implementation features are also discussed. 1 fig., 1 tab., 5 refs

  7. Physics with isotopically controlled semiconductors

    International Nuclear Information System (INIS)

    Haller, E.E.

    1994-08-01

    Control of the isotopic composition of semiconductors offers a wide range of new scientific opportunities. In this paper a number of recent results obtained with isotopically pure as well as deliberately mixed diamond and Ge bulk single crystals and Ge isotope superlattices will be reviewed. Isotopic composition affects several properties such as phonon energies, bandstructure and lattice constant in subtle but theoretically well understood ways. Large effects are observed for thermal conductivity, local vibrational modes of impurities and after neutron transmutation doping (NTD). Several experiments which could profit greatly from isotope control are proposed

  8. Food irradiation is safe: Half a century of studies

    International Nuclear Information System (INIS)

    Roberts, Peter B.

    2014-01-01

    The potential benefits of food irradiation are yet to be realized due to slow progress in the commercialization of the technology. Processing food with ionizing radiation has encountered several barriers, one of which is the belief that consumers will not purchase irradiated food and a consequent caution among food retailers and producers. There is sufficient evidence that consumers will purchase irradiated foods when offered at retail in contrast to the data from many surveys of general public opinion. Communicating this evidence to food retailers and producers is essential if a major barrier to a greater use of the technology is to be overcome. - Highlights: • Food irradiation is safe and can benefit food safety, security and trade. • Commercial use remains limited. • The food trade tends to believe consumers will not buy irradiated food. • There is good evidence that consumers buy irradiated food when it is offered. • Demonstrating this evidence to industry is vital for commercial success

  9. On the safeness of examinees and the reliability of system

    International Nuclear Information System (INIS)

    Kudo, Kazumi; Kanda, Kosuke; Saito, Kazuhiko; Maesawa, Tsuneharu; Idekami, Tomio

    1979-01-01

    The control technique of the reliability of examination system was investigated from the viewpoint of patient safety and image information, based on the prevention of microshock owing to circulatory organ checking system. As for the equipments in hospitals, the size of rooms, air conditioning system, power source installation, earth and piping arrangements should be fully discussed at the planning stage. EPR system must be introduced for the prevention for microshock. Intensive education and training are required for operators to secure safeness in operation. Thorough care should be taken to prevent bacilli infection. Further examinations were made on the control technique of the reliability of photographing system from viewpoint of image information, and it is necessary to study the factors for obtaining the reliability of compound machinery components and the devices of generating radiation. (Kobatake, H.)

  10. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  11. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  12. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  13. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  14. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  15. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  16. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  17. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  18. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  19. Simulation of cloud data security processes and performance

    OpenAIRE

    Chand, K; Ramachandran, M; Kor, AL

    2015-01-01

    In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security ...

  20. An evaluation of smartphone communication (in)security

    OpenAIRE

    Brodd-Reijer, Christoffer

    2014-01-01

    The purpose of this study is to examine and evaluate the security of the data traffic sent to and from smartphone devices. Since smartphones are becoming more common, are highly connected, often use cloud based computation, and contain highly personal data, it is important that the communication is secure and safe. This paper examines the Android and iOS platforms and focuses on three key parts: platform, application, and user. The platforms are evaluated on the basis of their libraries, APIs...

  1. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  2. Isotopes facilities deactivation project at Oak Ridge National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Eversole, R.E.

    1997-05-01

    The production and distribution of radioisotopes for medical, scientific, and industrial applications has been a major activity at Oak Ridge National Laboratory (ORNL) since the late 1940s. As the demand for many of these isotopes grew and their sale became profitable, the technology for the production of the isotopes was transferred to private industry, and thus, many of the production facilities at ORNL became underutilized. In 1989, the U.S. Department of Energy (DOE) instructed ORNL to identify and prepare various isotopes production facilities for safe shutdown. In response, ORNL identified 19 candidate facilities for shutdown and established the Isotopes Facilities Shutdown Program. In 1993, responsibility for the program was transitioned from the DOE Office of Nuclear Energy to the DOE Office of Environmental Management and Uranium Enrichment Operation`s Office of Facility Transition and Management. The program was retitled the Isotopes Facilities Deactivation Project (IFDP), and implementation responsibility was transferred from ORNL to the Lockheed Martin Energy Systems, Inc. (LMES), Environmental Restoration (ER) Program.

