WorldWideScience

Sample records for securing and joining equipment

  1. Loosening and damage mechanism of thread-joined structures in nuclear power equipment

    International Nuclear Information System (INIS)

    Tang Hui

    1999-01-01

    The author proposes a loosening mechanism of thread-joined structures under vibrate environments in the nuclear power equipment and structures, which is on the base of the macro and imperceptible-mechanics analysis. It has answered the problems on the seizing, the adhesive wearing, the generation of cracks, the thread-tooth fracture. So it has a conclusion that the loosening of thread-joined structures is essential trend, in other words, the locking property of thread-pair is failure under vibrate environments

  2. National security and the constitutional right to join military trade ...

    African Journals Online (AJOL)

    The unionisation of the South African Military Forces has tested both lawyers and the South African legal system. However, there is very little academic commentary on this important subject. In this article, the policy, which allowed the unionisation of the South African military, the influence of the policy on national security, ...

  3. 33 CFR 105.250 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... include procedures for identifying and responding to security system and equipment failures or...

  4. 33 CFR 104.260 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... procedures for identifying and responding to security system and equipment failures or malfunctions. ...

  5. 33 CFR 106.255 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... Shelf (OCS) Facility Security Requirements § 106.255 Security systems and equipment maintenance. (a) Security systems and equipment must be in good working order and inspected, tested, calibrated, and...

  6. Secure videoconferencing equipment switching system and method

    Science.gov (United States)

    Hansen, Michael E [Livermore, CA

    2009-01-13

    A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.

  7. Equipment for radiography in Yugoslavia - security and radiation protection

    International Nuclear Information System (INIS)

    Dobrijevic, R.; Vucina, J.

    1998-01-01

    Nondestructive method of material control by using radioisotopes is developed in Yugoslavia. This method of quality control is professionally performed by 30 firms. This paper presents the overview of the equipment used in the industrial radiography by using radioisotopes. Special attention was devoted to the security during the work and to the radiation protection of the operator and other personnel around the working place. In general it could be concluded that the main drawback which influences the security is the fact that most cases old and whom out equipment is in use. Other factors influencing the security are also discussed. (author)

  8. Changes in security systems and manufacture equipment and inspection

    International Nuclear Information System (INIS)

    Paloma, J. J.; Moraga, J. L.

    2015-01-01

    From the beginning of its industrial activity 30 years ago, the Juzbado factory of Enusa Group has maintained a strong commitment to safety and technological innovation. As a result, we have development new equipment and constantly improving the existing ones, as well as the facilities of the factory in accordance with the internal procedures, with multidisciplinary design teams and review teams. (Author)

  9. Mobile Real-time Tracking of Acute Stroke Patients and Instant, Secure Inter-team Communication - the Join App.

    Science.gov (United States)

    Munich, Stephan A; Tan, Lee A; Nogueira, Danilo M; Keigher, Kiffon M; Chen, Michael; Crowley, R Webster; Conners, James J; Lopes, Demetrius K

    2017-09-01

    The primary correlate to survival and preservation of neurologic function in patients suffering from an acute ischemic stroke is time from symptom onset to initiation of therapy and reperfusion. Communication and coordination among members of the stroke team are essential to maximizing efficiency and subsequently early reperfusion. In this work, we aim to describe our preliminary experience using the Join mobile application as a means to improve interdisciplinary team communication and efficiency. We describe our pilot experience with the initiation of the Join mobile application between July 2015 and July 2016. With this application, a mobile beacon is transported with the patient on the ambulance. Transportation milestone timestamps and geographic coordinates are transmitted to the treating facility and instantly communicated to all treatment team members. The transport team / patient can be tracked en route to the treating facility. During our pilot study, 62 patients were triaged and managed using the Join application. Automated time-stamping of critical events, geographic tracking of patient transport and summary documents were obtained for all patients. Treatment team members had an overall favorable impression of the Join application and recommended its continued use. The Join application is one of several components of a multi-institutional, interdisciplinary effort to improve the treatment of patients with acute ischemic stroke. The ability of the treatment team to track patient transport and communicate with the transporting team may improve reperfusion time and, therefore, improve neurologic outcomes.

  10. Fast and scalable inequality joins

    KAUST Repository

    Khayyat, Zuhair

    2016-09-07

    Inequality joins, which is to join relations with inequality conditions, are used in various applications. Optimizing joins has been the subject of intensive research ranging from efficient join algorithms such as sort-merge join, to the use of efficient indices such as (Formula presented.)-tree, (Formula presented.)-tree and Bitmap. However, inequality joins have received little attention and queries containing such joins are notably very slow. In this paper, we introduce fast inequality join algorithms based on sorted arrays and space-efficient bit-arrays. We further introduce a simple method to estimate the selectivity of inequality joins which is then used to optimize multiple predicate queries and multi-way joins. Moreover, we study an incremental inequality join algorithm to handle scenarios where data keeps changing. We have implemented a centralized version of these algorithms on top of PostgreSQL, a distributed version on top of Spark SQL, and an existing data cleaning system, Nadeef. By comparing our algorithms against well-known optimization techniques for inequality joins, we show our solution is more scalable and several orders of magnitude faster. © 2016 Springer-Verlag Berlin Heidelberg

  11. MICROWAVE JOINING OF ALUMINA CERAMIC AND HYDROXYLAPATITE BIOCERAMIC

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    Microwave joining is a rapid developmental new techniqu e in recent years.This paper introduces a new microwave joining equipment which was made by our lab,succeeds in alumina ceramic-hydroxylapatite bioceramic j o in in the equipment, and analyzes the join situation of join boundary by using s canni ng electron microscope(SEM),this paper analyzes the mechanism of microwave joini ng also.

  12. 48 CFR 252.239-7016 - Telecommunications security equipment, devices, techniques, and services.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Telecommunications... SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.239-7016 Telecommunications... clause: Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991) (a...

  13. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  14. Joining forces for food security - Linking earth observation and crowd-sourcing for improved decision-support to aid organizations

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Pham, P.

    2013-12-01

    Droughts statistically exceed all other natural disasters in spatio-temporal extent, number of people affected or financial loss. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. Consequently, this study is focused on two complementary developments - a new satellite-derived agricultural drought index and a mobile phone application. The Combined Drought Index (CDI) is enhanced by replacing field measurements of temperature and rainfall modelled/assimilated data. The vegetation component is replaced by a smoothed NDVI dataset. A soil moisture component is introduced to close the gap between rainfall deficiencies and the first visible impacts of atmospheric anomalies on vegetation. The mobile phone application enables the validation of drought index outputs and gives aid organizations an opportunity to increase the speed of socio-economic vulnerability assessments. Supported by Doctors without Borders (MSF) this approach aims at decreasing uncertainties in decision-making via a more holistic risk framework.

  15. Fast and scalable inequality joins

    KAUST Repository

    Khayyat, Zuhair; Lucia, William; Singh, Meghna; Ouzzani, Mourad; Papotti, Paolo; Quiané -Ruiz, Jorge Arnulfo; Tang, Nan; Kalnis, Panos

    2016-01-01

    an incremental inequality join algorithm to handle scenarios where data keeps changing. We have implemented a centralized version of these algorithms on top of PostgreSQL, a distributed version on top of Spark SQL, and an existing data cleaning system, Nadeef

  16. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  17. Lightning Fast and Space Efficient Inequality Joins

    KAUST Repository

    Khayyat, Zuhair

    2015-09-01

    Inequality joins, which join relational tables on inequality conditions, are used in various applications. While there have been a wide range of optimization methods for joins in database systems, from algorithms such as sort-merge join and band join, to various indices such as B+-tree,R*-tree and Bitmap, inequality joins have received little attention and queries containing such joins are usually very slow. In this paper, we introduce fast inequality join algorithms. We put columns to be joined in sorted arrays and we use permutation arrays to encode positions of tuples in one sorted array w.r.t. the other sorted array. In contrast to sort-merge join, we use space effcient bit-arrays that enable optimizations, such as Bloom filter indices, for fast computation of the join results. We have implemented a centralized version of these algorithms on top of PostgreSQL, and a distributed version on top of Spark SQL. We have compared against well known optimization techniques for inequality joins and show that our solution is more scalable and several orders of magnitude faster.

  18. Lightning fast and space efficient inequality joins

    KAUST Repository

    Khayyat, Zuhair

    2015-09-01

    Inequality joins, which join relational tables on inequality conditions, are used in various applications. While there have been a wide range of optimization methods for joins in database systems, from algorithms such as sort-merge join and band join, to various indices such as B+-tree, R*-tree and Bitmap, inequality joins have received little attention and queries containing such joins are usually very slow. In this paper, we introduce fast inequality join algorithms. We put columns to be joined in sorted arrays and we use permutation arrays to encode positions of tuples in one sorted array w.r.t. the other sorted array. In contrast to sort-merge join, we use space efficient bit-arrays that enable optimizations, such as Bloom filter indices, for fast computation of the join results. We have implemented a centralized version of these algorithms on top of PostgreSQL, and a distributed version on top of Spark SQL. We have compared against well known optimization techniques for inequality joins and show that our solution is more scalable and several orders of magnitude faster.

  19. Lightning fast and space efficient inequality joins

    KAUST Repository

    Khayyat, Zuhair; Lucia, William; Singh, Meghna; Ouzzani, Mourad; Papotti, Paolo; Quiané -Ruiz, Jorge-Arnulfo; Tang, Nan; Kalnis, Panos

    2015-01-01

    Inequality joins, which join relational tables on inequality conditions, are used in various applications. While there have been a wide range of optimization methods for joins in database systems, from algorithms such as sort-merge join and band join, to various indices such as B+-tree, R*-tree and Bitmap, inequality joins have received little attention and queries containing such joins are usually very slow. In this paper, we introduce fast inequality join algorithms. We put columns to be joined in sorted arrays and we use permutation arrays to encode positions of tuples in one sorted array w.r.t. the other sorted array. In contrast to sort-merge join, we use space efficient bit-arrays that enable optimizations, such as Bloom filter indices, for fast computation of the join results. We have implemented a centralized version of these algorithms on top of PostgreSQL, and a distributed version on top of Spark SQL. We have compared against well known optimization techniques for inequality joins and show that our solution is more scalable and several orders of magnitude faster.

  20. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    International Nuclear Information System (INIS)

    Pollet, J.

    2006-01-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  1. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    Energy Technology Data Exchange (ETDEWEB)

    Pollet, J. [PlantData Technologies, Inc., 1201 Louisiana Street, Houston, TX 77002 (United States)

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  2. 49 CFR 393.130 - What are the rules for securing heavy vehicles, equipment and machinery?

    Science.gov (United States)

    2010-10-01

    ... heavy vehicles, equipment and machinery? (a) Applicability. The rules in this section apply to the transportation of heavy vehicles, equipment and machinery which operate on wheels or tracks, such as front end... heavy vehicles, equipment or machinery with crawler tracks or wheels. (1) In addition to the...

  3. Lack of security of networked medical equipment in radiology.

    Science.gov (United States)

    Moses, Vinu; Korah, Ipeson

    2015-02-01

    OBJECTIVE. There are few articles in the literature describing the security and safety aspects of networked medical equipment in radiology departments. Most radiologists are unaware of the security issues. We review the security of the networked medical equipment of a typical radiology department. MATERIALS AND METHODS. All networked medical equipment in a radiology department was scanned for vulnerabilities with a port scanner and a network vulnerability scanner, and the vulnerabilities were classified using the Common Vulnerability Scoring System. A network sniffer was used to capture and analyze traffic on the radiology network for exposure of confidential patient data. We reviewed the use of antivirus software and firewalls on the networked medical equipment. USB ports and CD and DVD drives in the networked medical equipment were tested to see whether they allowed unauthorized access. Implementation of the virtual private network (VPN) that vendors use to access the radiology network was reviewed. RESULTS. Most of the networked medical equipment in our radiology department used vulnerable software with open ports and services. Of the 144 items scanned, 64 (44%) had at least one critical vulnerability, and 119 (83%) had at least one high-risk vulnerability. Most equipment did not encrypt traffic and allowed capture of confidential patient data. Of the 144 items scanned, two (1%) used antivirus software and three (2%) had a firewall enabled. The USB ports were not secure on 49 of the 58 (84%) items with USB ports, and the CD or DVD drive was not secure on 17 of the 31 (55%) items with a CD or DVD drive. One of three vendors had an insecure implementation of VPN access. CONCLUSION. Radiologists and the medical industry need to urgently review and rectify the security issues in existing networked medical equipment. We hope that the results of our study and this article also raise awareness among radiologists about the security issues of networked medical equipment.

  4. Welding and Joining of Titanium Aluminides

    Science.gov (United States)

    Cao, Jian; Qi, Junlei; Song, Xiaoguo; Feng, Jicai

    2014-01-01

    Welding and joining of titanium aluminides is the key to making them more attractive in industrial fields. The purpose of this review is to provide a comprehensive overview of recent progress in welding and joining of titanium aluminides, as well as to introduce current research and application. The possible methods available for titanium aluminides involve brazing, diffusion bonding, fusion welding, friction welding and reactive joining. Of the numerous methods, solid-state diffusion bonding and vacuum brazing have been most heavily investigated for producing reliable joints. The current state of understanding and development of every welding and joining method for titanium aluminides is addressed respectively. The focus is on the fundamental understanding of microstructure characteristics and processing–microstructure–property relationships in the welding and joining of titanium aluminides to themselves and to other materials. PMID:28788113

  5. Welding and Joining of Titanium Aluminides

    Directory of Open Access Journals (Sweden)

    Jian Cao

    2014-06-01

    Full Text Available Welding and joining of titanium aluminides is the key to making them more attractive in industrial fields. The purpose of this review is to provide a comprehensive overview of recent progress in welding and joining of titanium aluminides, as well as to introduce current research and application. The possible methods available for titanium aluminides involve brazing, diffusion bonding, fusion welding, friction welding and reactive joining. Of the numerous methods, solid-state diffusion bonding and vacuum brazing have been most heavily investigated for producing reliable joints. The current state of understanding and development of every welding and joining method for titanium aluminides is addressed respectively. The focus is on the fundamental understanding of microstructure characteristics and processing–microstructure–property relationships in the welding and joining of titanium aluminides to themselves and to other materials.

  6. Face recognition in securing optical telecom network equipment

    International Nuclear Information System (INIS)

    Ali, N.M.

    2015-01-01

    In this paper, face recognition is used with a microcontroller based hardware module to secure the telecommunication equipments like ONU (optical network units) or any other telecommunication equipment. The face recognition classifier value optimization adaption is deployed and in this scheme by increasing or decreasing the number of images in the database will automatically generate and adopt the classifier value for recognition of known and unknown persons. On recognizing and unknown persons. On recognizing an unknown person, the hardware module will send an SMS to the concerned security personnel for security preventive measures. (author)

  7. 75 FR 35444 - Safety and Security Equipment and Services Trade Mission To Brazil

    Science.gov (United States)

    2010-06-22

    ... and the host cities. In private security alone, Brazil spent over US$ 17 billion in 2008. In... intelligence, as well as an overview of the country's economic and political environment. A networking...-users and partners. Follow-on business meetings in other cities in the region can be set up before or...

  8. Computer Security: Join the CERN WhiteHat Challenge!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Over the past couple of months, several CERN users have reported vulnerabilities they have found in computing services and servers running at CERN. All were relevant, many were interesting and a few even surprising. Spotting weaknesses and areas for improvement before malicious people can exploit them is paramount. It helps protect the operation of our accelerators and experiments as well as the reputation of the Organization. Therefore, we would like to express our gratitude to those people for having reported these weaknesses! Great job and well done!   Seizing the opportunity, we would like to reopen the hunt for bugs, vulnerabilities and insecure configurations of CERN applications, websites and devices. You might recall we ran a similar initiative (“Hide & Seek”) in 2012 where we asked you to sift through CERN’s webpages and send us those that hold sensitive and confidential information. Quite a number of juicy documents were found and subsequently remov...

  9. 41 CFR 101-26.507 - Security equipment.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Security equipment. 101-26.507 Section 101-26.507 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES AND...

  10. Machining, joining and modifications of advanced materials

    CERN Document Server

    Altenbach, Holm

    2016-01-01

    This book presents the latest advances in mechanical and materials engineering applied to the machining, joining and modification of modern engineering materials. The contributions cover the classical fields of casting, forming and injection moulding as representative manufacturing methods, whereas additive manufacturing methods (rapid prototyping and laser sintering) are treated as more innovative and recent technologies that are paving the way for the manufacturing of shapes and features that traditional methods are unable to deliver. The book also explores water jet cutting as an innovative cutting technology that avoids the heat build-up typical of classical mechanical cutting. It introduces readers to laser cutting as an alternative technology for the separation of materials, and to classical bonding and friction stir welding approaches in the context of joining technologies. In many cases, forming and machining technologies require additional post-treatment to achieve the required level of surface quali...

  11. Rhenium Mechanical Properties and Joining Technology

    Science.gov (United States)

    Reed, Brian D.; Biaglow, James A.

    1996-01-01

    Iridium-coated rhenium (Ir/Re) provides thermal margin for high performance and long life radiation cooled rockets. Two issues that have arisen in the development of flight Ir/Re engines are the sparsity of rhenium (Re) mechanical property data (particularly at high temperatures) required for engineering design, and the inability to directly electron beam weld Re chambers to C103 nozzle skirts. To address these issues, a Re mechanical property database is being established and techniques for creating Re/C103 transition joints are being investigated. This paper discusses the tensile testing results of powder metallurgy Re samples at temperatures from 1370 to 2090 C. Also discussed is the evaluation of Re/C103 transition pieces joined by both, explosive and diffusion bonding. Finally, the evaluation of full size Re transition pieces, joined by inertia welding, as well as explosive and diffusion bonding, is detailed.

  12. Laser direct joining of metal and plastic

    International Nuclear Information System (INIS)

    Katayama, Seiji; Kawahito, Yousuke

    2008-01-01

    We have developed an innovative rapid laser direct joining process of metal and plastic lap plates without adhesives or glues. The joints made between a Type 304 stainless steel plate and a polyethylene terephthalate (PET) plastic sheet of 30 mm width possessed tensile shear loads of about 3000 N. Transmission electron microscope photographs of the joint demonstrated that Type 304 and the PET were bonded on the atomic, molecular or nanostructural level through a Cr oxide film

  13. Dod physical security equipment application experience

    International Nuclear Information System (INIS)

    Dixon, H.M.

    1978-01-01

    In the Department of Defense, the subject of physical security is very broad in scope. Its application ranges from countering the shoplifters in the post exchange facilities to the sophisticated terrorist who may attempt to obtain access to one of our nuclear weapons. This paper focuses on the area of specific interest to the members of INMM which is the protection of nuclear devices and the classified information associated with them

  14. Research and Development Opportunities for Joining Technologies in HVAC&R

    Energy Technology Data Exchange (ETDEWEB)

    Goetzler, William [Navigant Consulting, Burlington, MA (United States); Guernsey, Matt [Navigant Consulting, Burlington, MA (United States); Young, Jim [Navigant Consulting, Burlington, MA (United States)

    2015-10-01

    The Building Technologies Office (BTO) works with researchers and industry partners to develop and deploy technologies that can substantially reduce energy consumption and greenhouse gas (GHG) emissions in residential and commercial buildings. This opportunity assessment aims to advance BTO’s energy savings, GHG reduction, and other program goals by identifying research and development (R&D) initiatives for joining technologies in heating, ventilation, air-conditioning, and refrigeration (HVAC&R) systems. Improving joining technologies for HVAC&R equipment has the potential to increase lifetime equipment operating efficiency, decrease equipment and project cost, and most importantly reduce hydroflourocarbon (HFC) refrigerant leakage to support HFC phasedown and GHG reduction goals.

  15. 75 FR 15687 - Safety and Security Equipment and Services Trade Mission to Brazil

    Science.gov (United States)

    2010-03-30

    ... areas in Rio de Janeiro, Brasilia and Sao Paulo. The mission will include representatives from a variety... Timetable The proposed schedule allows for about a day and a half in Rio de Janeiro and S[atilde]o Paulo and... require individual schedules within one stop. Sunday, September 26 Mission arrives in Rio de Janeiro, Rio...

  16. Generic data base for security equipment and its utility in the safeguards inspection process. Final report 8151-79-FR-16

    International Nuclear Information System (INIS)

    Scala, S.

    1979-01-01

    This report contains material presented at the Nuclear Regulatory Commission (NRC) conference of regional inspectors in Atlanta, Georgia, on January 17, 1979. It describes the contents of the generic data base for security equipment, which was developed by SRI for NRC under a Sandia Laboratories' subcontract, and examines its potential utility in the process of inspection of NRC-licensed facilities

  17. Effectiveness of Taxicab Security Equipment in Reducing Driver Homicide Rates

    Science.gov (United States)

    Menéndez, Cammie K.C.; Amandus, Harlan E.; Damadi, Parisa; Wu, Nan; Konda, Srinivas; Hendricks, Scott A.