  3. Isotopes facilities deactivation project at Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Eversole, R.E.

    1997-01-01

    The production and distribution of radioisotopes for medical, scientific, and industrial applications has been a major activity at Oak Ridge National Laboratory (ORNL) since the late 1940s. As the demand for many of these isotopes grew and their sale became profitable, the technology for the production of the isotopes was transferred to private industry, and thus, many of the production facilities at ORNL became underutilized. In 1989, the U.S. Department of Energy (DOE) instructed ORNL to identify and prepare various isotopes production facilities for safe shutdown. In response, ORNL identified 19 candidate facilities for shutdown and established the Isotopes Facilities Shutdown Program. In 1993, responsibility for the program was transitioned from the DOE Office of Nuclear Energy to the DOE Office of Environmental Management and Uranium Enrichment Operation's Office of Facility Transition and Management. The program was retitled the Isotopes Facilities Deactivation Project (IFDP), and implementation responsibility was transferred from ORNL to the Lockheed Martin Energy Systems, Inc. (LMES), Environmental Restoration (ER) Program

  4. The essential role of isotopes in studies of water resources

    International Nuclear Information System (INIS)

    1977-01-01

    In studies of surface water, isotope techniques are used to measure water runoff from rain and snow, flow rates of streams and rivers, leakage from lakes, reservoirs and canals and the dynamics of various bodies of water. Studies of groundwater resources (springs, wells) today are virtually unthinkable without isotope techniques. Basically, these techniques are simple and relatively quick. Among the many questions which may be asked of hydrologists about a given groundwater supply, often the most critical one concerns the safe yield so that the source will not run dry, or for a source to be 'mined', the total yield. Isotope techniques can be used to solve such problems as: identification of the origin of groundwater, determination of its age, flow velocity and direction, interrelations between surface waters and ground waters, possible connections between different aquifers, local porosity, transmissivity and dispersivity of an aquifer. The cost of such investigations is often small in comparison to the cost of classical hydrological techniques, and in addition they are able to provide information which sometimes cannot be obtained by other techniques. The IAEA provides assistance to countries in the application of isotope techniques in water resources studies and other hydrology field projects. The examples given of field studies are intended to give some idea of how these techniques are being applied to specific problems in various regions of the world. Most are discussed briefly, but in some cases a more detailed description has been given in order to demonstrate the application of environmental isotope techniques

  5. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  6. Implicit attitudes towards risky and safe driving

    DEFF Research Database (Denmark)

    Martinussen, Laila Marianne; Sømhovd, Mikael Julius; Møller, Mette

    ; further, self-reports of the intention to drive safely (or not) are socially sensitive. Therefore, we examined automatic preferences towards safe and risky driving with a Go/No-go Association Task (GNAT). The results suggest that (1) implicit attitudes towards driving behavior can be measured reliably...... with the GNAT; (2) implicit attitudes towards safe driving versus towards risky driving may be separable constructs. We propose that research on driving behavior may benefit from routinely including measures of implicit cognition. A practical advantage is a lesser susceptibility to social desirability biases......, compared to self-report methods. Pending replication in future research, the apparent dissociation between implicit attitudes towards safe versus risky driving that we observed may contribute to a greater theoretical understanding of the causes of unsafe and risky driving behavior....

  7. High-Protein Diets: Are They Safe?

    Science.gov (United States)

    Healthy Lifestyle Nutrition and healthy eating Are high-protein diets safe for weight loss? Answers from Katherine ... L.D. For most healthy people, a high-protein diet generally isn't harmful, particularly when followed ...

  8. Safe delivery, Service utilization, Metekel Zone

    African Journals Online (AJOL)

    decision making power of subjects were found to have a statistically significant association with preference of safe delivery ... Studies that focused on maternal mortality and proportion of ...... Anna M, Hannekee M, Frank Odhiambo et.al. Use.

  9. The safe transport of radioactive materials

    International Nuclear Information System (INIS)

    Messenger, W. de L.M.

    1979-02-01

    The hazards of radioactive materials in transport are surveyed. The system whereby they are safely transported between nuclear establishments in the United Kingdom and overseas is outlined. Several popular misconceptions are dealt with. (author)

  10. Layered Safe Motion Planning for Autonomous Vehicles.

    Science.gov (United States)

    1995-09-01

    The major problem addressed by this research is how to plan a safe motion for autonomous vehicles in a two dimensional, rectilinear world. With given start and goal configurations, the planner performs motion planning which

  11. AFSC/REFM: Groundfish SAFE Economic Report

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Groundfish SAFE Economic Report, published annually as a supplement to the Stock Assessment and Fishery Evaluation Reports for Bering Sea and Aleutian Islands...

  12. Think Before You Ink: Are Tattoos Safe?

    Science.gov (United States)

    ... Consumers Consumer Updates Think Before You Ink: Are Tattoos Safe? Share Tweet Linkedin Pin it More sharing ... I be concerned about unsafe practices, or the tattoo ink itself? Both. While you can get serious ...