    2015-01-01

    Background Taxicab drivers historically have had one of the highest work-related homicide rates of any occupation. In 2010 the taxicab driver homicide rate was 7.4 per 100,000 drivers, compared to the overall rate of 0.37 per 100,000 workers. Purpose Evaluate the effectiveness of taxicab security cameras and partitions on citywide taxicab driver homicide rates. Methods Taxicab driver homicide rates were compared in 26 major cities in the U.S. licensing taxicabs with security cameras (n=8); bullet-resistant partitions (n=7); and cities where taxicabs were not equipped with either security cameras or partitions (n=11). News clippings of taxicab driver homicides and the number of licensed taxicabs by city were used to construct taxicab driver homicide rates spanning 15 years (1996–2010). Generalized estimating equations were constructed to model the Poisson-distributed homicide rates on city-specific safety equipment installation status, controlling for city homicide rate and the concurrent decline of homicide rates over time. Data were analyzed in 2012. Results Cities with cameras experienced a threefold reduction in taxicab driver homicides compared with control cities (RR=0.27; 95% CI=0.12, 0.61; p=0.002). There was no difference in homicide rates for cities with partitions compared with control cities (RR=1.15; 95% CI=0.80, 1.64; p=0.575). Conclusions Municipal ordinances and company policies mandating security cameras appear to be highly effective in reducing taxicab driver deaths due to workplace violence. PMID:23790983

  18. Precision Joining Center

    Science.gov (United States)

    Powell, J. W.; Westphal, D. A.

    1991-08-01

    A workshop to obtain input from industry on the establishment of the Precision Joining Center (PJC) was held on July 10-12, 1991. The PJC is a center for training Joining Technologists in advanced joining techniques and concepts in order to promote the competitiveness of U.S. industry. The center will be established as part of the DOE Defense Programs Technology Commercialization Initiative, and operated by EG&G Rocky Flats in cooperation with the American Welding Society and the Colorado School of Mines Center for Welding and Joining Research. The overall objectives of the workshop were to validate the need for a Joining Technologists to fill the gap between the welding operator and the welding engineer, and to assure that the PJC will train individuals to satisfy that need. The consensus of the workshop participants was that the Joining Technologist is a necessary position in industry, and is currently used, with some variation, by many companies. It was agreed that the PJC core curriculum, as presented, would produce a Joining Technologist of value to industries that use precision joining techniques. The advantage of the PJC would be to train the Joining Technologist much more quickly and more completely. The proposed emphasis of the PJC curriculum on equipment intensive and hands-on training was judged to be essential.

  19. Conjoint Forming - Technologies for Simultaneous Forming and Joining

    International Nuclear Information System (INIS)

    Groche, P; Wohletz, S; Mann, A; Krech, M; Monnerjahn, V

    2016-01-01

    The market demand for new products optimized for e. g. lightweight applications or smart components leads to new challenges in production engineering. Hybrid structures represent one promising approach. They aim at higher product performance by using a suitable combination of different materials. The developments of hybrid structures stimulate the research on joining of dissimilar materials. Since they allow for joining dissimilar materials without external heating technologies based on joining by plastic deformation seem to be of special attractiveness. The paper at hand discusses the conjoint forming approach. This approach combines forming and joining in one process. Two or more workpieces are joined while at least one workpiece is plastically deformed. After presenting the fundamental joining mechanisms, the conjoint forming approach is discussed comprehensively. Examples of conjoint processes demonstrate the effectiveness and reveal the underlying phenomena. (paper)

  20. Data Center Equipment Location and Monitoring System

    DEFF Research Database (Denmark)

    2013-01-01

    Abstract: Data center equipment location systems include hardware and software to provide information on the location, monitoring, and security of servers and other equipment in equipment racks. The systems provide a wired alternative to the wireless RFID tag system by using electronic ID tags...... connected to each piece of equipment, each electronic ID tag connected directly by wires to an equipment rack controller on the equipment rack. The equipment rack controllers link to a central control computer that provides an operator ...

  1. Join or be excluded from biomedicine? JOINS and Post-colonial Korea.

    Science.gov (United States)

    Ma, Eunjeong

    2015-04-01

    This paper discusses re-emergence of Korean medicine(s) in the global context with a focus on a natural drug JOINS, a highly contentious drug regarding its legal status. By following through its life world, the paper contends that the drug is the embodiment of the postcolonial anxiety that crosses the intersections between the aspiring nation and globalizing strategies of the bio-pharmaceutical industry. JOINS is a natural drug prescribed to alleviate the symptoms of degenerative arthritis. SK Chemicals, Ltd., a giant domestic pharmaceutical company developed the drug by utilizing the knowledge of traditional pharmacopeia and put it on the market in 2001. In the domestic market, the drug is treated as a prescription drug, implying that Western medicine-trained doctors (as opposed to Korean medicine doctors) are entitled to prescribe drugs. It also indicates that the drug has undergone a series of lab tests such as toxicity, efficacy, and clinical trials in compliance with regulatory guidelines. However, the domestic standards are not rigorous enough to satisfy international standards, so that it is exported as a nutritional supplement abroad. The government, the pharmaceutical industry, and the Western medicine profession are happy with how the drug stands domestically and internationally. Rather, it is Korean doctors who try to disrupt the status quo and reclaim their rights to traditional knowledge, who have been alienated from the pharmaceuticalization of traditional knowledge. Thus, the JOINS tablet embodies the complex web of modern Korean society, professional interests, the pharmaceutical industry, and globalization.

  2. Fastening, coupling and joining technique between diaspora and irredenta

    Science.gov (United States)

    Bauer, C.-O.

    1980-06-01

    The problem of eliminating the present divergence and shattering (diaspora) in the treatment of problems of the fastening, coupling, and joining technique on different technical branches is examined. It is shown that by an appropriate independence the fastening, coupling and joining techniques can recognize and consequently utilize the numerous performance reserves which are concealed by the present organization and action due to the lack of systematically tended works.

  3. Efficient algorithms for factorization and join of blades

    NARCIS (Netherlands)

    Fontijne, D.; Dorst, L.; Bayro-Corrochano, E.; Scheuermann, G.

    2010-01-01

    Subspaces are powerful tools for modeling geometry. In geometric algebra, they are represented using blades and constructed using the outer product. Producing the actual geometrical intersection (meet) and union (join) of subspaces, rather than the simplified linearizations often used in

  4. Microwave joining of SiC ceramics and composites

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, I.; Silberglitt, R.; Tian, Y.L. [FM Technologies, Inc., Fairfax, VA (United States); Katz, J.D. [Los Alamos National Lab., NM (United States)

    1997-04-01

    Potential applications of SiC include components for advanced turbine engines, tube assemblies for radiant burners and petrochemical processing and heat exchangers for high efficiency electric power generation systems. Reliable methods for joining SiC are required in order to cost-effectively fabricate components for these applications from commercially available shapes and sizes. This manuscript reports the results of microwave joining experiments performed using two different types of SiC materials. The first were on reaction bonded SiC, and produced joints with fracture toughness equal to or greater than that of the base material over an extended range of joining temperatures. The second were on continuous fiber-reinforced SiC/SiC composite materials, which were successfully joined with a commercial active brazing alloy, as well as by using a polymer precursor.

  5. Five reasons to join local Chamber of Commerce and Industry

    OpenAIRE

    Verbovskii, Vladislav; Kosov, Vladimir; Chaika (Chayka), Yuliya Aleksandrovna

    2016-01-01

    The article describes five useful things that Chamber of Commerce and Industry membership may give to business owners after joining it. These things are the reasons to become a part of business community formed by Chambers of Commerce that may be considered by those business owner who are deciding whether to join Chamber of Commerce or not. Mentioned reasons are given with examples related to Tomsk Chamber of Commerce and Industry and are relevant to any Chamber of Commerce located in Russian...

  6. Potentials of Industrie 4.0 and Machine Learning for Mechanical Joining

    OpenAIRE

    Jäckel, Mathias

    2017-01-01

    -Sensitivity analysis of the influence of component properties and joining parameters on the joining result for self-pierce riveting -Possibilities to link mechanical joining technologies with the automotive process chain for quality and flexibility improvements -Potential of using machine learning to reduce automotive product development cycles in relation to mechanical joining -Datamining for machine learning at mechanical joining

  7. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  8. Cohesive delamination and frictional contact on joining surface via XFEM

    Directory of Open Access Journals (Sweden)

    Francesco Parrinello

    2018-02-01

    Full Text Available In the present paper, the complex mechanical behaviour of the surfaces joining two differentbodies is analysed by a cohesive-frictional interface constitutive model. The kinematical behaviouris characterized by the presence of discontinuous displacement fields, that take place at the internalconnecting surfaces, both in the fully cohesive phase and in the delamination one. Generally, in order tocatch discontinuous displacement fields, internal connecting surfaces (adhesive layers are modelled bymeans of interface elements, which connect, node by node, the meshes of the joined bodies, requiringthe mesh to be conforming to the geometry of the single bodies and to the relevant connecting surface.In the present paper, the Extended Finite Element Method (XFEM is employed to model, both fromthe geometrical and from the kinematical point of view, the whole domain, including the connectedbodies and the joining surface. The joining surface is not discretized by specific finite elements, butit is defined as an internal discontinuity surface, whose spatial position inside the mesh is analyticallydefined. The proposed approach is developed for two-dimensional composite domains, formed by twoor more material portions joined together by means of a zero thickness adhesive layer. The numericalresults obtained with the proposed approach are compared with the results of the classical interfacefinite element approach. Some examples of delamination and frictional contact are proposed withlinear, circular and curvilinear adhesive layer.

  9. Joining method for pressure tube and martensitic stainless steel tube

    International Nuclear Information System (INIS)

    Kimoto, Hiroshi; Koike, Hiromitsu.

    1993-01-01

    In a joining portion of zirconium alloy and a stainless steel, the surface of martensitic stainless steel being in contact with Zr and Zr alloy is applied with a laser quenching solidification treatment before expanding joining of them to improve the surface. This can provide the surface with refined coagulated cell tissues and make deposits and impurities homogeneous and solubilized. As a result, the surface of the martensitic stainless steel has highly corrosion resistance, to suppress contact corrosion with Zr and Zr alloy. Accordingly, even if it is exposed to high temperature water of 200 to 350degC, failures of Zr and Zr alloy can be suppressed. (T.M.)

  10. Superplasticity and joining of zirconia-based ceramics

    International Nuclear Information System (INIS)

    Dominguez-Rodriguez, A.; Gutierrez-Mora, F.; Jimenez-Melendo, M.; Chaim, R.; Routbort, J. L.

    1999-01-01

    Steady-state creep and joining of alumina/zirconia composites containing alumina volume fractions of 20, 60, and 85% have been investigated between 1,250 and 1,350 C. Superplasticity of these compounds is controlled by grain-boundary sliding and the creep rate is a function of alumina volume fraction, not grain size. Using the principles of superplasticity, pieces of the composite have been joined by applying the stress required to achieve 5 to 10% strain to form a strong interface at temperatures as low as 1,200 C

  11. Welding and joining of single crystals of BCC refractory metals

    International Nuclear Information System (INIS)

    Hiraoka, Yutaka; Fujii, Tadayuki

    1989-01-01

    Welding and joining is one of key technologies for the wider utilizations of a material. In the present work, the applicability of welding and joining for a single crystal of BCC refractory metal was investigated. Electron-beam welding and tungsten-inert-gas welding by a melt-run technique, and high-temperature brazing by using brazing metals such as Mo-40%Ru alloy, vanadium or platinum were conducted for molybdenum single crystal which had been prepared by means of secondary recrystallization. 12 refs.,12 figs., 2 tabs. (Author)

  12. Superplasticity and joining of zirconia-based ceramics

    International Nuclear Information System (INIS)

    Gutierrez-Mora, F.; Dominguez-Rodriguez, A.; Jimenez-Melendo, M.; Chaim, R.; Ravi, G.B.; Routbort, J.L.

    2000-01-01

    Steady-state creep and joining of alumina/zirconia composites containing alumina volume fractions of 20, 60 and 85% have been investigated between 1,250 and 1,350 C. Superplasticity of these compounds is controlled by grain-boundary sliding and the creep rate is a function of alumina volume fraction, not grain size. Using the principles of superplasticity, pieces of the composite have been joined by applying the stress required to achieve 5 to 10% strain to form a strong interface at temperatures as low as 1,200 C

  13. Shipboard and laboratory equipment

    Digital Repository Service at National Institute of Oceanography (India)

    Shyamprasad, M.; Ramaswamy, V.

    The polymetallic nodules occur at an average depth of 4500 m. Adequate equipment and techniques are required for the exploration at such depths. Shipboard and various laboratory equipments for the sampling of polymetallic nodules is described...

  14. Ceramic joining

    Energy Technology Data Exchange (ETDEWEB)

    Loehman, R.E. [Sandia National Lab., Albuquerque, NM (United States)

    1996-04-01

    This paper describes the relation between reactions at ceramic-metal interfaces and the development of strong interfacial bonds in ceramic joining. Studies on a number of systems are described, including silicon nitrides, aluminium nitrides, mullite, and aluminium oxides. Joints can be weakened by stresses such as thermal expansion mismatch. Ceramic joining is used in a variety of applications such as solid oxide fuel cells.

  15. Efficient algorithms for factorization and join of blades

    NARCIS (Netherlands)

    Fontijne, D.

    2008-01-01

    Subspaces are powerful tools for modeling geometry. In geometric algebra, they are represented using blades and constructed using the outer product. To produce the actual geometrical intersection (Meet) and union (Join) of subspaces, rather than the simplified linearizations often used in

  16. Joining the RHIC Online and Offline Models

    CERN Document Server

    Malitsky, Nikolay; Fedotov, Alexei V; Kewisch, Jorg; Luccio, Alfredo U; Pilat, Fulvia Caterina; Ptitsyn, Vadim; Satogata, Todd; Talman, Richard M; Tepikian, Steven; Wei, Jie

    2005-01-01

    The paper presents an interface encompassing the RHIC online ramp model and the UAL offline simulation framework. The resulting consolidated facility aims to minimize the gap between design and operational data, and to facilitate analysis of RHIC performance and future upgrades in an operational context. The interface is based on the Accelerator Description Exchange Format (ADXF), and represents a snapshot of the RHIC online model which is in turn driven by machine setpoints. This approach is also considered as an intermediate step towards integrating the AGS and RHIC modeling environments to produce a unified online and offline AGS model for operations.

  17. Joining the Ideational and the Interpersonal Metafunction

    DEFF Research Database (Denmark)

    Holsting, Alexandra

    2013-01-01

    in question are ideational (clause complex, Angle) and interpersonal (modal Adjunct, modal auxiliary, mood) and how they – individually and in combination – emphasize different aspects of projection meaning. A specific status is ascribed to the subjunctive mood, which has a special instructive function...

  18. Marie and Pierre Curie: joined in science

    International Nuclear Information System (INIS)

    Lehembre, B.

    1999-01-01

    This book relates the life and works of the most famous married couple of scientists. Their works have completely overturned the science of the 20. century and their discovery of radium was rewarded by the Nobel price in 1903. This marriage both in science and life ended three years later because of a banal accident: Pierre Curie is fatally knocked down by a horse carriage in Paris. (J.S.)

  19. History-based joins : semantics, soundness and implementation

    NARCIS (Netherlands)

    Hee, van K.M.; Oanea, O.I.; Serebrenik, A.; Sidorova, N.; Voorhoeve, M.; Dustdar, S.; Fiadeiro, J.L.; Sheth, A.

    2006-01-01

    In this paper we study the use of case history for control structures in workflow processes. In particular we introduce a historydependent join. History dependent control offers much more modeling power than classical control structures and it solves several semantical problems of industrial

  20. Joining Distributed Complex Objects: Definition and Performance

    NARCIS (Netherlands)

    Teeuw, W.B.; Teeuw, Wouter B.; Blanken, Henk

    1992-01-01

    The performance of a non-standard distributed database system is strongly ifluenced by complex objects. The effective exploitation of parallelism in querying them and a suitable structure to store them are required in order to obtain acceptable response times in these database environments where

  1. Genome aliquoting with double cut and join

    Directory of Open Access Journals (Sweden)

    Sankoff David

    2008-01-01

    Full Text Available Abstract Background The genome aliquoting probem is, given an observed genome A with n copies of each gene, presumed to descend from an n-way polyploidization event from an ordinary diploid genome B, followed by a history of chromosomal rearrangements, to reconstruct the identity of the original genome B'. The idea is to construct B', containing exactly one copy of each gene, so as to minimize the number of rearrangements d(A, B' ⊕ B' ⊕ ... ⊕ B' necessary to convert the observed genome B' ⊕ B' ⊕ ... ⊕ B' into A. Results In this paper we make the first attempt to define and solve the genome aliquoting problem. We present a heuristic algorithm for the problem as well the data from our experiments demonstrating its validity. Conclusion The heuristic performs well, consistently giving a non-trivial result. The question as to the existence or non-existence of an exact solution to this problem remains open.

  2. The Use of Explosive Forming for Fastening and Joining Structural and Pressure Components

    Science.gov (United States)

    Schroeder, J. W.

    1985-01-01

    Explosive expansion of tubes into tubesheets has been used for over 20 years in the fabrication and repair of shell and tube heat exchangers. The use of explosives to perform these expansions has offered several distinct advantages over other methods. First, the process is fast and economical and can be performed with minimal training of personnel. Secondly, explosive forming does not cause the deleterious metallurgical effects which often result from other forming operations. In addition, the process can be performed remotely without the need for sophisticated handling equipment. The expansion of tubes into tubesheets is only one of many possible fastening and joining applications for which explosive forming can be used to achieve highly successful results. The explosive forming process and where it has been used are described. In addition, some possible adaptations to other joining applications are identified and discussed.

  3. Research on the security of nuclear power equipment

    International Nuclear Information System (INIS)

    Zhao Jiong; Wu Jinzong

    2008-06-01

    Recently, the rapidly growing economy in conflict with the lack of power in the whole country become more and more seriously in our country. In other hand, there is also various kind of problems such as greenhouse effect and the oil price rising conditions. It greatly promote our country's development of Nuclear power project. As forecast, the number of Nuclear Power Plant will increase greatly in the future. However, the security of the Nuclear Power Plant is one of the topics that people always pay more attention to. Combining with the practice experience of Nuclear Power Plant in Japanese, the security of Nuclear Power Plant in multi-angles is discussed. It is pointed that the risk assesment and management system of nuclear power plant are effective measure for security of the development of nuclear power. (authors)

  4. Optimizing and joining future safeguards efforts by 'remote inspections'

    International Nuclear Information System (INIS)

    Zendel, M.; Khlebnikov, N.

    2009-01-01

    Full-text: Remote inspections have a large potential to save inspection effort in future routine safeguards implementation. Such inspections involve remote activities based on the analysis of data acquired in the field without the physical presence of an inspector, shifting the inspectors' priorities further toward unannounced inspections, complementary access activities and data evaluation. Large, automated and complex facilities require facility resident and specific safeguards equipment systems with features for unattended and remotely controlled operation as well as being integrated in the nuclear process. In many instances the use of such equipment jointly with the SSAC/RSAC and the operator is foreseen to achieve affordable effectiveness with a minimum level of intrusiveness to the facility operation. Where it becomes possible to achieve independent conclusions by this approach, the IAEA would make full use of the SSAC/RSAC, involving State inspectors and/or facility operators to operate inspection systems under remotely controlled IAEA mechanisms. These mechanisms would include documented procedures for routine joint-use, defining arrangements for data sharing, physical security and authentication mechanisms, recalibration and use of standards and software, maintenance, repair, storage and transportation. The level of cooperation and willingness of a State to implement such measures requested and properly justified by the IAEA will demonstrate its commitment to full transparency in its nuclear activities. Examples of existing remote inspection activities, including joint-use activities will be discussed. The future potential of remote inspections will be assessed considering technical developments and increased needs for process monitoring. Enhanced cooperation with SSAC/RSAC within the framework of remote inspections could further optimize the IAEA's inspection efforts while at the same time maintaining effective safeguards implementation. (author)

  5. Data center equipment location and monitoring system

    DEFF Research Database (Denmark)

    2011-01-01

    A data center equipment location system includes both hardware and software to provide for location, monitoring, security and identification of servers and other equipment in equipment racks. The system provides a wired alternative to the wireless RFID tag system by using electronic ID tags...... connected to each piece of equipment, each electronic ID tag connected directly by wires to a equipment rack controller on the equipment rack. The equipment rack controllers then link over a local area network to a central control computer. The central control computer provides an operator interface......, and runs a software application program that communicates with the equipment rack controllers. The software application program of the central control computer stores IDs of the equipment rack controllers and each of its connected electronic ID tags in a database.; The software application program...

  6. Recent progress in micro and nano-joining

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Y; Hu, A; Khan, M I; Wu, W; Tam, B; Yavuz, M [Centre for Advanced Materials Joining Department of Mechanical and Mechatronics Engineering, University of Waterloo 200 University Avenue West, Waterloo, N2L 3G1 (Canada)], E-mail: nzhou@uwaterloo.ca

    2009-05-01

    Micro and nano-joining has been identified as a key enabling technology in the construction of micromechanical and microelectronic devices. The current article reviews recent progress in micro and nano-joining. In particular, laser micro-welding (LMW) of crossed 316 LVM stainless steel (SS) wire was compared to conventional resistance micro-welding (RMW) and was successfully employed in welding a Pt-Ir /SS dissimilar combination. Welding of Au nanoparticles was realized using femtosecond laser irradiation and its application in the surface enhanced Raman spectroscopy was investigated. Brazing between carbon nanotube (CNT) bundles and Ni electrodes was attained in vacuum, resulting in the development of a novel CNT filament of incandescent lamps.

  7. Meet and Join Matrices in the Poset of Exponential Divisors

    Indian Academy of Sciences (India)

    ... exponential divisor ( G C E D ) and the least common exponential multiple ( L C E M ) do not always exist. In this paper we embed this poset in a lattice. As an application we study the G C E D and L C E M matrices, analogues of G C D and L C M matrices, which are both special cases of meet and join matrices on lattices.

  8. Trend and Development of Semisolid Metal Joining Processing

    Directory of Open Access Journals (Sweden)

    M. N. Mohammed

    2015-01-01

    Full Text Available The semisolid metal joining (SSMJ process or thixojoining process has recently been developed based on the principles of SSM processing, which is a technology that involves the formation of metal alloys between solidus and liquidus temperatures. Thixojoining has many potential benefits, which has encouraged researchers to carry out feasibility studies on various materials that could be utilized in this process and which could transform the production of metal components. This paper reviews the findings in the literature to date in this evolving field, specifically, the experimental details, technology considerations for industrialization, and advantages and disadvantages of the various types of SSMJ methods that have been proposed. It also presents details of the range of materials that have been joined by using the SSMJ process. Furthermore, it highlights the huge potential of this process and future directions for further research.

  9. Radiological security of portable equipment used in the industry

    International Nuclear Information System (INIS)

    Cateriano, M.A.

    2006-01-01

    The industrial meters with encapsulated sources are used intensely in the present time due to the economic benefits that generate. Their use in all the one world has been reflected in an improvement of the quality of the analyzed product and of one optimization of the production process, allowing to carry out these measurements and controls without interrupting the process and in non destructive form generating an energy saving in turn and of materials. Although these industrial meters are intrinsically safe for design in the portable meters their safety also is strongly governed in the strict pursuit of procedures and in the adequate personnel's training that operate these equipment. In the Argentine Republic in 2005 the Nuclear Regulatory Authority (RNA) had registered a quantity of 160 portable equipment. In the period 1995-2003, 2 incidents took place with these equipment one of them used to measure soils humidity of Troxler trademark containing a source of Am-241(Be) of 370 MBq and the remaining one also of Troxler trademark used to measure density and humidity of soils containing 2 sources of Cs-137 of 296 MBq and Am-241(Be) of 1.48 GBq respectively. The incidents were developed without relevant radiological implications had taken place. In this work those mentioned incidents are analyzed in order to determining the causes that originated the same ones, for this way to be able to elaborate recommendations with the purpose of to correct errors and to diminish the recurrence probability improving the safety in the use of these equipment. From the analyses of these incidents result that should put on more emphasis in the personnel training and the invigoration of the safety culture in the use of the industrial meters. Also a present panorama of the inventory of equipment, sources and users that possess these portable meters in the Argentine Republic is also presented. (Author)

  10. International Symposium on Interfacial Joining and Surface Technology (IJST2013)

    Science.gov (United States)

    Takahashi, Yasuo

    2014-08-01

    Interfacial joining (bonding) is a widely accepted welding process and one of the environmentally benign technologies used in industrial production. As the bonding temperature is lower than the melting point of the parent materials, melting of the latter is kept to a minimum. The process can be based on diffusion bonding, pressure welding, friction welding, ultrasonic bonding, or brazing-soldering, all of which offer many advantages over fusion welding. In addition, surface technologies such as surface modification, spraying, coating, plating, and thin-film formation are necessary for advanced manufacturing, fabrication, and electronics packaging. Together, interfacial joining and surface technology (IJST) will continue to be used in various industrial fields because IJST is a very significant form of environmentally conscious materials processing. The international symposium of IJST 2013 was held at Icho Kaikan, Osaka University, Japan from 27-29 November, 2013. A total of 138 participants came from around the world to attend 56 oral presentations and 36 posters presented at the symposium, and to discuss the latest research and developments on interfacial joining and surface technologies. This symposium was also held to commemorate the 30th anniversary of the Technical Commission on Interfacial Joining of the Japan Welding Society. On behalf of the chair of the symposium, it is my great pleasure to present this volume of IOP Conference Series: Materials Science and Engineering (MSE). Among the presentations, 43 papers are published here, and I believe all of the papers have provided the welding community with much useful information. I would like to thank the authors for their enthusiastic and excellent contributions. Finally, I would like to thank all members of the committees, secretariats, participants, and everyone who contributed to this symposium through their support and invaluable effort for the success of IJST 2013. Yasuo Takahashi Chair of IJST 2013

  11. International Symposium on Interfacial Joining and Surface Technology (IJST2013)

    International Nuclear Information System (INIS)

    Takahashi, Yasuo

    2014-01-01

    Interfacial joining (bonding) is a widely accepted welding process and one of the environmentally benign technologies used in industrial production. As the bonding temperature is lower than the melting point of the parent materials, melting of the latter is kept to a minimum. The process can be based on diffusion bonding, pressure welding, friction welding, ultrasonic bonding, or brazing-soldering, all of which offer many advantages over fusion welding. In addition, surface technologies such as surface modification, spraying, coating, plating, and thin-film formation are necessary for advanced manufacturing, fabrication, and electronics packaging. Together, interfacial joining and surface technology (IJST) will continue to be used in various industrial fields because IJST is a very significant form of environmentally conscious materials processing. The international symposium of IJST 2013 was held at Icho Kaikan, Osaka University, Japan from 27–29 November, 2013. A total of 138 participants came from around the world to attend 56 oral presentations and 36 posters presented at the symposium, and to discuss the latest research and developments on interfacial joining and surface technologies. This symposium was also held to commemorate the 30th anniversary of the Technical Commission on Interfacial Joining of the Japan Welding Society. On behalf of the chair of the symposium, it is my great pleasure to present this volume of IOP Conference Series: Materials Science and Engineering (MSE). Among the presentations, 43 papers are published here, and I believe all of the papers have provided the welding community with much useful information. I would like to thank the authors for their enthusiastic and excellent contributions. Finally, I would like to thank all members of the committees, secretariats, participants, and everyone who contributed to this symposium through their support and invaluable effort for the success of IJST 2013. Yasuo Takahashi Chair of IJST 2013

  12. Developments in welding and joining methods of metallic materials

    International Nuclear Information System (INIS)

    Pilarczyk, J.

    2007-01-01

    The impact of the welding technology on the economy development. The welding and joining methods review. The particular role of the laser welding and its interesting applications: with filler metal, twin spot laser welding, hybrid welding process, remote welding. The fiber lasers. The high intensity electron beams applications for surface modification. The TIG welding with the use of the active flux. Friction welding, friction stir welding and friction linear welding. (author)

  13. Aluminum and stainless steel tubes joined by simple ring and welding process

    Science.gov (United States)

    Townhill, A.

    1967-01-01

    Duranel ring is used to join aluminum and stainless steel tubing. Duranel is a bimetal made up of roll-bonded aluminum and stainless steel. This method of joining the tubing requires only two welding operations.

  14. The MCNP simulation of the X-ray leakage of X-ray security inspection equipment

    International Nuclear Information System (INIS)

    Wang Kai; Liu Bin; Hu Wenchao; Zhao Wei

    2011-01-01

    Objective: To simulate the radiation leakage of the X-ray security inspection equipment used in the subways stations. Methods: We use the MCNP4C code to simulate the X-ray leakage of the equipment during the working process. Result: the biggest amount of radiation received by the body is 8.26 μSv/a, however, if the Lead screens of the X-ray security equipment is intact, the amount of radiation received by the body is only 0.0727 μSv/a. The final. Conclusions: When the baggage get in /out the X-ray security inspection equipment, the gas in Lead screens was made, and then the amount of radiation received by human body increased; The amount of radiation received by the body is close to but still below 10 μSv/a which is the exemption criteria set by the 'safety of radiation sources of ionizing radiation protection and basic standards'(GB18871-2002). (authors)

  15. Advanced fusion welding processes, solid state joining and a successful marriage. [production of aerospace structures

    Science.gov (United States)

    Miller, F. R.

    1972-01-01

    Joining processes for aerospace systems combine fusion welding and solid state joining during production of metal structures. Detailed characteristics of electron beam welding, plasma arc welding, diffusion welding, inertia welding and weldbond processes are discussed.

  16. Hardware Module for the Security Enhancement of Optical Telecom Network Equipment

    International Nuclear Information System (INIS)

    Nadeem; Ali, M.

    2015-01-01

    The telecommunication equipment physical security threats have increased not only in Pakistan but also anywhere in the world and hence, reducing the revenue. This new challenging and alarming situation is created for the telecom network provider. The main focus of this paper is to provide a low cost economical design for reducing the theft of the costly telecommunication equipment like optical network units (ONU). This system is based on instant messaging on the mobile in the event of theft through GSM modem. The proposed security module is dynamic, flexible and can also be integrated in the existing networks and separately having its own independent low power consumption source. The module will continuously work successfully under different scenarios such as completely isolated from other devices by power break down or by fibre cut. (author)

  17. HVAC systems and equipment

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, S.T. (Linford Air and Refrigeration Company, Oakland, CA (US))

    1990-02-01

    The author discusses the section of the ASHRAE Standard 90.1-1989 which addresses HVAC systems and equipment. New features of HVAC systems mandatory general requirements are described. New prescriptive requirements are detailed.

  18. Boolean Operations, Joins, and the Extended Low Hierarchy

    OpenAIRE

    Hemaspaandra, Lane A.; Jiang, Zhigen; Rothe, Joerg; Watanabe, Osamu

    1999-01-01

    We prove that the join of two sets may actually fall into a lower level of the extended low hierarchy than either of the sets. In particular, there exist sets that are not in the second level of the extended low hierarchy, EL_2, yet their join is in EL_2. That is, in terms of extended lowness, the join operator can lower complexity. Since in a strong intuitive sense the join does not lower complexity, our result suggests that the extended low hierarchy is unnatural as a complexity measure. We...

  19. Glass-ceramic joint and method of joining

    Science.gov (United States)

    Meinhardt, Kerry D [Richland, WA; Vienna, John D [West Richland, WA; Armstrong, Timothy R [Clinton, TN; Pederson, Larry R [Kennewick, WA

    2003-03-18

    The present invention is a glass-ceramic material and method of making useful for joining a solid ceramic component and at least one other solid component. The material is a blend of M1-M2-M3, wherein M1 is BaO, SrO, CaO, MgO, or combinations thereof, M2 is Al.sub.2 O.sub.3, present in the blend in an amount from 2 to 15 mol %, M3 is SiO.sub.2 with up to 50 mol % B.sub.2 O.sub.3 that substantially matches a coefficient of thermal expansion of the solid electrolyte. According to the present invention, a series of glass ceramics in the M1-Al.sub.2 O.sub.3 -M3 system can be used to join or seal both tubular and planar solid oxide fuel cells, oxygen electrolyzers, and membrane reactors for the production of syngas, commodity chemicals and other products.

  20. Cores, Joins and the Fano-Flow Conjectures

    Directory of Open Access Journals (Sweden)

    Jin Ligang

    2018-02-01

    Full Text Available The Fan-Raspaud Conjecture states that every bridgeless cubic graph has three 1-factors with empty intersection. A weaker one than this conjecture is that every bridgeless cubic graph has two 1-factors and one join with empty intersection. Both of these two conjectures can be related to conjectures on Fano-flows. In this paper, we show that these two conjectures are equivalent to some statements on cores and weak cores of a bridgeless cubic graph. In particular, we prove that the Fan-Raspaud Conjecture is equivalent to a conjecture proposed in [E. Steffen, 1-factor and cycle covers of cubic graphs, J. Graph Theory 78 (2015 195–206]. Furthermore, we disprove a conjecture proposed in [G. Mazzuoccolo, New conjectures on perfect matchings in cubic graphs, Electron. Notes Discrete Math. 40 (2013 235–238] and we propose a new version of it under a stronger connectivity assumption. The weak oddness of a cubic graph G is the minimum number of odd components (i.e., with an odd number of vertices in the complement of a join of G. We obtain an upper bound of weak oddness in terms of weak cores, and thus an upper bound of oddness in terms of cores as a by-product.

  1. Current state of commercial radiation detection equipment for homeland security applications

    International Nuclear Information System (INIS)

    Klann, R.T.; Shergur, J.; Mattesich, G.

    2009-01-01

    With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors

  2. Safeguards techniques and equipment

    International Nuclear Information System (INIS)

    1997-01-01

    The current booklet is intended to give a full and balanced description of the techniques and equipment used for both nuclear material accountancy and containment and surveillance measures, and for the new safeguards measure of environmental sampling. As new verification measures continue to be developed, the material in the booklet will be periodically reviewed and updated versions issued. (author)

  3. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NARCIS (Netherlands)

    Wolthuis, R.; Broenink, E.G.; Fransen, F.; Schultz, S.; Vries, A. de

    2010-01-01

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more

  4. Changes in security systems and manufacture equipment and inspection; Modificaciones en sistemas de seguridad y en equipos de fabricacion e inspeccion

    Energy Technology Data Exchange (ETDEWEB)

    Paloma, J. J.; Moraga, J. L.

    2015-07-01

    From the beginning of its industrial activity 30 years ago, the Juzbado factory of Enusa Group has maintained a strong commitment to safety and technological innovation. As a result, we have development new equipment and constantly improving the existing ones, as well as the facilities of the factory in accordance with the internal procedures, with multidisciplinary design teams and review teams. (Author)

  5. DSCu/SS joining techniques development and testing

    International Nuclear Information System (INIS)

    Sato, Satoshi; Hatano, Toshihisa; Furuya, Kazuyuki; Kuroda, Toshimasa; Enoeda, Mikio; Takatsu, Hideyuki

    1998-01-01

    Joining techniques of alumina dispersion strengthened copper alloy (DSCu) and type 316L stainless steel (SS) has been investigated aiming at applying to the fabrication of the ITER first wall/blanket. As the joining method, Hot Isostatic Pressing (HIP) of solid plates and/or blocks has been pursued. By a screening test including HIP temperatures of 980-1050degC, it was concluded that the HIP temperature of 1050degC would be optimum for the simultaneous HIPping of DSCu/DSCu, DSCu/SS and SS/SS. With DSCu/SS joint specimens HIPped at 1050degC, tensile, impact, fatigue, crack propagation, and fracture toughness tests were performed as well as mechanical test of structural model with one SS circular tube embedded. Typically, the properties of the joints were almost the same as those of DSCu or SS base metal with the same heat treatment of the HIP process, thus good joints were obtained, though parts of properties were decreased at elevated test temperature. Typical results of the mechanical test of structural mode indicated that a crack initiated at the inner surface of the SS tube under cyclic operation, and the lifetime of the first wall structure could be evaluated by existing SS fatigue data. Two HIPped first wall panel mock-ups were successfully fabricated with built-in coolant tubes: one was 300 mm long and the other 800 mm long. The former was thermo-mechanically tested with high heat fluxes corresponding to the ITER operation conditions. The mock-up showed good heat removal performance during the high heat flux tests. In addition, there were no cracks and delaminations found at HIPped interfaces by microscopic observation after all tests. Ultrasonic testing have been tried as a non-destructive examination method, and detectable defect size at SS/SS, DSCu/DSCu and DSCu/SS joint interfaces were estimated. (author)

  6. Sorting by Cuts, Joins, and Whole Chromosome Duplications.

    Science.gov (United States)

    Zeira, Ron; Shamir, Ron

    2017-02-01

    Genome rearrangement problems have been extensively studied due to their importance in biology. Most studied models assumed a single copy per gene. However, in reality, duplicated genes are common, most notably in cancer. In this study, we make a step toward handling duplicated genes by considering a model that allows the atomic operations of cut, join, and whole chromosome duplication. Given two linear genomes, [Formula: see text] with one copy per gene and [Formula: see text] with two copies per gene, we give a linear time algorithm for computing a shortest sequence of operations transforming [Formula: see text] into [Formula: see text] such that all intermediate genomes are linear. We also show that computing an optimal sequence with fewest duplications is NP-hard.

  7. Joining of advanced materials

    CERN Document Server

    Messler, Robert W

    1993-01-01

    Provides an unusually complete and readable compilation of the primary and secondary options for joining conventional materials in non-conventional ways. Provides unique coverage of adhesive bonding using both organic and inorganic adhesives, cements and mortars. Focuses on materials issues without ignoring issues related to joint design, production processing, quality assurance, process economics, and joining performance in service.Joining of advanced materials is a unique treatment of joining of both conventional and advanced metals andalloys, intermetallics, ceramics, glasses, polymers, a

  8. Visual communication and terminal equipment

    International Nuclear Information System (INIS)

    Kang, Cheol Hui

    1988-06-01

    This book is divided two parts about visual communication and terminal equipment. The first part introduces visual communication, which deals with foundation of visual communication, technique of visual communication, equipment of visual communication, a facsimile and pictorial image system. The second part contains terminal equipment such as telephone, terminal equipment for data transmission on constitution and constituent of terminal equipment for data transmission, input device and output device, terminal device and up-to-date terminal device.

  9. Visual communication and terminal equipment

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Cheol Hui

    1988-06-15

    This book is divided two parts about visual communication and terminal equipment. The first part introduces visual communication, which deals with foundation of visual communication, technique of visual communication, equipment of visual communication, a facsimile and pictorial image system. The second part contains terminal equipment such as telephone, terminal equipment for data transmission on constitution and constituent of terminal equipment for data transmission, input device and output device, terminal device and up-to-date terminal device.

  10. Manufacturing and joining technologies for helium cooled divertors

    International Nuclear Information System (INIS)

    Aktaa, J.; Basuki, W.W.; Weber, T.; Norajitra, P.; Krauss, W.; Konys, J.

    2014-01-01

    Highlights: • The manufacturing and joining technologies developed at KIT for helium cooled divertors are reviewed and critically discussed. • Various technologies have been pursued and further developed aiming divertor components with very high quality and sufficient reliability. • Very promising routes have been found for which however still R and D works are necessary. • Technologies developed are also useful for other divertor and even blanket concepts, particularly those with tungsten armor. - Abstract: In the helium cooled (HC) divertor, developed at KIT for a fusion power plant, tungsten has been selected as armor as well as structural material due to its crucial properties: high melting point, very low sputtering yield, good thermal conductivity, high temperature strength, low thermal expansion and low activation. Thereby the armor tungsten is attached to the structural tungsten by thermally conductive joint. Due to the brittleness of tungsten at low temperatures its use as structural material is limited to the high temperature part of the component and a structural joint to the reduced activation ferritic martensitic steel EUROFER97 is foreseen. Hence, to realize the selected hybrid material concept reliable tungsten–steel and tungsten–tungsten joints have been developed and will be reported in this paper. In addition, the modular design of the HC divertor requires tungsten armor tiles and tungsten structural thimbles to be manufactured in high numbers with very high quality. Due to the high strength and low temperature brittleness of tungsten special manufacturing techniques need to be developed for the production of parts with no cavities inside and/or surface flaws. The main achievement in developing the respective manufacturing technologies will be presented and discussed. To achieve the objectives mentioned above various manufacturing and joining technologies are pursued. Their later applicability depends on the level of development

  11. Social Pharmacy and Clinical Pharmacy—Joining Forces

    Directory of Open Access Journals (Sweden)

    Anna Birna Almarsdottir

    2015-12-01

    Full Text Available This commentary seeks to define the areas of social pharmacy and clinical pharmacy to uncover what they have in common and what still sets them apart. Common threats and challenges of the two areas are reviewed in order to understand the forces in play. Forces that still keep clinical and social pharmacy apart are university structures, research traditions, and the management of pharmacy services. There are key (but shrinking differences between clinical and social pharmacy which entail the levels of study within pharmaceutical sciences, the location in which the research is carried out, the choice of research designs and methods, and the theoretical foundations. Common strengths and opportunities are important to know in order to join forces. Finding common ground can be developed in two areas: participating together in multi-disciplinary research, and uniting in a dialogue with internal and external key players in putting forth what is needed for the profession of pharmacy. At the end the question is posed, “What’s in a name?” and we argue that it is important to emphasize what unifies the families of clinical pharmacy and social pharmacy for the benefit of both fields, pharmacy in general, and society at large.