  13. Safe Eats - Eating Out and Bringing In

    Science.gov (United States)

    ... to stay safe. What's On the Menu? When dining out: Remember that harmful bacteria can be hidden ... above the "danger zone." Remember the 2-Hour Rule : Discard any perishables (foods that can spoil or ...

  14. SAFE users manual. Volume 4. Computer programs

    International Nuclear Information System (INIS)

    Grady, L.M.

    1983-06-01

    Documentation for the Safeguards Automated Facility Evaluation (SAFE) computer programs is presented. The documentation is in the form of subprogram trees, program abstracts, flowcharts, and listings. Listings are provided on microfiche

  15. Standards for safe operation of research reactors

    International Nuclear Information System (INIS)

    1996-01-01

    The safety of research reactors is based on many factors such as suitable choice of location, design and construction according to the international standards, it also depends on well trained and qualified operational staff. These standards determine the responsibilities of all who are concerned with the research reactors safe operation, and who are responsible of all related activities in all the administrative and technical stages in a way that insures the safe operation of the reactor

  16. Influencing behaviour for safe working environments

    OpenAIRE

    Boer, de, J. (Johannes); Teeuw, W.B. (Wouter)

    2011-01-01

    Safety at work The objective of the project Safety at Work is to increase safety at the workplace by applying and combining state of the art artefacts from personal protective equipment and ambient intelligence technology. In this state of the art document we focus on the developments with respect to how (persuasive) technology can help to influence behaviour in a natural, automatic way in order to make industrial environments safer. We focus on personal safety, safe environments and safe beh...

  17. Licensing issues for inherently safe fast reactors

    International Nuclear Information System (INIS)

    Kastenberg, W.E.; Lee, S.; Okrent, D.

    1986-01-01

    There has been considerable interest recently in a new generation of liquid metal reactor (LMR) concepts in the US. Some significant changes in regulatory philosophy will be required if the anticipated cost advantages of inherently safe designs are to be achieved. The defense in depth philosophy will need to be significantly re-evaluated in the context of inherently safe reactors. It is the purpose of this paper to begin such a re-evaluation of this regulatory philosophy

  18. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  19. Curiosity's Autonomous Surface Safing Behavior Design

    Science.gov (United States)

    Neilson, Tracy A.; Manning, Robert M.

    2013-01-01

    The safing routines on all robotic deep-space vehicles are designed to put the vehicle in a power and thermally safe configuration, enabling communication with the mission operators on Earth. Achieving this goal is made a little more difficult on Curiosity because the power requirements for the core avionics and the telecommunication equipment exceed the capability of the single power source, the Multi-Mission Radioisotope Thermoelectric Generator. This drove the system design to create an operational mode, called "sleep mode", where the vehicle turns off most of the loads in order to charge the two Li-ion batteries. The system must keep the vehicle safe from over-heat and under-heat conditions, battery cell failures, under-voltage conditions, and clock failures, both while the computer is running and while the system is sleeping. The other goal of a safing routine is to communicate. On most spacecraft, this simply involves turning on the receiver and transmitter continuously. For Curiosity, Earth is above the horizon only a part of the day for direct communication to the Earth, and the orbiter overpass opportunities only occur a few times a day. The design must robustly place the Rover in a communicable condition at the correct time. This paper discusses Curiosity's autonomous safing behavior and describes how the vehicle remains power and thermally safe while sleeping, as well as a description of how the Rover communicates with the orbiters and Earth at specific times.

  20. Managing Cassini Safe Mode Attitude at Saturn

    Science.gov (United States)

    Burk, Thomas A.

    2010-01-01

    The Cassini spacecraft was launched on October 15, 1997 and arrived at Saturn on June 30, 2004. It has performed detailed observations and remote sensing of Saturn, its rings, and its satellites since that time. In the event safe mode interrupts normal orbital operations, Cassini has flight software fault protection algorithms to detect, isolate, and recover to a thermally safe and commandable attitude and then wait for further instructions from the ground. But the Saturn environment is complex, and safety hazards change depending on where Cassini is in its orbital trajectory around Saturn. Selecting an appropriate safe mode attitude that insures safe operation in the Saturn environment, including keeping the star tracker field of view clear of bright bodies, while maintaining a quiescent, commandable attitude, is a significant challenge. This paper discusses the Cassini safe table management strategy and the key criteria that must be considered, especially during low altitude flybys of Titan, in deciding what spacecraft attitude should be used in the event of safe mode.