  12. Social Pharmacy and Clinical Pharmacy-Joining Forces.

    Science.gov (United States)

    Almarsdottir, Anna Birna; Granas, Anne Gerd

    2015-12-22

    This commentary seeks to define the areas of social pharmacy and clinical pharmacy to uncover what they have in common and what still sets them apart. Common threats and challenges of the two areas are reviewed in order to understand the forces in play. Forces that still keep clinical and social pharmacy apart are university structures, research traditions, and the management of pharmacy services. There are key (but shrinking) differences between clinical and social pharmacy which entail the levels of study within pharmaceutical sciences, the location in which the research is carried out, the choice of research designs and methods, and the theoretical foundations. Common strengths and opportunities are important to know in order to join forces. Finding common ground can be developed in two areas: participating together in multi-disciplinary research, and uniting in a dialogue with internal and external key players in putting forth what is needed for the profession of pharmacy. At the end the question is posed, "What's in a name?" and we argue that it is important to emphasize what unifies the families of clinical pharmacy and social pharmacy for the benefit of both fields, pharmacy in general, and society at large.

  13. Predictive modeling of reactive wetting and metal joining.

    Energy Technology Data Exchange (ETDEWEB)

    van Swol, Frank B.

    2013-09-01

    The performance, reproducibility and reliability of metal joints are complex functions of the detailed history of physical processes involved in their creation. Prediction and control of these processes constitutes an intrinsically challenging multi-physics problem involving heating and melting a metal alloy and reactive wetting. Understanding this process requires coupling strong molecularscale chemistry at the interface with microscopic (diffusion) and macroscopic mass transport (flow) inside the liquid followed by subsequent cooling and solidification of the new metal mixture. The final joint displays compositional heterogeneity and its resulting microstructure largely determines the success or failure of the entire component. At present there exists no computational tool at Sandia that can predict the formation and success of a braze joint, as current capabilities lack the ability to capture surface/interface reactions and their effect on interface properties. This situation precludes us from implementing a proactive strategy to deal with joining problems. Here, we describe what is needed to arrive at a predictive modeling and simulation capability for multicomponent metals with complicated phase diagrams for melting and solidification, incorporating dissolutive and composition-dependent wetting.

  14. 46 CFR 121.702 - Pollution prevention equipment and procedures.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Pollution prevention equipment and procedures. 121.702 Section 121.702 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS... CONTROL AND MISCELLANEOUS SYSTEMS AND EQUIPMENT Miscellaneous § 121.702 Pollution prevention equipment and...

  15. 46 CFR 197.454 - First aid and treatment equipment.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false First aid and treatment equipment. 197.454 Section 197.454 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE OCCUPATIONAL SAFETY AND... Equipment § 197.454 First aid and treatment equipment. The diving supervisor shall ensure that medical kits...

  16. Efficient string similarity join in multi-core and distributed systems.

    Directory of Open Access Journals (Sweden)

    Cairong Yan

    Full Text Available In big data area a significant challenge about string similarity join is to find all similar pairs more efficiently. In this paper, we propose a parallel processing framework for efficient string similarity join. First, the input is split into some disjoint small subsets according to the joint frequency distribution and the interval distribution of strings. Then the filter-verification strategy is adopted in the computation of string similarity for each subset so that the number of candidate pairs is reduced before an effective pruning strategy is used to improve the performance. Finally, the operation of string join is executed in parallel. Para-Join algorithm based on the multi-threading technique is proposed to implement the framework in a multi-core system while Pada-Join algorithm based on Spark platform is proposed to implement the framework in a cluster system. We prove that Para-Join and Pada-Join cannot only avoid reduplicate computation but also ensure the completeness of the result. Experimental results show that Para-Join can achieve high efficiency and significantly outperform than state-of-the-art approaches, meanwhile, Pada-Join can work on large datasets.

  17. 46 CFR 184.702 - Pollution prevention equipment and procedures.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Pollution prevention equipment and procedures. 184.702 Section 184.702 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL PASSENGER VESSELS... Pollution prevention equipment and procedures. A vessel must comply with the applicable design, equipment...

  18. Microstructure and properties of ceramics and composites joined by plastic deformation.

    Energy Technology Data Exchange (ETDEWEB)

    Goretta, K. C.; Singh, D.; Chen, N.; Gutierrez-Mora, F.; Lorenzo-Martin, M. de la, Cinta; Dominguez-Rodriguez, A.; Routbort, J. L.; Energy Systems; Univ. of Seville

    2008-12-01

    A review is presented of the design of suitable materials systems for joining by high-temperature plastic deformation, details of the joining techniques, microstructures and properties of the resulting composite bodies, and prospects and limitation for this type of joining technology. Joining parameters and resulting forms are discussed for Al{sub 2}O{sub 3}/mullite particulate composites, Y{sub 2}O{sub 3}-stabilized ZrO{sub 2} particulate/Al{sub 2}O{sub 3} particulate and whisker-reinforced composites, hydroxyapatite bioceramics, La{sub 0.85}Sr{sub 0.15}MnO{sub 3} electronic ceramics, MgF{sub 2} optical ceramics, and Ni{sub 3}Al intermetallics. Results are contrasted with those obtained by other methods of joining brittle, high-temperature materials, with special focus on durability and mechanical properties.

  19. Microstructure and properties of ceramics and composites joined by plastic deformation

    Energy Technology Data Exchange (ETDEWEB)

    Goretta, K.C. [Argonne National Laboratory, Argonne, IL 60439-4838 (United States)], E-mail: ken.goretta@aoard.af.mil; Singh, D.; Chen Nan [Argonne National Laboratory, Argonne, IL 60439-4838 (United States); Gutierrez-Mora, F.; Cinta Lorenzo-Martin, M. de la [Argonne National Laboratory, Argonne, IL 60439-4838 (United States); University of Seville, Seville 41080 (Spain); Dominguez-Rodriguez, A. [University of Seville, Seville 41080 (Spain); Routbort, J.L. [Argonne National Laboratory, Argonne, IL 60439-4838 (United States)

    2008-12-20

    A review is presented of the design of suitable materials systems for joining by high-temperature plastic deformation, details of the joining techniques, microstructures and properties of the resulting composite bodies, and prospects and limitation for this type of joining technology. Joining parameters and resulting forms are discussed for Al{sub 2}O{sub 3}/mullite particulate composites, Y{sub 2}O{sub 3}-stabilized ZrO{sub 2} particulate/Al{sub 2}O{sub 3} particulate and whisker-reinforced composites, hydroxyapatite bioceramics, La{sub 0.85}Sr{sub 0.15}MnO{sub 3} electronic ceramics, MgF{sub 2} optical ceramics, and Ni{sub 3}Al intermetallics. Results are contrasted with those obtained by other methods of joining brittle, high-temperature materials, with special focus on durability and mechanical properties.

  20. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Science.gov (United States)

    2010-07-01

    ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of... applicable): (i) “THIS ENGINE HAS AN EXEMPTION FOR NATIONAL SECURITY UNDER 40 CFR 1068.225.” (ii) “THIS...

  1. News Release: USDA Joins Fair Food Network, State and Local Partners to

    Science.gov (United States)

    vitamin C, calcium, and iron. The Food Bank of Eastern Michigan in Flint is distributing those USDA Foods Joins Fair Food Network, State and Local Partners to Promote Nutrition Resources for Lead-Affected Flint Residents News Release: USDA Joins Fair Food Network, State and Local Partners to Promote Nutrition

  2. On a possible empirical meaning of meets and joins for quantum propositions

    Science.gov (United States)

    Herbut, Fedor

    1984-09-01

    Following up an idea of Jauch, an empirical basis is worked out for the meets (and joins) of quantum propositions through approximate measurement to an arbitrary degree of accuracy of special yes-no effects constructed from chains of yes-no measurements. This is done with a view to interpreting the meets (and joins) as Dedekind's cuts in analogy with irrationals.

  3. On a possible empirical meaning of meets and joins for quantum propositions

    International Nuclear Information System (INIS)

    Herbut, F.

    1984-01-01

    Following up an idea of Jauch, an empirical basis is worked out for the meets (and joins) of quantum propositions through approximate measurement to an arbitrary degree of accuracy of special yes-no effects constructed from chains of yes-no measurements. This is done with a view to interpreting the meets (and joins) as Dedekind's cuts in analogy with irrationals. (orig.)

  4. Numerical modelling in friction lap joining of aluminium alloy and carbon-fiber-reinforced-plastic sheets

    Science.gov (United States)

    Das, A.; Bang, H. S.; Bang, H. S.

    2018-05-01

    Multi-material combinations of aluminium alloy and carbon-fiber-reinforced-plastics (CFRP) have gained attention in automotive and aerospace industries to enhance fuel efficiency and strength-to-weight ratio of components. Various limitations of laser beam welding, adhesive bonding and mechanical fasteners make these processes inefficient to join metal and CFRP sheets. Friction lap joining is an alternative choice for the same. Comprehensive studies in friction lap joining of aluminium to CFRP sheets are essential and scare in the literature. The present work reports a combined theoretical and experimental study in joining of AA5052 and CFRP sheets using friction lap joining process. A three-dimensional finite element based heat transfer model is developed to compute the temperature fields and thermal cycles. The computed results are validated extensively with the corresponding experimentally measured results.

  5. Long-term security of electrical and control engineering equipment in nuclear power stations to withstand a loss of coolant accident

    International Nuclear Information System (INIS)

    Mueller, H.

    1996-01-01

    Electrical and control engineering equipment, which has to function even after many years of operation in the event of a fault in a saturated steam atmosphere of 160 C maximum, is essential in nuclear power stations in order to control a loss of coolant accident. The nuclear power station operators have, for this purpose, developed verification strategies for groups of components, by means of which it is ensured that the electrical and control engineering components are capable of dealing with a loss of coolant accident even at the end of their planned operating life. (orig.) [de

  6. Joining of aluminum sheet and glass fiber reinforced polymer using extruded pins

    Science.gov (United States)

    Conte, Romina; Buhl, Johannes; Ambrogio, Giuseppina; Bambach, Markus

    2018-05-01

    The present contribution proposes a new approach for joining sheet metal and fiber reinforced composites. The joining process draws upon a Friction Stir Forming (FSF) process, which is performed on the metal sheet to produce slender pins. These pins are used to pierce through the composite. Joining is complete by forming a locking head out of the part if the pin sticks out of the composite. Pins of different diameters and lengths were produced from EN AW-1050 material, which were joined to glass fiber reinforced polyamide-6. The strength of the joint has been experimentally tested in order to understand the effect of the process temperature on the pins strength and therefore on the joining. The results demonstrate the feasibility of this new technique, which uses no excess material.

  7. Joining by plastic deformation

    DEFF Research Database (Denmark)

    Mori, Ken-ichiro; Bay, Niels; Fratini, Livan

    2013-01-01

    As the scale and complexity of products such as aircraft and cars increase, demand for new functional processes to join mechanical parts grows. The use of plastic deformation for joining parts potentially offers improved accuracy, reliability and environmental safety as well as creating opportuni......As the scale and complexity of products such as aircraft and cars increase, demand for new functional processes to join mechanical parts grows. The use of plastic deformation for joining parts potentially offers improved accuracy, reliability and environmental safety as well as creating...

  8. Food Service Equipment and Appurtenances.

    Science.gov (United States)

    National Sanitation Foundation, Ann Arbor, MI.

    Equipment design specifications are presented relating to tables of all kinds, counters, sinks and drainboards, bins, shelves, drawers, hoods and similar kitchen appurtenances, not including baking, roasting, toasting, broiling or frying equipment, food preparation machinery such as slicers, choppers, and cutters, mixers and grinders, steam…

  9. Performance Comparison of the Optimized Inverted Joined Wing Airplane Concept and Classical Configuration Airplanes

    OpenAIRE

    Sieradzki Adam; Dziubiński Adam; Galiński Cezary

    2016-01-01

    The joined wing concept is an unconventional airplane configuration, known since the mid-twenties of the last century. It has several possible advantages, like reduction of the induced drag and weight due to the closed wing concept. The inverted joined wing variant is its rarely considered version, with the front wing being situated above the aft wing. The following paper presents a performance prediction of the recently optimized configuration of this airplane. Flight characteristics obtaine...

  10. Study of international published experiences in joining copper and copper-alloys

    International Nuclear Information System (INIS)

    Dahlgren, Aa.

    1997-04-01

    This study has revealed a number of joining processes to be used when manufacturing copper-canisters for the final storage of high level nuclear waste. However, the decision on which material and which joining process to be used has to be based on the design criterions. The welding procedure has to be qualified, i.e. it shall be demonstrated whether the procedure is capable of fulfilling specified requirements. 32 refs

  11. What happens during a Join? - Dissecting CPU and Memory Optimization Effects

    OpenAIRE

    Manegold, Stefan; Boncz, Peter; Kersten, Martin

    2000-01-01

    textabstractPerformance of modern hardware increasingly depends on proper utilization of both the memory cache hierarchy and parallel execution possibilities in todays super-scalar CPUs. Recent database research has demonstrated that database system performance severely suffers from poor utilization of these resources. In previous work, we presented join algorithms that strongly accelerate large equi-join by tuning the memory access pattern to match the characteristics of the memory cache sub...

  12. 46 CFR 169.677 - Equipment protection and enclosure.

    Science.gov (United States)

    2010-10-01

    ... Vessels of Less Than 100 Gross Tons § 169.677 Equipment protection and enclosure. (a) Except as provided... 46 Shipping 7 2010-10-01 2010-10-01 false Equipment protection and enclosure. 169.677 Section 169.677 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL...

  13. Effect of Ti and Si interlayer materials on the joining of SiC ceramics

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Yang Il; Park, Jung Hwan; Kim, Hyun Gil; Park, Dong Jun; Park, Jeong Yong; Kim, Weon Ju [LWR Fuel Technology Division, Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-08-15

    SiC-based ceramic composites are currently being considered for use in fuel cladding tubes in light-water reactors. The joining of SiC ceramics in a hermetic seal is required for the development of ceramic-based fuel cladding tubes. In this study, SiC monoliths were diffusion bonded using a Ti foil interlayer and additional Si powder. In the joining process, a very low uniaxial pressure of ∼0.1 MPa was applied, so the process is applicable for joining thin-walled long tubes. The joining strength depended strongly on the type of SiC material. Reaction-bonded SiC (RB-SiC) showed a higher joining strength than sintered SiC because the diffusion reaction of Si was promoted in the former. The joining strength of sintered SiC was increased by the addition of Si at the Ti interlayer to play the role of the free Si in RB-SiC. The maximum joint strength obtained under torsional stress was ∼100 MPa. The joint interface consisted of TiSi{sub 2}, Ti{sub 3}SiC{sub 2}, and SiC phases formed by a diffusion reaction of Ti and Si.

  14. Under Lock and Key: Preventing Campus Theft of Electronic Equipment.

    Science.gov (United States)

    Harrison, J. Phil

    1996-01-01

    A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…

  15. Comparative analysis of the practice of China and Russia joining the WTO

    Directory of Open Access Journals (Sweden)

    Anastasia Sergeyevna Loginova

    2015-09-01

    Full Text Available Objective to examine the positive and negative experience of China39s joining the World Trade Organization WTO that joined it on terms similar to the Russian ones for the best understanding of the advantages and disadvantages of joining and building the appropriate policy. Methods the objective of the work has been achieved through the application of both general and specific scientific methods. In particular the analysis and synthesis allowed to study the social and economic context of the state in the framework of joining the WTO the consequences of such membership and to identify the key areas for improvement of this step for Russia. Statistical techniques were used in the process of gathering information about the key economic indicators. The fundamental method was comparativelegal which made it possible to draw parallels in joining the WTO by various states. Results basing on the measures taken by China both before and after joining the WTO as well as evaluation of their implication the conclusion was made about its successful experience. The actions before joining were very effective. In particular they are applicable to the fields of agriculture automotive industry investment policy etc. The measures of nonaddress subsidizing maintaining the socioeconomic stability in the country the export orientation of the economy along with functioning of special economic zones with joint ventures are in the authors39 opinion constructive actions for Russiarsquos adaptation to the WTO. Scientific novelty for the first time the thesis is put forward about the similarity of the Russia and China conditions when joining the WTO. The analysis is made of the complex measures preceding and following the joining. The necessity is grounded of reflecting the China39s positive and negative experiences in the Russian policy. Practical significance the main provisions and conclusions can be used in the research activity in addressing the issues of Russiarsquos

  16. Joining of thin thickness SiCf/SiC composites: research of a joining composition and of an associated elaboration process

    International Nuclear Information System (INIS)

    Jacques, E.

    2012-01-01

    The present work is part of the Fourth Generation Fast Reactors program. One of the key issues is the joining of the SiC f /SiC ceramic matrix composites (CMC) to seal the combustible cladding. At the present time, no chemical composition as a joint is refractive enough to face the expected operating temperatures. The aims of this study are the following: (1) the identification of a joining composition and its associated elaboration process answering the specifications, (2) the validation of a local and fast heating process and (3) the definition of mechanical tests to characterise these joinings. We describe the methodology and the results for joining SiC and SiC f /SiC substrates at solid and liquid state using metallic silicides. Joint integrity and joint strength can be improved by adding small SiC particles to the silicides powders. Chemical reactivity, wettability tests and thermomechanical properties analysis have been carried out on the joints. Cross sections of the assembly were prepared to study the joint/substrate chemical bonding, the cracking and the crack deflection in the vicinity of the interface. Also, one of the challenge consists in using a local heating at a high temperature (around 1800 C) for a short time to avoid the degradation of the composite structure. The assemblies have been then performed in an inductive furnace but in order to prepare the joining technology, trials of local heating have also been investigated with a CO 2 laser beam and a microwave generator. Finally, descriptions of the 4-points bending mechanical test used and the associated results are presented. (author) [fr

  17. TRANSPORT AND EMPLACEMENT EQUIPMENT DESCRIPTIONS

    International Nuclear Information System (INIS)

    1997-01-01

    The objective and the scope of this document are to list and briefly describe the major mobile equipment necessary for waste package (WP) Transport and Emplacement in the proposed subsurface nuclear waste repository at Yucca Mountain. Primary performance characteristics and some specialized design features of the equipment are explained and summarized in the individual subsections of this document. The Transport and Emplacement equipment described in this document consists of the following: (1) WP Transporter; (2) Reusable Rail Car; (3) Emplacement Gantry; (4) Gantry Carrier; and (5) Transport Locomotive

  18. Containment and Surveillance Equipment Compendium

    International Nuclear Information System (INIS)

    Luetters, F.O.

    1980-02-01

    The Containment and Surveillance Equipment Compendium contains information sections describing the application and status of seals, optical surveillance systems, and monitors for international safeguards systems. The Compendium is a collection of information on equipment in use (generally by the IAEA) or under development in the US in diverse programs being conducted at numerous facilities under different sponsors. The Compendium establishes a baseline for the status and applications of C/S equipment and is a tool to assist in the planning of future C/S hardware development activities. The Appendix contains design concepts which can be developed to meet future goals

  19. Safety, security and safeguard

    International Nuclear Information System (INIS)

    Zakariya, Nasiru Imam; Kahn, M.T.E.

    2015-01-01

    Highlights: • The 3S interface in the design of PPS is hereby proposed. • The 3S synergy enhances the reduction in vulnerability and terrorism. • Highlighted were concept of detection, delay and response. - Abstract: A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion – based on the use of sensors, signal lines and alarm systems – is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks

  20. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  1. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  2. Synthesis of securement device options and strategies

    Science.gov (United States)

    2002-03-01

    The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...

  3. The Firewall and Security of Information Systems

    OpenAIRE

    Radut Carmen; Albici Mihaela; Tenovici Cristina Otilia

    2010-01-01

    Information security is a broader concept which refers to ensuring the integrity, confidentiality and availability of information. The dynamics of information technology to induce new risks to which organizations must implement new measures of control. Technological development has been accompanied by security solutions, equipment manufacturers and applications including technical methods of protection performance. However, while in information technology change is exponential, the human comp...

  4. Joining uranium to steel

    International Nuclear Information System (INIS)

    Perkins, M.A.

    1976-05-01

    A method has been devised which will allow the joining of uranium to steel by fusion welding through the use of an intermediate material. Uranium-0.5 titanium was joined to AISI 304L stainless steel by using a vanadium insert. Also, a method is now available for selecting possible filler metals when two entirely dissimilar metals need to be joined. This method allows a quantitative ranking to be made of the possible filler metals and thus the most likely candidate can be selected

  5. Development of manufacturing equipment and QC equipment for DUPIC fuel

    International Nuclear Information System (INIS)

    Yang, Myung Seung; Park, J.J.; Lee, J.W.; Kim, S.S.; Yim, S.P.; Kim, J.H.; Kim, K.H.; Na, S.H.; Kim, W.K.; Shin, J.M.; Lee, D.Y.; Cho, K.H.; Lee, Y.S.; Sohn, J.S.; Kim, M.J.

    1999-05-01

    In this study, DUPIC powder and pellet fabrication equipment, welding system, QC equipment, and fission gas treatment are developed to fabricate DUPIC fuel at IMEF M6 hot cell. The systems are improved to be suitable for remote operation and maintenance with the manipulator at hot cell. Powder and pellet fabrication equipment have been recently developed. The systems are under performance test to check remote operation and maintenance. Welding chamber and jigs are designed and developed to remotely weld DUPIC fuel rod with manipulators at hot cell. Remote quality control equipment are being tested for analysis and inspection of DUPIC fuel characteristics at hot cell. And trapping characteristics is analyzed for cesium and ruthenium released under oxidation/reduction and sintering processes. The design criteria and process flow diagram of fission gas treatment system are prepared incorporating the experimental results. The fission gas treatment system has been successfully manufactured. (Author). 33 refs., 14 tabs., 91 figs

  6. Test and Analysis of Metallurgical Converter Equipment

    Directory of Open Access Journals (Sweden)

    Shan Pang

    2013-05-01

    Full Text Available Oxygen top-blow converter is the main equipment in steel making, and its work reliability decides the security and economy of steel production. Therefore, how to design and test analysis of convertor has been an important subject of industry research. Geometric modelling and structure analysis of converter tilting device by using Pro/E program .The design Principle, basic design structure were analyzed in detail. The computer simulation software of metallurgical converter equipment and how to use it were introduced .It developed by VC++ software. The position of barycentre and moment curve in No.3 and No.4 are calculated. The converter acceleration down dip can be resolved by comparing the moment curve and center curve.

  7. References and arrow notation instead of join operation in query languages

    Directory of Open Access Journals (Sweden)

    Alexandr Savinov

    2012-10-01

    Full Text Available We study properties of the join operation in query languages and describe some of its major drawbacks. We provide strong arguments against using joins as a main construct for retrieving related data elements in general purpose query languages and argue for using references instead. Since conventional references are quite restrictive when applied to data modeling and query languages, we propose to use generalized references as they are defined in the concept-oriented model (COM. These references are used by two new operations, called projection and de-projection, which are denoted by right and left arrows and therefore this access method is referred to as arrow notation. We demonstrate advantages of the arrow notation in comparison to joins and argue that it makes queries simpler, more natural, easier to understand, and the whole query writing process more productive and less error-prone.

  8. Education and training for security personnel

    International Nuclear Information System (INIS)

    Chida, Toshiya

    2015-01-01

    It is said that Physical Protection (PP) has two purposes. One is to prevent from occurring risks of threat and terrorism and the other is to minimize damages which will be happened in case of unusual conditions or emergency situation. To achieve this goal, personnel who perform their duties should have professional knowledge and skills concerning security. However, since newcomers rarely satisfy their knowledge and skill for nuclear security in most cases. Therefore, we have to provide adequate education and training after they joined to our company. To this end, our company, located in Aomori Prefecture focused on security and physical protection for nuclear related facilities. In this paper, personnel training and challenges in order to bring up security personnel at our company will be introduced. (author)

  9. Influence of Hub Parameters on Joining Forces and Torque Transmission Output of Plastically-Joined Shaft-Hub-Connections with a Knurled Contact Surface

    Directory of Open Access Journals (Sweden)

    Lukáš Suchý

    2018-04-01

    Full Text Available A knurled interference fit is a machine part connection made by a plastic joining, which includes the advantages of commonly-used shaft-hub-connections. The combination of the friction and form fit, which are responsible for torque transmission, results in a higher power density than conventional connections. In this paper, parameter gaps are bridged with the aim of enhance the design calculation of the knurled interference fit. Experimental investigations on the shaft chamfer angle (100Cr6 and hub-diameter-ratio (AlSi1MgMn were performed. The analytical approaches are developed for calculating the joining force and maximal torque capacity by accounting for experimentally investigated loss of load transmission at high hub-diameter-ratios and high shaft chamfer angles. The presented calculation approach is an accurate tool for the assessment of early machine designs of the knurled interference fit and helps to save from having to perform time-extensive tests.

  10. Excavating and loading equipment for peat mining

    Science.gov (United States)

    Mikhailov, A. V.; Zhigulskaya, A. I.; Yakonovskaya, T. B.

    2017-10-01

    Recently, the issues of sustainable development of Russian regions, related to ensuring energy security, are more urgent than ever. To achieve sustainable development, an integrated approach to the use of local natural resources is needed. Practically in all north regions of the Russian Federation, peat as a local natural resource is widespread, which has a practical application in the area of housing services. The paper presents the evaluation of technologies for open-pit peat mining, as well as analysis of technological equipment for peat production. Special attention is paid to a question of peat materials excavating and loading. The problem of equipment selection in a peat surface mine is complex. Many features, restrictions and criteria need to be considered. Use of low and ultra-low ground pressure excavators and low ground pressure front-end loaders with full-range tires to provide the necessary floatation in the peat bog environment is offered.

  11. Using Negotiated Joining to Construct and Fill Open-ended Roles in Elite Culinary Groups.

    Science.gov (United States)

    Tan, Vaughn

    2015-03-01

    This qualitative study examines membership processes in groups operating in an uncertain environment that prevents them from fully predefining new members' roles. I describe how nine elite high-end, cutting-edge culinary groups in the U.S. and Europe, ranging from innovative restaurants to culinary R&D groups, use negotiated joining-a previously undocumented process-to systematically construct and fill these emergent, open-ended roles. I show that negotiated joining is a consistently patterned, iterative process that begins with a role that both aspirant and target group explicitly understand to be provisional. This provisional role is then jointly modified and constructed by the aspirant and target group through repeated iterations of proposition, validation through trial and evaluation, and selective integration of validated role components. The initially provisional role stabilizes and the aspirant achieves membership if enough role components are validated; otherwise the negotiated joining process is abandoned. Negotiated joining allows the aspirant and target group to learn if a mutually desirable role is likely and, if so, to construct such a role. In addition, the provisional roles in negotiated joining can support absorptive capacity by allowing novel role components to enter target groups through aspirants' efforts to construct stable roles for themselves, while the internal adjustment involved in integrating newly validated role components can have the unintended side effect of supporting adaptation by providing opportunities for the groups to use these novel role components to modify their role structure and goals to suit a changing and uncertain environment. Negotiated joining thus reveals role ambiguity's hitherto unexamined beneficial consequences and provides a foundation for a contingency theory of new-member acquisition.

  12. Calculation of force and time of contact formation at diffusion metal joining

    Energy Technology Data Exchange (ETDEWEB)

    Sukhanov, V E [Tsentral' nyj Nauchno-Issledovatel' skij Inst. Chernoj Metallurgii, Moscow (USSR); Grushevskij, A V [Moskovskij Stankoinstrumental' nyj Inst., Moscow (USSR); Surovtsev, A P

    1989-03-01

    An analytical model of contact for mation at diffusion joining is suggested. It is based on the introduction of a rough surface with roughnesses in the form of absolutely rigid spherical segnunts into a smooth laminar body. Mathematical expressions, permitting to calculate maximum welding force (pressure) providing close contact of the surfaces welded and time for contact formation between rough surfaces joined, are obtained. Divergence of calculational and experimental data does not exceed 20%. It is confirmed that the most intensive formation of joining occurs in the initial period of welding -the stage of formation of a physical contact, when deformation processes proceed in tensively. Finite formation of a strength joint occurs at the stage of diffusion interaction.

  13. Performance of electro-plated and joined components for divertor application

    International Nuclear Information System (INIS)

    Krauss, Wolfgang; Lorenz, Julia; Konys, Jürgen

    2013-01-01

    Highlights: • Active interlayers of Ni and Pd were electroplated on W to assist joining. • Demonstrator types of W-steel and W–W joints were successfully fabricated. • Diffusion processes increase operation temperature above brazing temperature. • Ni electro-plating is less sensitive to variation of deposition parameters than Pd. • Shear tests showed values in resistance comparable to those of commercial fillers. -- Abstract: A general challenge in divertor development, independently of design type and cooling medium water or helium, is the reliable and adapted joining of components. Depending on the design variants, the characteristics of the joints will be focused on functional or structural behavior to guarantee e.g. good thermal conductivity and sufficient mechanical strength. All variants will have in common that tungsten is the plasma facing material. Thus, material combinations to be joined will range from Cu base over steel to tungsten. Especially tungsten shows lacks in adapted joining due to its metallurgical behavior ranging from immiscibility over bad wetting up to brittle intermetallic phase formation. Joining assisted by electro-chemical deposition of functional and filler layers showed that encouraging progress was achieved in wetting applying nickel interlayers. Nickel proved to be a good reference material but alternative elements (e.g. Pd, Fe) may be more attractive in fusion to manufacture suitable joints. Replacing of Ni as activator element by Pd for W/W or W/steel joints was achieved and joining with Cu-filler was successfully performed. Manufactured joints were characterized applying metallurgical testing and SEM/EDX analyses demonstrating the applicability of Pd activator. First shear tests showed that the joints exhibit mechanical stability sufficient for technical application

  14. Distinct DNA repair pathways involving RecA and nonhomologous end joining in Mycobacterium smegmatis.

    OpenAIRE

    Korycka-Machala, M; Brzostek, A; Rozalska, S; Rumijowska-Galewicz, A; Dziedzic, R; Bowater, R; Dziadek, J

    2006-01-01

    Mycobacterium smegmatis was used to study the relationship between DNA repair processes involving RecA and nonhomologous end joining (NHEJ). The effect of gene deletions in recA and/or in two genes involved in NHEJ (ku and ligD) was tested on the ability of bacteria to join breaks in plasmids transformed into them and in their response to chemicals that damage DNA. The results provide in vivo evidence that only NHEJ is required for the repair of noncompatible DNA ends. By contrast, the respon...

  15. Distinct DNA repair pathways involving RecA and nonhomologous end joining in Mycobacterium smegmatis.

    Science.gov (United States)

    Korycka-Machala, Malgorzata; Brzostek, Anna; Rozalska, Sylwia; Rumijowska-Galewicz, Anna; Dziedzic, Renata; Bowater, Richard; Dziadek, Jaroslaw

    2006-05-01

    Mycobacterium smegmatis was used to study the relationship between DNA repair processes involving RecA and nonhomologous end joining (NHEJ). The effect of gene deletions in recA and/or in two genes involved in NHEJ (ku and ligD) was tested on the ability of bacteria to join breaks in plasmids transformed into them and in their response to chemicals that damage DNA. The results provide in vivo evidence that only NHEJ is required for the repair of noncompatible DNA ends. By contrast, the response of mycobacteria to mitomycin C preferentially involved a RecA-dependent pathway.

  16. [Joining WHO of Republic of Korea and the projects in the 1950s].

    Science.gov (United States)

    Lee, Sun Ho

    2014-04-01

    The Republic of Korea(ROK) and the World Health Organization(WHO) have done many projects successfully from 1949, in which the government of First Republic joined the WHO. However the relation between the ROK and the WHO have not been studied very much so far. The main purpose of this research, which could be done by the support of WHO, is connected with three questions. First research point would be "how could the ROK joined WHO in 1949 and what's the meaning of it? And the what's the difference in the process for the WHO between the ROK of 1949 and the DPRK(Democratic People's Republic of Korea) of 1973?" The first president of the ROK, Rhee Syngman, who had received his Ph. D.(about international politics) from Princeton University in 1910, was strongly interested in joining international institutes like UN, WHO. The ROK that could join WHO on 17 August 1949, with the approval of Assembly on 25 May 1949, was one of the founder members of the Western Pacific Region. By joining WHO, the ROK could get chance to increase the level of public health and its administration in 1950's. But the DPRK manage to became a member of WHO on 19 May 1973 and joined the South-East Asia Region. The joining of DPRK was influenced by the easing of the cold war after the Nixon Doctrine and the joining of the China(People's Republic of China). Second research point would be "What kind of roll did the WHO take in the First Republic?" Yet the public health administration of the First Republic that had been made in the period of US army military government was been strongly influenced by USA, the roll of WHO was also important in the 1950's. Last research point would be "What kind of the projects did the ROK and the WHO take part in during the period of he First Republic? How could evaluate the results?" The ROK and the WHO handled the projects including health services, communicable disease prevention and control, control of noncommunicable diseases, and protection of health. Specially

  17. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  18. Thermally joining and/or coating or thermally separating the workpieces having heat-sensitive coating, comprises restoring coating by thermally coating the coating material after thermally joining and/or coating or thermally separating

    OpenAIRE

    Riedel, Frank; Winkelmann, Ralf; Puschmann, Markus

    2011-01-01

    The method for thermally joining and/or coating or thermally separating the workpieces (1), which have a heat-sensitive coating (2), comprises restoring the coating by thermally coating a coating material (3) after thermally joining and/or coating or thermally separating the workpieces. A part of the thermal energy introduced in the workpiece for joining and/or coating or separating or in the workpieces is used for thermally coating the coating material. Two workpieces are welded or soldered ...

  19. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  20. Mechanical (turbines and auxiliary equipment)

    CERN Document Server

    Sherry, A; Cruddace, AE

    2013-01-01

    Modern Power Station Practice, Volume 3: Mechanical (Turbines and Auxiliary Equipment) focuses on the development of turbines and auxiliary equipment used in power stations in Great Britain. Topics covered include thermodynamics and steam turbine theory; turbine auxiliary systems such as lubrication systems, feed water heating systems, and the condenser and cooling water plants. Miscellaneous station services, and pipework in power plants are also described. This book is comprised of five chapters and begins with an overview of thermodynamics and steam turbine theory, paying particular attenti

  1. Large equipment and facilities

    International Nuclear Information System (INIS)

    Louttit, R.; Love, W.; Lindenbaum, S.J.

    1975-01-01

    Component and design criteria are reviewed for a general purpose modular multiparticle spectrometer system. The study of hadronic interactions is emphasized, although the solenoidal magnet vertex detector system can be used for W bosons and other weak interaction processes. A general purpose spectrometer seems compatible with the requirements of the ISABELLE straight sections. (auth)

  2. Waste Electrical and Electronic Equipment

    DEFF Research Database (Denmark)

    Bigum, Marianne Kristine Kjærgaard; Christensen, Thomas Højlund

    2011-01-01

    Waste electrical and electronic equipment (WEEE) is one of the fastest growing special waste types with an estimated growth of 3–5% per year (Cui and Forssberg, 2003). WEEE is a very heterogeneous waste type that contains many compounds that are considered to be harmful to both humans and the env......Waste electrical and electronic equipment (WEEE) is one of the fastest growing special waste types with an estimated growth of 3–5% per year (Cui and Forssberg, 2003). WEEE is a very heterogeneous waste type that contains many compounds that are considered to be harmful to both humans...

  3. Joining and fabrication techniques for high temperature structures including the first wall in fusion reactor

    International Nuclear Information System (INIS)

    Lee, Ho Jin; Lee, B. S.; Kim, K. B.

    2003-09-01

    The materials for PFC's (Plasma Facing Components) in a fusion reactor are severely irradiated with fusion products in facing the high temperature plasma during the operation. The refractory materials can be maintained their excellent properties in severe operating condition by lowering surface temperature by bonding them to the high thermal conducting materials of heat sink. Hence, the joining and bonding techniques between dissimilar materials is considered to be important in case of the fusion reactor or nuclear reactor which is operated at high temperature. The first wall in the fusion reactor is heated to approximately 1000 .deg. C and irradiated severely by the plasma. In ITER, beryllium is expected as the primary armour candidate for the PFC's; other candidates including W, Mo, SiC, B4C, C/C and Si 3 N 4 . Since the heat affected zones in the PFC's processed by conventional welding are reported to have embrittlement and degradation in the sever operation condition, both brazing and diffusion bonding are being considered as prime candidates for the joining technique. In this report, both the materials including ceramics and the fabrication techniques including joining technique between dissimilar materials for PFC's are described. The described joining technique between the refractory materials and the dissimilar materials may be applicable for the fusion reactor and Generation-4 future nuclear reactor which are operated at high temperature and high irradiation

  4. Joining and fabrication techniques for high temperature structures including the first wall in fusion reactor

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Ho Jin; Lee, B. S.; Kim, K. B

    2003-09-01

    The materials for PFC's (Plasma Facing Components) in a fusion reactor are severely irradiated with fusion products in facing the high temperature plasma during the operation. The refractory materials can be maintained their excellent properties in severe operating condition by lowering surface temperature by bonding them to the high thermal conducting materials of heat sink. Hence, the joining and bonding techniques between dissimilar materials is considered to be important in case of the fusion reactor or nuclear reactor which is operated at high temperature. The first wall in the fusion reactor is heated to approximately 1000 .deg. C and irradiated severely by the plasma. In ITER, beryllium is expected as the primary armour candidate for the PFC's; other candidates including W, Mo, SiC, B4C, C/C and Si{sub 3}N{sub 4}. Since the heat affected zones in the PFC's processed by conventional welding are reported to have embrittlement and degradation in the sever operation condition, both brazing and diffusion bonding are being considered as prime candidates for the joining technique. In this report, both the materials including ceramics and the fabrication techniques including joining technique between dissimilar materials for PFC's are described. The described joining technique between the refractory materials and the dissimilar materials may be applicable for the fusion reactor and Generation-4 future nuclear reactor which are operated at high temperature and high irradiation.

  5. Increasing FSW join strength by optimizing feed rate, rotating speed and pin angle

    Science.gov (United States)

    Darmadi, Djarot B.; Purnowidodo, Anindito; Siswanto, Eko

    2017-10-01

    Principally the join in Friction Stir Welding (FSW) is formed due to mechanical bonding. At least there are two factors determines the quality of this join, first is the temperature in the area around the interface and secondly the intense of mixing forces in nugget zone to create the mechanical bonding. The adequate temperature creates good flowability of the nugget zone and an intensive mixing force produces homogeneous strong bonding. Based on those two factors in this research the effects of feed rate, rotating speed and pin angle of the FSW process to the tensile strength of resulted join are studied. The true experimental method was used. Feed rate was varied at 24, 42, 55 and 74 mm/minutes and from the experimental results, it can be concluded that the higher feed rate decreases the tensile strength of weld join and it is believed due to the lower heat embedded in the material. Inversely, the higher rotating speed increases the join’s tensile strength as a result of higher heat embedded in base metal and higher mixing force in the nugget zone. The rotating speed were 1842, 2257 and 2904 RPMs. The pin angle determines the direction of mixing force. With variation of pin angle: 0°, 4°, 8° and 12° the higher pin angle generally increases the tensile strength because of more intensive mixing force. For 12° pin angle the lower tensile strength is found since the force tends to push out the nugget area from the joint gap.

  6. Enumeration for spanning trees and forests of join graphs based on the combinatorial decomposition

    Directory of Open Access Journals (Sweden)

    Sung Sik U

    2016-10-01

    Full Text Available This paper discusses the enumeration for rooted spanning trees and forests of the labelled join graphs $K_m+H_n$ and $K_m+K_{n,p}$, where $H_n$ is a graph with $n$ isolated vertices. 

  7. Hydraulic turbines and auxiliary equipment

    Energy Technology Data Exchange (ETDEWEB)

    Luo Gaorong [Organization of the United Nations, Beijing (China). International Centre of Small Hydroelectric Power Plants

    1995-07-01

    This document presents a general overview on hydraulic turbines and auxiliary equipment, emphasizing the turbine classification, in accordance with the different types of turbines, standard turbine series in China, turbine selection based on the basic data required for the preliminary design, general hill model curves, chart of turbine series and the arrangement of application for hydraulic turbines, hydraulic turbine testing, and speed regulating device.

  8. Simulation and analysis of microwave heating while joining bulk ...

    African Journals Online (AJOL)

    ATHARVA

    Processing of bulk metallic materials using microwave energy is challenging. ... The distributed power and heat source were computed in a stationary, .... the heat transfer equation is used in order to get the temperature distributions and other system properties. ... equation (2) to obtain the distribution of the E and H fields.

  9. Shanghai and Hong Kong Join Efforts for Oil Futures Exchanges

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    @@ Shanghai Futures Exchange (SHFE) and Hong Kong Exchanges and Clearing Limited (HKEx) announced in midApril they will jointly introduce crude oil futures. The two exchanges will jointly develop an energy derivatives market that serves both Chinese and international investors,according to a memorandum of understanding (MOU) signed between the two exchanges.

  10. Talking REDD+: Beyond forestry - joining up and moving forward

    Energy Technology Data Exchange (ETDEWEB)

    Nhantumbo, Isilda; Rolington, Leianne

    2011-12-15

    On Sunday 27 November 2011, the eve of the 17th conference of the parties to the UNFCCC (COP17), the International Institute for Environment and Development, together with its partners, hosted a South-South learning event, 'REDD+, poverty reduction and sustainable development: are there cost-effective and pro-poor options?' This was a platform to share information about the practices that already work, to discuss how REDD+ can build on and scale up cost-effective options that deal with the fundamental problem of climate change. Deforestation and degradation of forests requires concerted interventions across national and regional borders. Learning from each other's experience in dealing with the underlying problems and understanding how to adapt them to a different local context is critical – and will help to both ensure its success and to lower transaction costs. This briefing gives an overview of the key REDD+ issues, in particular: integrating mitigation and adaptation actions; addressing tenure; learning from participatory forest management and payment for ecosystems services; taking the right approach to gender; developing safeguards to minimize negative impacts of REDD+; and strengthening South-South collaboration to reduce the transaction costs of REDD+.

  11. OF ALIENATION, ASSOCIATION, AND ADVENTURE: WHY GERMAN FIGHTERS JOIN ISIL

    Directory of Open Access Journals (Sweden)

    Dorle Hellmuth

    2016-03-01

    Full Text Available This article provides an analysis of German foreign fighters who have left for Syria and Iraq since early 2012 and make up the second largest contingent among Western foreign fighters. It draws on statistical information about German foreign fighters, but also uses case studies in an attempt to shed more detailed light on their motivations and why they became radicalized. Drawing on recently released government data, trial documents, and media reports, the article seeks to contribute to new research on the prevailing mechanisms of Jihadi radicalization. To facilitate this kind of comprehensive analysis, McCauley and Moskalenko’s Friction framework is applied to fourteen prominent German fighters, including Denis Cuspert (who served as medium-level ISIL propaganda official, Philip Bergner and Robert Baum (responsible for ISIL suicide attacks in Iraq and Syria, Kreshnik B. and Harun Pashtoon (among the first returning fighters convicted of ISIL membership and other terrorist activities. The article concludes with a discussion of countermeasures used to prevent foreign fighters from leaving Germany, deradicalize those who have started to embrace violent ideas and/or actions, and deal with returning foreign fighters.

  12. Aria Sardinia: the on line community joining tradition and innovatiom

    Directory of Open Access Journals (Sweden)

    Fabrizio Lao

    2005-12-01

    Full Text Available The "ARIA Sardinia" project (Network Actions for Italians Abroad has been especially designed to integrate and give value to the network of relationships between public administrations, local socio-economic stakeholders and Italian communities abroad, this goal to be pursued with the support of new technologies and learning approaches emerging within the context of on line interest communities. The general objective of the project is the development of competencies and knowledge, intended to combine specific technical skills with local "territorial knowledge", in a process where the strengthening and the dissemination of these forms of culture come from the prompt use of innovative tools. The main activities of the project are the actions intended to guide and assist entrepreneurs, associations, development projects' partners or promoters in the path of acquisition and dissemination of the competencies which are necessary to the involvement of Italians abroad into the internationalization process of Sardinian economy. ARIA Sardinia was funded by the Italian Foreign Affairs Ministry and the European Social Fund (FSE, within the framework of the National Operational Program for Technical Assistance and System Action (PON ATAS aimed at specific promotion initiatives and fostering of permanent links between Southern Italy economy and Italians living abroad. Keywords: on line community, networking, Italians abroad, Sardinian economy, Sardinia, culture.

  13. Mexico joins the venture: Joint Implementation and Greenhouse Gas Emissions

    Energy Technology Data Exchange (ETDEWEB)

    Imaz, M.; Gay, C.; Friedmann, R.; Goldberg, B.

    1998-11-01

    Joint Implementation (JI) and its pilot phase of Activities Implemented Jointly (AIJ) are envisioned as an economic way of reducing global emissions of greenhouse gases. This paper draws upon the Mexican experience with AIJ to identify Mexican concerns with AIJ/JI and proposed solutions to these. Three approved Mexican AIJ projects (Ilumex, Scolel Te, and Salicornia) are described in detail. The Ilurnex project promotes the use of compact fluorescent lamps in Mexican homes of the States of Jalisco and Nuevo Leon, to reduce electric demand. Scolel Te is a sustainable forest management project in Chiapas. Salicornia examines the potential for carbon sequestration with a Halophyte-based crop irrigated with saline waters in Sonora. These three projects are reviewed to clarify the issues and concerns that Mexico has with AIJ and JI and propose measures to deal with them. These initial Mexican AIJ projects show that there is a need for creation of standard project evaluation procedures, and criteria and institutions to oversee project design, selection, and implementation. Further JI development will be facilitated by national and international clarification of key issues such as additionality criteria, carbon-credit sharing, and valuation of non-GHG environmental and/or social benefits and impacts for AIJ projects. Mexico is concerned that JI funding could negatively impact official development assistance or that OECD countries will use JI to avoid taking significant GHG mitigation actions in their own countries. The lack of carbon credit trading in the AIJ stage must be removed to provide useful experience on how to share carbon credits. National or international guidelines are needed to ensure that a portion of the carbon credits is allocated to Mexico.

  14. Weldability and joining techniques for advanced fossil energy system alloys

    Energy Technology Data Exchange (ETDEWEB)

    Lundin, C.D.; Qiao, C.Y.P.; Liu, W.; Yang, D.; Zhou, G.; Morrison, M. [Univ. of Tennessee, Knoxville, TN (United States)

    1998-05-01

    The efforts represent the concerns for the basic understanding of the weldability and fabricability of the advanced high temperature alloys so necessary to affect increases in the efficiency of the next generation Fossil Energy Power Plants. The effort was divided into three tasks with the first effort dealing with the welding and fabrication behavior of 310HCbN (HR3C), the second task details the studies aimed at understanding the weldability of a newly developed 310TaN high temperature stainless (a modification of 310 stainless) and Task 3 addressed the cladding of austenitic tubing with Iron-Aluminide using the GTAW process. Task 1 consisted of microstructural studies on 310HCbN and the development of a Tube Weldability test which has applications to production welding techniques as well as laboratory weldability assessments. In addition, the evaluation of ex-service 310HCbN which showed fireside erosion and cracking at the attachment weld locations was conducted. Task 2 addressed the behavior of the newly developed 310 TaN modification of standard 310 stainless steel and showed that the weldability was excellent and that the sensitization potential was minimal for normal welding and fabrication conditions. The microstructural evolution during elevated temperature testing was characterized and the second phase particles evolved upon aging were identified. Task 3 details the investigation undertaken to clad 310HCbN tubing with Iron Aluminide and developed welding conditions necessary to provide a crack free cladding. The work showed that both a preheat and a post-heat was necessary for crack free deposits and the effect of a third element on the cracking potential was defined together with the effect of the aluminum level for optimum weldability.

  15. Joining of Ukraine to the European scientific and metric systems

    Directory of Open Access Journals (Sweden)

    O.M. Sazonets

    2015-09-01

    Full Text Available At the present stage of development it is necessary to form the knowledge which structures knowledge as the object of management. In conditions of technological globalism there are structural changes in the information environment of countries. Scientific metrics is sufficiently developed in other countries, especially in the EU. The article contains the description of the first index calculation system of scientific references called Science Citation Index (SCI. The main advantage of this project was searching for information not only by the author and thematic categories, but also by the list of cited literature. The authors define the scientific and metric base in the following way: scientific and metric database (SMBD is the bibliographic and abstract database with the tools for tracking citations of articles published in scientific journals. The most prominent European scientific and metric bases are examined. The authors show that the bases have the performance assessment tools which track down the impact of scientific papers and publications of individual scientists and research institutions. The state of crisis in scientific and technological activities in Ukraine as well as the economy as a whole, needs immediate organization of national scientific and metric system.

  16. Performance Comparison of the Optimized Inverted Joined Wing Airplane Concept and Classical Configuration Airplanes

    Directory of Open Access Journals (Sweden)

    Sieradzki Adam

    2016-09-01

    Full Text Available The joined wing concept is an unconventional airplane configuration, known since the mid-twenties of the last century. It has several possible advantages, like reduction of the induced drag and weight due to the closed wing concept. The inverted joined wing variant is its rarely considered version, with the front wing being situated above the aft wing. The following paper presents a performance prediction of the recently optimized configuration of this airplane. Flight characteristics obtained numerically were compared with the performance of two classical configuration airplanes of similar category. Their computational fluid dynamics (CFD models were created basing on available documentation, photographs and some inverse engineering methods. The analysis included simulations performed for a scale of 3-meter wingspan inverted joined wing demonstrator and also for real-scale manned airplanes. Therefore, the results of CFD calculations allowed us to assess the competitiveness of the presented concept, as compared to the most technologically advanced airplanes designed and manufactured to date. At the end of the paper, the areas where the inverted joined wing is better than conventional airplane were predicted and new research possibilities were described.

  17. Elections for staff representatives – Join, commit and vote!

    CERN Multimedia

    Staff Association

    2015-01-01

    The Staff Council is a statutory body representing collectively in the area of employment conditions all CERN staff members (MPE and MPA), as well as the pensioners, former Cernois. The Staff Council is the supreme representative body of the CERN staff and pensioners, which defines the main lines of the policy of the Staff Association. The Staff Council is composed of staff representatives (45 seats to represent staff members, and 5 for representing fellows and associate members), as well as delegates for pensioners (seven positions), designated by GAC-EPA. Every two years, the Council is renewed through elections. Concerning the 45 delegates representing staff members, all departments have a least two seats allocated, one in career paths AA to D and one in career paths E to H. This guarantees a fair distribution of seats among the various organizational units and career paths. The table below, shows the exact number of delegates per department and career paths. Staff members or fellows who want to participa...

  18. Localisation - When Language, Culture and Technology Join Forces

    Directory of Open Access Journals (Sweden)

    Jody Byrne

    2009-03-01

    Full Text Available When you switch on your computer and type up a letter, what language do you see? What about when you visit a website or play a computer game? Does your mobile phone speak your language? Chances are that each of these technological marvels of the modern age communicates with you in your own language. For many of us, this is so commonplace and seamless that we hardly give it a moment's thought but behind the scenes there is a whole industry dedicated to making sure that technology bridges the gap between language and culture without you even noticing.

  19. Localisation - When Language, Culture and Technology Join Forces

    Directory of Open Access Journals (Sweden)

    Jody Byrne

    2012-08-01

    Full Text Available When you switch on your computer and type up a letter, what language do you see? What about when you visit a website or play a computer game? Does your mobile phone speak your language? Chances are that each of these technological marvels of the modern age communicates with you in your own language. For many of us, this is so commonplace and seamless that we hardly give it a moment's thought but behind the scenes there is a whole industry dedicated to making sure that technology bridges the gap between language and culture without you even noticing.

  20. CCI and CI Join Hands:A Better Supply Chain with More Innovations on Cotton Fabrics

    Institute of Scientific and Technical Information of China (English)

    Tom; Xue

    2010-01-01

    Cotton Council International("CCI")and Cotton Incorporated("CI") joined forces again,from October 19-22,2010 at Intertextile Shanghai,to promote natural fiber-U.S.cotton.As global textile strategic partners,both organizations were bringing together alliances through the cotton

  1. Tungsten wire and tubing joined by nickel brazing

    Science.gov (United States)

    1965-01-01

    Thin tungsten wire and tungsten tubing are brazed together using a contacting coil of nickel wire heated to its melting point in an inert-gas atmosphere. This method is also effective for brazing tungsten to tungsten-rhenium parts.

  2. Joining and interface characterization of in situ reinforced silicon nitride

    Energy Technology Data Exchange (ETDEWEB)

    Asthana, R., E-mail: asthanar@uwstout.edu [Department of Engineering and Technology, 326 FH, University of Wisconsin-Stout, Menomonie, WI 54751 (United States); Singh, M., E-mail: Mrityunjay.Singh@nasa.gov [Ohio Aerospace Institute, NASA Glenn Research Center, Cleveland, OH 44135 (United States); Martinez-Fernandez, J., E-mail: Martinez@us.es [Dpto. Física de la Materia Condensada-ICMSE, Universidad de Sevilla-CSIC, Avda. Reina Mercedes, s/n, 41012 Sevilla (Spain)

    2013-03-05

    Highlights: ► AS800 Si{sub 3}N{sub 4} brazed using oxidation-resistant, high use-temperature braze Cu-ABA. ► Interface enriched in Ti and Si but not in Y, La, and Sr (from Y{sub 2}O{sub 3}, La{sub 2}O{sub 3} and SrO). ► Rapid early-stage kinetic evident in constant layer thickness, composition with time. ► Highly textured large grains of Cu and features associated with plastic deformation. -- Abstract: Copper-base active metal interlayers were used to bond in situ reinforced silicon nitride (Honeywell AS800) at 1317 K for 5 and 30 min in vacuum. The joints were characterized using scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), electron back scattered diffraction (EBSD), and transmission electron microscopy (TEM). A Ti-rich interaction zone (∼3.0–3.5 μm thick) formed at the Si{sub 3}N{sub 4}/braze interface. This reaction layer grew toward the inner part of the joint with a featureless microstructure, creating a strong bond. Regions of a Ti-rich phase were frequently found next to the reaction layer but surrounded by the Cu alloy. Extensive Ti and Si enrichments were noted at the interface but there was no evidence of interfacial segregation of Y, La, and Sr (from Y{sub 2}O{sub 3}, La{sub 2}O{sub 3} and SrO, added as sintering aids). The reaction layer thickness and composition did not change when brazing time increased from 5 min to 30 min suggesting rapid growth kinetics in the early stages of reaction. The joints were crack-free and showed features associated with plastic deformation, which indicated that the metal interlayer accommodated strain associated with CTE mismatch. The inner part of the joint consisted of highly textured large grains of the braze alloy.

  3. ITs in Engineering Education: Joining Efforts Between SPEE and IGIP

    Directory of Open Access Journals (Sweden)

    Alberto Cardoso

    2012-01-01

    Full Text Available The International Society for Engineering Education (IGIP and The Portuguese Society for Engineering Education (SPEE, the first being the oldest European Society for Engineering Education in Europe and the second the very young Society for Engineering Education in Portugal, have been intensifying the collaboration between the two societies as well as the exchange and dissemination of information about their relevant activities, whilst promoting understanding and cooperation between their respective members. One possible way is to create joint working groups, open to the members of both societies, on common topics of interest. In fact, both societies already kicked off this activity. The first initiative happened during the 1st World Engineering Education Flash Week (WEE, Lisbon, 2011. The SPEE-IGIP Flash Moment was a one day event integrated in the main Conference, which was dedicated to “Information & Communication Technologies in Engineering Education”.
    ITs allow the development of different teaching strategies which contribute to enhance the learning outcomes of students. ITs are also particularly suited to develop Life Long Learning tools, in a broad range of Engineering subjects, either open to the general market or oriented to a very specific public.
    Examples of teaching strategies involving ITs have been addressed during the Flash Moment SPEE-IGIP which took place during WEE, and some are described in detail in the present work.

  4. Scientists and Educators: Joining Forces to Enhance Ocean Science Literacy

    Science.gov (United States)

    Keener-Chavis, P.

    2004-12-01

    The need for scientists to work with educators to enhance the general public's understanding of science has been addressed for years in reports like Science for All Americans (1990), NSF in a Changing World (1995), Turning to the Sea: America's Ocean Future (1999), Discovering the Earth's Final Frontier, A U.S. Strategy for Ocean Exploration (2000), and most recently, the U.S. Commission on Ocean Policy Report (2004). As reported in The National Science Foundation's Center for Ocean Science Education Excellence (COSEE) Workshop Report (2000), "The Ocean Sciences community did not answer (this) call, even though their discovery that the ocean was a more critical driving force in the natural environment than previously thought possessed great educational significance." It has been further acknowledged that "rapid and extensive improvement of science education is unlikely to occur until it becomes clear to scientists that they have an obligation to become involved in elementary- and secondary-level science (The Role of Scientists in the Professional Development of Science Teachers, National Research Council, 1996.) This presentation will focus on teachers' perceptions of how scientists conduct research, scientists' perceptions of how teachers should teach, and some misconceptions between the two groups. Criteria for high-quality professional development for teachers working with scientists will also be presented, along with a brief overview of the National Oceanic and Atmospheric Administration's Ocean Exploration program efforts to bring teachers and ocean scientists together to further ocean science literacy at the national level through recommendations put forth in the U.S. Commission on Ocean Policy Report (2004).

  5. Teacher Evaluation and Music Education: Joining the National Discussion

    Science.gov (United States)

    Overland, Corin T.

    2014-01-01

    Between 2009 and 2014, thirty-seven states in the United States have adopted or significantly amended their teacher evaluation laws, mostly shifting toward using measurements of student growth on achievement tests. Yet, the processes to evaluate core subjects have not always transitioned smoothly to nontested or artistic content, causing some…

  6. Status of Joining Thin Sheet and Thin Wall Tubes of 14YWT

    Energy Technology Data Exchange (ETDEWEB)

    Hoelzer, David T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Unocic, Kinga A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Tang, Wei [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Feng, Zhili [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-09-18

    Beginning this fiscal year, the FCRD research project initiated an investigation on joining thin sections of the advanced ODS 14YWT ferritic alloy. Friction stir welding (FSW) was investigated as a method to join thin plate and tubing of 14YWT since it is a solid state joining method that has been shown in past studies to be a promising method for joining plates of ODS alloys, such as 14YWT. However, this study will attempt to be the first to demonstrate if FSW can successfully join thin plates and thin wall tubing of 14YWT. In the first FSW attempt, a 1.06 cm thick plate of 14YWT (SM13 heat) was successfully rolled at 1000ºC to the target thickness of 0.1 cm with no edge cracking. This achievement is a highlight since previous attempts to roll 14YWT plates have resulted in extensive cracking. For the FSW run, a pin tool being developed by the ORNL FSW Process Development effort was used. The first FSW run successfully produced a bead-on-plate weld in the 0.1 cm thick plate. The quality of the weld zone appears very good with no evidence of large defects such as cavities. The microstructural characterization study of the bead-on-plate weld zone has been initiated to compare the results of the microstructure analysis with those obtained in the reference microstructural analysis of the 14YWT (SM13 heat) that showed ultra-fine grain size of 0.43 μm and a high number density of ~2-5 nm sizes oxygen-enriched nanoclusters.

  7. ITIL® and information security

    International Nuclear Information System (INIS)

    Jašek, Roman; Králík, Lukáš; Popelka, Miroslav

    2015-01-01

    This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework

  8. Materialism and food security.

    Science.gov (United States)

    Allen, M W; Wilson, M

    2005-12-01

    The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.

  9. Exploring the Fitness Centre Industry in Malaysia; What Factors Influence Joining and Retention and Prevents People from Joining

    OpenAIRE

    Smith, Helen B

    2008-01-01

    Malaysia’s fitness centre industry has seen rapid growth over the last 6 years with the opening of more than 25 international chain outlets of which the majority is owned by California Fitness, Celebrity Fitness, Fitness First and True Fitness. An increasing population and year on year GDP growth, together with the support of the Malaysian government, contribute to further the growth of the industry. The purpose of the study is to explore, investigate and reveal information about the growth a...

  10. Joining and Integration of Silicon Nitride Ceramics for Aerospace and Energy Systems

    Science.gov (United States)

    Singh, M.; Asthana, R.

    2009-01-01

    Light-weight, creep-resistant silicon nitride ceramics possess excellent high-temperature strength and are projected to significantly raise engine efficiency and performance when used as turbine components in the next-generation turbo-shaft engines without the extensive cooling that is needed for metallic parts. One key aspect of Si3N4 utilization in such applications is its joining response to diverse materials. In an ongoing research program, the joining and integration of Si3N4 ceramics with metallic, ceramic, and composite materials using braze interlayers with the liquidus temperature in the range 750-1240C is being explored. In this paper, the self-joining behavior of Kyocera Si3N4 and St. Gobain Si3N4 using a ductile Cu-based active braze (Cu-ABA) containing Ti will be presented. Joint microstructure, composition, hardness, and strength as revealed by optical microscopy, scanning electron microscopy (SEM), energy dispersive spectroscopy (EDS), Knoop microhardness test, and offset compression shear test will be presented. Additionally, microstructure, composition, and joint strength of Si3N4/Inconel 625 joints made using Cu-ABA, will be presented. The results will be discussed with reference to the role of chemical reactions, wetting behavior, and residual stresses in joints.

  11. [Equipment and technology in robotics].

    Science.gov (United States)

    Murphy, Declan; Challacombe, Ben; Nedas, Tim; Elhage, Oussama; Althoefer, Kaspar; Seneviratne, Lakmal; Dasgupta, Prokar

    2007-05-01

    We review the evolution and current status of robotic equipment and technology in urology. We also describe future developments in the key areas of virtual reality simulation, mechatronics and nanorobotics. The history of robotic technology is reviewed and put into the context of current systems. Experts in the associated fields of nanorobotics, mechatronics and virtual reality simulation simulation review the important future developments in these areas.

  12. Mechanical and microstructural integrity of nickel-titanium and stainless steel laser joined wires

    International Nuclear Information System (INIS)

    Vannod, J.; Bornert, M.; Bidaux, J.-E.; Bataillard, L.; Karimi, A.; Drezet, J.-M.; Rappaz, M.; Hessler-Wyser, A.

    2011-01-01

    The biomedical industry shows increasing interest in the joining of dissimilar metals, especially with the aim of developing devices that combine different mechanical and corrosive properties. As an example, nickel-titanium shape memory alloys joined to stainless steel are very promising for new invasive surgery devices, such as guidewires. A fracture mechanics study of such joined wires was carried out using in situ tensile testing and scanning electron microscopy imaging combined with chemical analysis, and revealed an unusual fracture behaviour at superelastic stress. Nanoindentation was performed to determine the mechanical properties of the welded area, which were used as an input for mechanical computation in order to understand this unexpected behaviour. Automated image correlation allowed verification of the mechanical modelling and a reduced stress-strain model is proposed to explain the special fracture mechanism. This study reveals the fact that tremendous property changes at the interface between the NiTi base wire and the weld area have more impact on the ultimate tensile strength than the chemical composition variation across the welded area.

  13. Method of and apparatus for use in joining tubular components and tube assemblies made thereby

    International Nuclear Information System (INIS)

    Percival, S.R.

    1979-01-01

    A method of joining difficult to weld materials involves the forming of a rolled joint. A particular application is the joining of zirconium alloy calandria tubes to stainless steel tube-plates in a SGHWR. (UK)

  14. Common Influence Join

    DEFF Research Database (Denmark)

    Yiu, Man Lung; Mamoulis, Nikos; Karras, Panagiotis

    2008-01-01

    We identify and formalize a novel join operator for two spatial pointsets P and Q. The common influence join (CIJ) returns the pairs of points (p,q),p isin P,q isin Q, such that there exists a location in space, being closer to p than to any other point in P and at the same time closer to q than ......-demand, is very efficient in practice, incurring only slightly higher I/O cost than the theoretical lower bound cost for the problem....

  15. Ring-constrained Join

    DEFF Research Database (Denmark)

    Yiu, Man Lung; Karras, Panagiotis; Mamoulis, Nikos

    2008-01-01

    . This new operation has important applications in decision support, e.g., placing recycling stations at fair locations between restaurants and residential complexes. Clearly, RCJ is defined based on a geometric constraint but not on distances between points. Thus, our operation is fundamentally different......We introduce a novel spatial join operator, the ring-constrained join (RCJ). Given two sets P and Q of spatial points, the result of RCJ consists of pairs (p, q) (where p ε P, q ε Q) satisfying an intuitive geometric constraint: the smallest circle enclosing p and q contains no other points in P, Q...

  16. Reconciling privacy and security

    NARCIS (Netherlands)

    Lieshout, M.J. van; Friedewald, M.; Wright, D.; Gutwirth, S.

    2013-01-01

    This paper considers the relationship between privacy and security and, in particular, the traditional "trade-off" paradigm. The issue is this: how, in a democracy, can one reconcile the trend towards increasing security (for example, as manifested by increasing surveillance) with the fundamental

  17. Joining of Aluminium Alloy and Steel by Laser Assisted Reactive Wetting

    Science.gov (United States)

    Liedl, Gerhard; Vázquez, Rodrigo Gómez; Murzin, Serguei P.

    2018-03-01

    Compounds of dissimilar materials, like aluminium and steel offer an interesting opportunity for the automotive industry to reduce the weight of a car body. Thermal joining of aluminium and steel leads to the formation of brittle intermetallic compounds, which negatively affects the properties of the welded joint. Amongst others, growth of such intermetallic compounds depends on maximum temperature and on the time at certain temperatures. Laser welding with its narrow well seam and its fast heating and cooling cycles provides an excellent opportunity to obtain an ultrathin diffusion zone. Joining of sheet metal DC01 with aluminium alloy AW6016 has been chosen for research. The performed experimental studies showed that by a variation of the beam power and scanning speed it is possible to obtain an ultrathin diffusion zone with narrow intermetallic interlayers. With the aim of supporting further investigation of laser welding of the respective and other dissimilar pairings a multi-physical simulation model has been developed.

  18. Joining of Gamma Titanium Aluminides

    National Research Council Canada - National Science Library

    Baeslack, William

    2002-01-01

    .... Although organized and presented by joining process, many of the observations made and relationships developed, particularly those regarding the weldability and welding metallurgy of gamma titanium...

  19. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  20. Joining of SiC ceramics and SiC/SiC composites

    Energy Technology Data Exchange (ETDEWEB)

    Rabin, B.H. [Idaho National Engineering Lab., Idaho Falls, ID (United States)

    1996-08-01

    This project has successfully developed a practical and reliable method for fabricating SiC ceramic-ceramic joints. This joining method will permit the use of SiC-based ceramics in a variety of elevated temperature fossil energy applications. The technique is based on a reaction bonding approach that provides joint interlayers compatible with SiC, and excellent joint mechanical properties at temperatures exceeding 1000{degrees}C. Recent emphasis has been given to technology transfer activities, and several collaborative research efforts are in progress. Investigations are focusing on applying the joining method to sintered {alpha}-SiC and fiber-reinforced SiC/SiC composites for use in applications such as heat exchangers, radiant burners and gas turbine components.

  1. Sustainability and National Security

    Science.gov (United States)

    2012-01-01

    to U.S. overseas campaigns since the early 1900s. Environmental Security Environmental Security is an element under the larger rubric of Human...oldest seedbank, with a network of research facilities, and well over 300,000 ‘accessions’ of plant genetic material (Sinitsyna 2007b; Roslof

  2. Indirection and computer security.

    Energy Technology Data Exchange (ETDEWEB)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  3. Development and characterization of HIP joining techniques for Si3N4 materials

    International Nuclear Information System (INIS)

    Sun Woo, J.

    1991-09-01

    The report deals with the development and optimization of reproducible techniques for joining Si 3 N 4 with Si 3 N 4 without interlayers consisting of other materials, applying hot isostatic pressing and vacuum plasma spraying. Furthermore, experiments are reported that have been performed in addition to the above-mentioned, for preparing Si 3 N 4 sintered specimens without sintering additives, applying the HIP technique. The resulting specimens have been tested for their joining characteristics, which are reported. All reported experiments have been performed varying essential parameters such as HIP temperature, pressure, holding time, surface roughness, and heat treatment. Every parameter has been examined individually for its effect on the bonding strength of the prepared Si 3 N 4 -Si 3 N 4 joint, applying 4P bending tests at room temperature and at 1200deg C. (orig./MM) [de

  4. Experimental study on joining of AA6063 and AISI 1040 steel

    Science.gov (United States)

    Hynes, N. Rajesh Jesudoss; Raja, S.

    2018-05-01

    Feasibility of joining of dissimilar metals with different physical, chemical and thermal properties such as AA6063 alloy and AISI 1040 steel is worthwhile study, since it has tremendous applications in all most of all engineering domains. The mechanism of bonding is studied using scanning electron microscopy. Impact strength of AA2024/AISI joints, axial shortening distance, micro hardness distribution and joint strength are determined. Micro hardness profile shows increased hardness value at the joint interface, due to grain refinement.

  5. THE RIGHT TO FORM AND TO JOIN TRADE UNIONS AS DEFINED IN INTERNATIONAL LEGAL INSTRUMENTS

    Directory of Open Access Journals (Sweden)

    Andon Majhoshev

    2017-07-01

    Full Text Available The right of workers to form and to join trade unions is one of the most important international labour standards. This means that employees, no matter where they are employed (public or private sector, have the right to form their own organizations (unions. Apart from the employees, employers also have the right to form and join in employers’ associations. The right of employees and employers to organize is based on the following principles: voluntariness, autonomy and democracy. The general objective of the formation of unions and employers’ associations is to protect the rights and interests of members of the union and the employers’ association, as well as their promotion in an organized manner. The provision and guarantee of union and workers' rights are guaranteed by a number of international and regional legal instruments (conventions, recommendations, regulations, such as ILO, UN, Council of Europe and the European Union, which will be analysed further in this paper. The main objective arising from these documents is to improve the position of workers and their protection. Within the paper, we will also analyse the most important legal acts of the Republic of Macedonia concerning the right to join unions. By analysing the content of the national labour legislation, we will determine the extent to which the international labour law is being implemented. Moreover, the paper will analyse the basic principles underlying union organization and association.

  6. FeCrAl and Zr alloys joined using hot isostatic pressing for fusion energy applications

    International Nuclear Information System (INIS)

    Park, Dong Jun; Kim, Hyun Gil; Park, Jeong Yong; Jung, Yang Il; Park, Jung Hwan; Koo, Yang Hyun

    2016-01-01

    Highlights: • FeCrAl and Zr alloys were successfully joined by hot isostatic pressing (HIP). • The thickness of diffusion layer increased with an increase in HIP temperature. • Significant inter-diffusion was observed for HIP at 1150 °C. • Maximum joint strength was achieved at HIP temperature of 700 °C. - Abstract: FeCrAl and Zr alloys were joined by a hot isostatic pressing (HIP) method for fusion energy applications. The optimum conditions for the joining process were studied. The HIP temperatures were varied from 700 to 1050 °C. The mechanical properties of the HIPed samples were evaluated by four-point bending and tensile tests. The FeCrAl and Zr alloys HIPed at 700 °C showed higher joint strength than the other samples. The joint strength decreased with an increase in the HIP temperature from 700 to 950 °C and significantly dropped at 1050 °C. Transmission electron microscopy, scanning electron microscopy, and optical microscopy were used to characterize the joints and interface region of the HIPed samples. The joints appeared to be tightly bonded and no intermetallic compounds or gaps were observed at the interface for HIP temperatures up to 950 °C. A diffusion layer formed at the interface and its thickness increased with the HIP temperature. HIP at 1050 °C, on the other hand, resulted in significant inter-diffusion and formation of brittle inter-metallic compounds at the interface.

  7. Nuclear security: Then and now

    International Nuclear Information System (INIS)

    Weinstein, A.A.

    1992-01-01

    The evolution of computerized security systems at nuclear power plants has been driven by both the enhancements in computer technology and the changes in regulatory requirements over time. Technical advancements have simplified the essential nature of these systems in both real-time and data processing operations. Regulatory developments have caused a similar trend in simplification. This article addresses the computer and data acquisition portions of a security system and not the access control hardware, intrusion detection sensors, or surveillance equipment, other than to indicate how functional improvements in these areas have been achieved as systems have developed. The state of technology today includes the availability of fault-tolerant computers, the practice of networking multiple computers, and the standardization of real-time data network communications. These factors make two things possible in a plant security system. One is distributed processing, with rapid alarm annunciation (less than 1 second), essentially immediate response to access requests (less than 1 second), and an expeditious and comprehensive reporting capability. The other is permitting different plant operations (security, radiation protection, operator tours) to achieve economies by sharing the same network while using independent computers and avoiding operational conflicts

  8. Using and joining a franchised private sector provider network in Myanmar.

    Directory of Open Access Journals (Sweden)

    Kathryn O'Connell

    Full Text Available BACKGROUND: Quality is central to understanding provider motivations to join and remain within a social franchising network. Quality also appears as a key issue from the client's perspective, and may influence why a client chooses to use a franchised provider over another type of provider. The dynamic relationships between providers of social franchising clinics and clients who use these services have not been thoroughly investigated in the context of Myanmar, which has an established social franchising network. This study examines client motivations to use a Sun Quality Health network provider and provider motivations to join and remain in the Sun Quality Health network. Taken together, these two aims provide an opportunity to explore the symbiotic relationship between client satisfaction and provider incentives to increase the utilization of reproductive health care services. METHODS AND FINDINGS: Results from a series of focus group discussions with clients of reproductive health services and franchised providers shows that women chose health services provided by franchised private sector general practitioners because of its perceived higher quality, associated with the availability of effective, affordable, drugs. A key finding of the study is associated with providers. Provider focus group discussions indicate that a principle determinate for joining and remaining in the Sun Quality Health Network was serving the poor.

  9. Using and Joining a Franchised Private Sector Provider Network in Myanmar

    Science.gov (United States)

    O'Connell, Kathryn; Hom, Mo; Aung, Tin; Theuss, Marc; Huntington, Dale

    2011-01-01

    Background Quality is central to understanding provider motivations to join and remain within a social franchising network. Quality also appears as a key issue from the client's perspective, and may influence why a client chooses to use a franchised provider over another type of provider. The dynamic relationships between providers of social franchising clinics and clients who use these services have not been thoroughly investigated in the context of Myanmar, which has an established social franchising network. This study examines client motivations to use a Sun Quality Health network provider and provider motivations to join and remain in the Sun Quality Health network. Taken together, these two aims provide an opportunity to explore the symbiotic relationship between client satisfaction and provider incentives to increase the utilization of reproductive health care services. Methods and Findings Results from a series of focus group discussions with clients of reproductive health services and franchised providers shows that women chose health services provided by franchised private sector general practitioners because of its perceived higher quality, associated with the availability of effective, affordable, drugs. A key finding of the study is associated with providers. Provider focus group discussions indicate that a principle determinate for joining and remaining in the Sun Quality Health Network was serving the poor. PMID:22180781

  10. Fabrication and characterization of joined silicon carbide cylindrical components for nuclear applications

    Science.gov (United States)

    Khalifa, H. E.; Deck, C. P.; Gutierrez, O.; Jacobsen, G. M.; Back, C. A.

    2015-02-01

    The use of silicon carbide (SiC) composites as structural materials in nuclear applications necessitates the development of a viable joining method. One critical application for nuclear-grade joining is the sealing of fuel within a cylindrical cladding. This paper demonstrates cylindrical joint feasibility using a low activation nuclear-grade joint material comprised entirely of β-SiC. While many papers have considered joining material, this paper takes into consideration the joint geometry and component form factor, as well as the material performance. Work focused specifically on characterizing the strength and permeability performance of joints between cylindrical SiC-SiC composites and monolithic SiC endplugs. The effects of environment and neutron irradiation were not evaluated in this study. Joint test specimens of different geometries were evaluated in their as-fabricated state, as well as after being subjected to thermal cycling and partial mechanical loading. A butted scarf geometry supplied the best combination of high strength and low permeability. A leak rate performance of 2 × 10-9 mbar l s-1 was maintained after thermal cycling and partial mechanical loading and sustained applied force of 3.4 kN, or an apparent strength of 77 MPa. This work shows that a cylindrical SiC-SiC composite tube sealed with a butted scarf endplug provides out-of-pile strength and permeability performance that meets light water reactor design requirements.

  11. Using and joining a franchised private sector provider network in Myanmar.

    Science.gov (United States)

    O'Connell, Kathryn; Hom, Mo; Aung, Tin; Theuss, Marc; Huntington, Dale

    2011-01-01

    Quality is central to understanding provider motivations to join and remain within a social franchising network. Quality also appears as a key issue from the client's perspective, and may influence why a client chooses to use a franchised provider over another type of provider. The dynamic relationships between providers of social franchising clinics and clients who use these services have not been thoroughly investigated in the context of Myanmar, which has an established social franchising network. This study examines client motivations to use a Sun Quality Health network provider and provider motivations to join and remain in the Sun Quality Health network. Taken together, these two aims provide an opportunity to explore the symbiotic relationship between client satisfaction and provider incentives to increase the utilization of reproductive health care services. Results from a series of focus group discussions with clients of reproductive health services and franchised providers shows that women chose health services provided by franchised private sector general practitioners because of its perceived higher quality, associated with the availability of effective, affordable, drugs. A key finding of the study is associated with providers. Provider focus group discussions indicate that a principle determinate for joining and remaining in the Sun Quality Health Network was serving the poor.

  12. The Ku80 carboxy terminus stimulates joining and artemis-mediated processing of DNA ends.

    Science.gov (United States)

    Weterings, Eric; Verkaik, Nicole S; Keijzers, Guido; Florea, Bogdan I; Wang, Shih-Ya; Ortega, Laura G; Uematsu, Naoya; Chen, David J; van Gent, Dik C

    2009-03-01

    Repair of DNA double-strand breaks (DSBs) is predominantly mediated by nonhomologous end joining (NHEJ) in mammalian cells. NHEJ requires binding of the Ku70-Ku80 heterodimer (Ku70/80) to the DNA ends and subsequent recruitment of the DNA-dependent protein kinase catalytic subunit (DNA-PK(CS)) and the XRCC4/ligase IV complex. Activation of the DNA-PK(CS) serine/threonine kinase requires an interaction with Ku70/80 and is essential for NHEJ-mediated DSB repair. In contrast to previous models, we found that the carboxy terminus of Ku80 is not absolutely required for the recruitment and activation of DNA-PK(CS) at DSBs, although cells that harbored a carboxy-terminal deletion in the Ku80 gene were sensitive to ionizing radiation and showed reduced end-joining capacity. More detailed analysis of this repair defect showed that DNA-PK(CS) autophosphorylation at Thr2647 was diminished, while Ser2056 was phosphorylated to normal levels. This resulted in severely reduced levels of Artemis nuclease activity in vivo and in vitro. We therefore conclude that the Ku80 carboxy terminus is important to support DNA-PK(CS) autophosphorylation at specific sites, which facilitates DNA end processing by the Artemis endonuclease and the subsequent joining reaction.

  13. The Ku80 Carboxy Terminus Stimulates Joining and Artemis-Mediated Processing of DNA Ends▿

    Science.gov (United States)

    Weterings, Eric; Verkaik, Nicole S.; Keijzers, Guido; Florea, Bogdan I.; Wang, Shih-Ya; Ortega, Laura G.; Uematsu, Naoya; Chen, David J.; van Gent, Dik C.

    2009-01-01

    Repair of DNA double-strand breaks (DSBs) is predominantly mediated by nonhomologous end joining (NHEJ) in mammalian cells. NHEJ requires binding of the Ku70-Ku80 heterodimer (Ku70/80) to the DNA ends and subsequent recruitment of the DNA-dependent protein kinase catalytic subunit (DNA-PKCS) and the XRCC4/ligase IV complex. Activation of the DNA-PKCS serine/threonine kinase requires an interaction with Ku70/80 and is essential for NHEJ-mediated DSB repair. In contrast to previous models, we found that the carboxy terminus of Ku80 is not absolutely required for the recruitment and activation of DNA-PKCS at DSBs, although cells that harbored a carboxy-terminal deletion in the Ku80 gene were sensitive to ionizing radiation and showed reduced end-joining capacity. More detailed analysis of this repair defect showed that DNA-PKCS autophosphorylation at Thr2647 was diminished, while Ser2056 was phosphorylated to normal levels. This resulted in severely reduced levels of Artemis nuclease activity in vivo and in vitro. We therefore conclude that the Ku80 carboxy terminus is important to support DNA-PKCS autophosphorylation at specific sites, which facilitates DNA end processing by the Artemis endonuclease and the subsequent joining reaction. PMID:19103741

  14. Joining and Performance of Alkali Metal Thermal-to-electric Converter (AMTEC)

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Min-Soo; Lee, Wook-Hyun; Woo, Sang-Kuk [Korea Institute of Energy Research, Daejeon (Korea, Republic of)

    2017-07-15

    The alkali-Metal Thermal-to-electric Converter (AMTEC) is one of the promising static energy conversion technologies for the direct conversion of thermal energy to electrical energy. The advantages over a conventional energy converter are its high theoretical conversion efficiency of 40% and power density of 500 W/kg. The working principle of an AMTEC battery is the electrochemical reaction of the sodium through an ion conducting electrolyte. Sodium ion pass through the hot side of the beta”-alumina solid electrolyte (BASE) primarily as a result of the pressure difference. This pressure difference across the BASE has a significant effect on the overall performance of the AMTEC system. In order to build the high pressure difference across the BASE, hermeticity is required for each joined components for high temperature range of 900°C. The AMTEC battery was manufactured by utilizing robust joining technology of BASE/insulator/metal flange interfaces of the system for both structural and electrical stability. The electrical potential difference between the anode and cathode sides, where the electrons emitted from sodium ionization and recombined into sodium, was characterized as the open-circuit voltage. The efforts of technological improvement were concentrated on a high-power output and conversion efficiency. This paper discusses about the joining and performance of the AMTEC systems.

  15. Joining of Ni-TiC FGM and Ni-Al Intermetallics by Centrifugal Combustion Synthesis

    International Nuclear Information System (INIS)

    Ohmi, Tatsuya; Matsuura, Kiyotaka; Iguchi, Manabu; Mizuma, Kiminori

    2008-01-01

    A centrifugal combustion synthesis (CCS) process has been investigated to join a Ni-Al intermetallic compound and a Ni-TiC cermet. The cermet, a tubular graphite mold, and a green compact of reactants consisting of Al, Ni and NiO were set in a centrifugal caster. When the combustion synthesis reaction was induced in the centrifugal force field, a synthesized molten Ni-Al alloy flowed into the graphite mold and joined to the cermet. The soundness of the joint interface depended on the volume percentage of TiC phase in the cermet. A lot of defects were formed near the interface between the Ni-TiC cermet and the cast Ni-Al alloy when the volume percentage of TiC was 50% or higher. For this kind of cermet system, using a functionally graded cermet such as Ni-10 vol.%TiC/Ni-25 vol.%TiC/Ni-50 vol.%TiC overcame this difficulty. The four-point bending strength of the joined specimen consisting of the three-layered FGM cermet and cast Ni-29 mol%Al alloy was 1010 MPa which is close to the result for a Ni-29 mol%Al alloy specimen

  16. Development of a double beam process for joining aluminum and steel

    Science.gov (United States)

    Frank, Sascha

    2014-02-01

    Multi-material structures pose an attractive option for overcoming some of the central challenges in lightweight design. An exceptionally high potential for creating cost-effective lightweight solutions is attributed to the combination of steel and aluminum. However, these materials are also particularly difficult to join due to their tendency to form intermetallic compounds (IMCs). The growth of these compounds is facilitated by high temperatures and long process times. Due to their high brittleness, IMCs can severely weaken a joint. Thus, it is only possible to create durable steel-aluminum joints when the formation of IMCs can be limited to a non-critical level. To meet this goal, a new joining method has been designed. The method is based on the combination of a continuous wave (pw) and a pulsed laser (pw) source. Laser beams from both sources are superimposed in a common process zone. This makes it possible to apply the advantages of laser brazing to mixed-metal joints without requiring the use of chemical fluxes. The double beam technology was first tested in bead-on-plate experiments using different filler wire materials. Based on the results of these tests, a process for joining steel and aluminum in a double-flanged configuration is now being developed. The double flanged seams are joined using zinc- or aluminum-based filler wires. Microsections of selected seams show that it is possible to achieve good base material wetting while limiting the growth of IMCs to acceptable measures. In addition, the results of tensile tests show that high joint strengths can be achieved.

  17. Coincident In Vitro Analysis of DNA-PK-Dependent and -Independent Nonhomologous End Joining

    Directory of Open Access Journals (Sweden)

    Cynthia L. Hendrickson

    2010-01-01

    Full Text Available In mammalian cells, DNA double-strand breaks (DSBs are primarily repaired by nonhomologous end joining (NHEJ. The current model suggests that the Ku 70/80 heterodimer binds to DSB ends and recruits DNA-PKcs to form the active DNA-dependent protein kinase, DNA-PK. Subsequently, XRCC4, DNA ligase IV, XLF and most likely, other unidentified components participate in the final DSB ligation step. Therefore, DNA-PK plays a key role in NHEJ due to its structural and regulatory functions that mediate DSB end joining. However, recent studies show that additional DNA-PK-independent NHEJ pathways also exist. Unfortunately, the presence of DNA-PKcs appears to inhibit DNA-PK-independent NHEJ, and in vitro analysis of DNA-PK-independent NHEJ in the presence of the DNA-PKcs protein remains problematic. We have developed an in vitro assay that is preferentially active for DNA-PK-independent DSB repair based solely on its reaction conditions, facilitating coincident differential biochemical analysis of the two pathways. The results indicate the biochemically distinct nature of the end-joining mechanisms represented by the DNA-PK-dependent and -independent NHEJ assays as well as functional differences between the two pathways.

  18. Smart security and securing data through watermarking

    Science.gov (United States)

    Singh, Ritesh; Kumar, Lalit; Banik, Debraj; Sundar, S.

    2017-11-01

    The growth of image processing in embedded system has provided the boon of enhancing the security in various sectors. This lead to the developing of various protective strategies, which will be needed by private or public sectors for cyber security purposes. So, we have developed a method which uses digital water marking and locking mechanism for the protection of any closed premises. This paper describes a contemporary system based on user name, user id, password and encryption technique which can be placed in banks, protected offices to beef the security up. The burglary can be abated substantially by using a proactive safety structure. In this proposed framework, we are using water-marking in spatial domain to encode and decode the image and PIR(Passive Infrared Sensor) sensor to detect the existence of person in any close area.

  19. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  20. Musical Sound, Instruments, and Equipment

    Science.gov (United States)

    Photinos, Panos

    2017-12-01

    'Musical Sound, Instruments, and Equipment' offers a basic understanding of sound, musical instruments and music equipment, geared towards a general audience and non-science majors. The book begins with an introduction of the fundamental properties of sound waves, and the perception of the characteristics of sound. The relation between intensity and loudness, and the relation between frequency and pitch are discussed. The basics of propagation of sound waves, and the interaction of sound waves with objects and structures of various sizes are introduced. Standing waves, harmonics and resonance are explained in simple terms, using graphics that provide a visual understanding. The development is focused on musical instruments and acoustics. The construction of musical scales and the frequency relations are reviewed and applied in the description of musical instruments. The frequency spectrum of selected instruments is explored using freely available sound analysis software. Sound amplification and sound recording, including analog and digital approaches, are discussed in two separate chapters. The book concludes with a chapter on acoustics, the physical factors that affect the quality of the music experience, and practical ways to improve the acoustics at home or small recording studios. A brief technical section is provided at the end of each chapter, where the interested reader can find the relevant physics and sample calculations. These quantitative sections can be skipped without affecting the comprehension of the basic material. Questions are provided to test the reader's understanding of the material. Answers are given in the appendix.

  1. Natural gas and energy security

    International Nuclear Information System (INIS)

    Saga, B.P.

    1996-01-01

    This paper relates to energy security by natural gas supply seen in an International Energy Agency perspective. Topics are: Security of supply, what is it; the role gas on the European energy scene; short term security of supply; long term security of supply; future structural and regulatory developments and possible implications for security of supply. 6 figs

  2. Analytical and experimental evaluation of joining silicon carbide to silicon carbide and silicon nitride to silicon nitride for advanced heat engine applications Phase 2. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Sundberg, G.J.; Vartabedian, A.M.; Wade, J.A.; White, C.S. [Norton Co., Northboro, MA (United States). Advanced Ceramics Div.

    1994-10-01

    The purpose of joining, Phase 2 was to develop joining technologies for HIP`ed Si{sub 3}N{sub 4} with 4wt% Y{sub 2}O{sub 3} (NCX-5101) and for a siliconized SiC (NT230) for various geometries including: butt joins, curved joins and shaft to disk joins. In addition, more extensive mechanical characterization of silicon nitride joins to enhance the predictive capabilities of the analytical/numerical models for structural components in advanced heat engines was provided. Mechanical evaluation were performed by: flexure strength at 22 C and 1,370 C, stress rupture at 1,370 C, high temperature creep, 22 C tensile testing and spin tests. While the silicon nitride joins were produced with sufficient integrity for many applications, the lower join strength would limit its use in the more severe structural applications. Thus, the silicon carbide join quality was deemed unsatisfactory to advance to more complex, curved geometries. The silicon carbide joining methods covered within this contract, although not entirely successful, have emphasized the need to focus future efforts upon ways to obtain a homogeneous, well sintered parent/join interface prior to siliconization. In conclusion, the improved definition of the silicon carbide joining problem obtained by efforts during this contract have provided avenues for future work that could successfully obtain heat engine quality joins.

  3. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  4. 41 CFR 101-26.507-3 - Purchase of security equipment from Federal Supply Schedules.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Purchase of security... Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY AND PROCUREMENT 26-PROCUREMENT SOURCES AND PROGRAM 26.5-GSA Procurement Programs § 101-26.507-3 Purchase of...

  5. Microstructural and mechanical properties of pure aluminum, 5083 and 7075 alloys joined by friction stir welding

    Energy Technology Data Exchange (ETDEWEB)

    Yilmaz, Selim Sarper [Celal Bayar Univ., Manisa, Muradiye (Turkey)

    2012-07-01

    In this study, microstructural and mechanical properties of pure aluminum, 5083 and 7075 alloys joined by friction stir welding were investigated. Hardness, tensile, bending and impact tests were applied to the welded samples. In addition, optical and SEM tests were carried out. The effects of welding speed on microstructure and mechanical properties were investigated in these materials. Then, the optimal conditions for friction stir welding were determined for pure aluminum, 5083 and 7075 alloys. The maximum hardness was observed for 7075 while the minimum hardness was observed for pure aluminum. (orig.)

  6. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  7. Security, insecurity and health.

    Science.gov (United States)

    Coupland, Robin

    2007-03-01

    An examination of the nexus of security, insecurity and health shows that security is a prerequisite for health. The many and varied ways that armed violence--including threats of armed violence--can affect people's health can be documented by formal studies; however, valuable data also exist in other reports, such as media reports. The health community needs to recognize that people's insecurity is a massive global health issue. The foreign policies of donor governments should incorporate recognition that documentation, analysis and publication of data describing the impact of insecurity on people's health can lead to the creation of policies to enhance people's security.

  8. Media and Security Team

    Data.gov (United States)

    Federal Laboratory Consortium — The Media And Security Team led by Prof. Min Wu was established in Fall 2001 at University of Maryland, College Park. A number of research and education activities...

  9. Use of Friction Stir Welding and Friction Stir Processing for Advanced Nuclear Fuels and Materials Joining Applications

    International Nuclear Information System (INIS)

    J. I. Cole; J. F. Jue

    2006-01-01

    Application of the latest developments in materials technology may greatly aid in the successful pursuit of next generation reactor and transmutation technologies. One such area where significant progress is needed is joining of advanced fuels and materials. Rotary friction welding, also referred to as friction stir welding (FSW), has shown great promise as a method for joining traditionally difficult to join materials such as aluminum alloys. This relatively new technology, first developed in 1991, has more recently been applied to higher melting temperature alloys such as steels, nickel-based and titanium alloys. An overview of the FSW technology is provided and two specific nuclear fuels and materials applications where the technique may be used to overcome limitations of conventional joining technologies are highlighted

  10. Cut-and-join operators and N=4 super Yang-Mills

    International Nuclear Information System (INIS)

    Brown, T.W.

    2010-02-01

    We show which multi-trace structures are compatible with the symmetrisation of local operators in N=4 super Yang-Mills when they are organised into representations of the global symmetry group. Cut-and-join operators give the non-planar expansion of correlation functions of these operators in the free theory. Using these techniques we find the 1/N corrections to the quarter-BPS operators which remain protected at weak coupling. We also present a new way of counting these chiral ring operators using the Weyl group S N . (orig.)

  11. Cut-and-join operators and N=4 super Yang-Mills

    Energy Technology Data Exchange (ETDEWEB)

    Brown, T W [DESY, Hamburg (Germany). Theory Group

    2010-02-15

    We show which multi-trace structures are compatible with the symmetrisation of local operators in N=4 super Yang-Mills when they are organised into representations of the global symmetry group. Cut-and-join operators give the non-planar expansion of correlation functions of these operators in the free theory. Using these techniques we find the 1/N corrections to the quarter-BPS operators which remain protected at weak coupling. We also present a new way of counting these chiral ring operators using the Weyl group S{sub N}. (orig.)

  12. Security dialogues: building better relationships between security and business

    OpenAIRE

    Ashenden, Debi; Lawrence, Darren

    2016-01-01

    In the real world, there's often a discrepancy between an organization's mandated security processes and what actually happens. The social practice of security flourishes in the space between and around formal organizational security processes. By recognizing the value of risk management as a communication tool, security practitioners can tap opportunities to improve the security dialogue with staff.

  13. Security and Emergency Management Division

    Data.gov (United States)

    Federal Laboratory Consortium — Volpe's Security and Emergency Management Division identifies vulnerabilities, risks, and opportunities to improve the security of transportation systems, critical...

  14. Effect of material flow on joint strength in activation spot joining of Al alloy and steel sheets

    International Nuclear Information System (INIS)

    Watanabe, Goro; Yogo, Yasuhiro; Takao, Hisaaki

    2014-01-01

    A new joining method for dissimilar metal sheets was developed where a rotated consumable rod of Al alloy is pressed onto an Al alloy sheet at the part overlapped with a mild steel sheet. The metal flow in the joining region is increased by the through-hole in the Al sheet and consumable Al rod. The rod creates the joint interface and pads out of the thinly joined parts through pressing. This produces a higher joint strength than that of conventional friction stir spot welding. Measurements of the joint interface showed the presence of a 5-10 nm thick amorphous layer consisting of Al and Mg oxides

  15. Joining Forces

    DEFF Research Database (Denmark)

    Christiansen, Anne Mette

    2013-01-01

    The interest in Corporate Social Responsibility (CSR) has grown dramatically over the last three years in Greenland. A vast geographical area with a tiny population, Greenland has recently obtained self-government status and is going through a rapid development economically and socially as the co......The interest in Corporate Social Responsibility (CSR) has grown dramatically over the last three years in Greenland. A vast geographical area with a tiny population, Greenland has recently obtained self-government status and is going through a rapid development economically and socially...... companies have over the last 23 years embraced the concept of strategic CSR and are increasingly engaging in cross-sector partnerships as part of their CSR strategy. The partnerships take different forms both in regards to number of partners, focus areas and level of strategic engagement. In the article......, a number of different partnerships are explored along with the motivation for the different partners for engaging. Finally, the role of a central partnership broker is examined and the author suggests that this has been instrumental in ensuring the emergence of the relatively high number of partnerships...

  16. Load Bearing Equipment for Bone and Muscle

    Science.gov (United States)

    Shackelford, Linda; Griffith, Bryan

    2015-01-01

    Resistance exercise on ISS has proven effective in maintaining bone mineral density and muscle mass. Exploration missions require exercise with similar high loads using equipment with less mass and volume and greater safety and reliability than resistance exercise equipment used on ISS (iRED, ARED, FWED). Load Bearing Equipment (LBE) uses each exercising person to create and control the load to the partner.

  17. Fire prevention and protection for trackless equipment

    Energy Technology Data Exchange (ETDEWEB)

    Burger, A.J.

    1988-10-01

    With the increased use of trackless diesel and electrical equipment underground, the fire danger associated with this equipment has increased. The need for adequate fire prevention and protection on all aspects of trackless mechanised mining must be taken into consideration. This paper describes briefly the causes of fires on trackless equipment and the precautions taken to reduce the risk of ignition. 1 tab.

  18. Purex: process and equipment performance

    International Nuclear Information System (INIS)

    Orth, D.A.

    1986-01-01

    The Purex process is the solvent extraction system that uses tributyl phosphate as the extractant for separating uranium and plutonium from irradiated reactor fuels. Since the first flowsheet was proposed at Oak Ridge National Laboratory in 1950, the process has endured for over 30 years with only minor modifications. The spread of the technology was rapid, and worldwide use or research on Purex-type processes was reported by the time of the 1955 Geneva Conference. The overall performance of the process has been so good that there are no serious contenders for replacing it soon. This paper presents: process description; equipment performance (mixer-settlers, pulse columns, rapid contactors); fission product decontamination; solvent effects (solvent degradation products); and partitioning of uranium and plutonium

  19. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  20. Personal characteristics and contextual factors that determine "helping," "joining in," and "doing nothing" when witnessing cyberbullying.

    Science.gov (United States)

    Van Cleemput, Katrien; Vandebosch, Heidi; Pabian, Sara

    2014-01-01

    In this article, we investigated several determinants of bystanders' reactive behaviors when confronted with cyberbullying using self-reported data from 2,333 Flemish 9-16 year olds. Structural equation modeling showed that adolescents that had joined in on the cyberbullying were older, had lower levels of empathy and were more likely to have been involved in cyberbullying or traditional bullying as perpetrators. Adolescents who had helped the victim were younger, had higher levels of empathy and were more likely to have been a victim of cyberbullying or traditional bullying in the past months. Adolescents that did nothing when they witnessed cyberbullying, were also older, showed lower levels of empathy and were less likely to have been a victim of traditional bullying. Social anxiety was not related to joining in, helping and remaining passive. In the second part of the analysis, we found that bystanders' passive behavior could be explained in more detail by moral disengagement theory and other contextual factors. In the discussion, the implications of the findings for research on cyberbullying are addressed. © 2014 Wiley Periodicals, Inc.

  1. Securing Land Tenure, Improving Food Security and Reducing ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Securing Land Tenure, Improving Food Security and Reducing Poverty in Rural ... land tenure regimes as obstacles to food security, economic integration and ... its 2017 call for proposals to establish Cyber Policy Centres in the Global South.

  2. 46 CFR 56.75-30 - Pipe joining details.

    Science.gov (United States)

    2010-10-01

    ... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING PIPING SYSTEMS AND... cut or machined square and the edges shall be held closely together to insure a satisfactory joint. (b... satisfactory for the brazing alloy to be employed, method of heating, and material to be joined. The annular...

  3. Highly precise and developmentally programmed genome assembly in Paramecium requires ligase IV-dependent end joining.

    Directory of Open Access Journals (Sweden)

    Aurélie Kapusta

    2011-04-01

    Full Text Available During the sexual cycle of the ciliate Paramecium, assembly of the somatic genome includes the precise excision of tens of thousands of short, non-coding germline sequences (Internal Eliminated Sequences or IESs, each one flanked by two TA dinucleotides. It has been reported previously that these genome rearrangements are initiated by the introduction of developmentally programmed DNA double-strand breaks (DSBs, which depend on the domesticated transposase PiggyMac. These DSBs all exhibit a characteristic geometry, with 4-base 5' overhangs centered on the conserved TA, and may readily align and undergo ligation with minimal processing. However, the molecular steps and actors involved in the final and precise assembly of somatic genes have remained unknown. We demonstrate here that Ligase IV and Xrcc4p, core components of the non-homologous end-joining pathway (NHEJ, are required both for the repair of IES excision sites and for the circularization of excised IESs. The transcription of LIG4 and XRCC4 is induced early during the sexual cycle and a Lig4p-GFP fusion protein accumulates in the developing somatic nucleus by the time IES excision takes place. RNAi-mediated silencing of either gene results in the persistence of free broken DNA ends, apparently protected against extensive resection. At the nucleotide level, controlled removal of the 5'-terminal nucleotide occurs normally in LIG4-silenced cells, while nucleotide addition to the 3' ends of the breaks is blocked, together with the final joining step, indicative of a coupling between NHEJ polymerase and ligase activities. Taken together, our data indicate that IES excision is a "cut-and-close" mechanism, which involves the introduction of initiating double-strand cleavages at both ends of each IES, followed by DSB repair via highly precise end joining. This work broadens our current view on how the cellular NHEJ pathway has cooperated with domesticated transposases for the emergence of new

  4. Highly precise and developmentally programmed genome assembly in Paramecium requires ligase IV-dependent end joining.

    Science.gov (United States)

    Kapusta, Aurélie; Matsuda, Atsushi; Marmignon, Antoine; Ku, Michael; Silve, Aude; Meyer, Eric; Forney, James D; Malinsky, Sophie; Bétermier, Mireille

    2011-04-01

    During the sexual cycle of the ciliate Paramecium, assembly of the somatic genome includes the precise excision of tens of thousands of short, non-coding germline sequences (Internal Eliminated Sequences or IESs), each one flanked by two TA dinucleotides. It has been reported previously that these genome rearrangements are initiated by the introduction of developmentally programmed DNA double-strand breaks (DSBs), which depend on the domesticated transposase PiggyMac. These DSBs all exhibit a characteristic geometry, with 4-base 5' overhangs centered on the conserved TA, and may readily align and undergo ligation with minimal processing. However, the molecular steps and actors involved in the final and precise assembly of somatic genes have remained unknown. We demonstrate here that Ligase IV and Xrcc4p, core components of the non-homologous end-joining pathway (NHEJ), are required both for the repair of IES excision sites and for the circularization of excised IESs. The transcription of LIG4 and XRCC4 is induced early during the sexual cycle and a Lig4p-GFP fusion protein accumulates in the developing somatic nucleus by the time IES excision takes place. RNAi-mediated silencing of either gene results in the persistence of free broken DNA ends, apparently protected against extensive resection. At the nucleotide level, controlled removal of the 5'-terminal nucleotide occurs normally in LIG4-silenced cells, while nucleotide addition to the 3' ends of the breaks is blocked, together with the final joining step, indicative of a coupling between NHEJ polymerase and ligase activities. Taken together, our data indicate that IES excision is a "cut-and-close" mechanism, which involves the introduction of initiating double-strand cleavages at both ends of each IES, followed by DSB repair via highly precise end joining. This work broadens our current view on how the cellular NHEJ pathway has cooperated with domesticated transposases for the emergence of new mechanisms

  5. Electrically conductive ceramics and new joining technology for applications in HTR engineering

    Energy Technology Data Exchange (ETDEWEB)

    Hille, Carmen, E-mail: carmen.hille@ilkdresden.de [Dresden University of Technology (TU Dresden), Institute of Power Engineering, Chair of Hydrogen Technology and Nuclear Power Engineering, George-Baehr-Str. 3b, D-01062 Dresden (Germany); Lippmann, Wolfgang, E-mail: wolfgang.lippmann@tu-dresden.de [Dresden University of Technology (TU Dresden), Institute of Power Engineering, Chair of Hydrogen Technology and Nuclear Power Engineering, George-Baehr-Str. 3b, D-01062 Dresden (Germany); Hurtado, Antonio, E-mail: antonio.hurtado@tu-dresden.de [Dresden University of Technology (TU Dresden), Institute of Power Engineering, Chair of Hydrogen Technology and Nuclear Power Engineering, George-Baehr-Str. 3b, D-01062 Dresden (Germany)

    2012-10-15

    Ceramic constructional components are quite extensively required for operation of high-temperature nuclear reactors. Functional ceramics, in addition to constructional ceramics, are increasingly coming into the focus of research. Ceramic materials are predestined for use at high temperatures and in corrosive atmospheres. Modification of silicon carbide (SiC) by targeted doping, for instance, produces a suitable material for the production of heating conductors and thermoelectric generators. As a construction material, silicon carbide (SiC) is especially interesting due to its very good thermal, mechanical and radiological properties. SiC, furthermore, performs well when activated by neutron irradiation, with the induced activation subsiding after only a few hours (). This property vector makes it an ideal starting material for use in a wide range of functional elements in high-temperature power engineering, particularly in high-temperature nuclear reactor engineering (e.g. V/HTR) including thermochemical plants for hydrogen generation or Synfuel production. In principle, it is possible to produce all-ceramic assemblies consisting of a thermoelectric generator and a sensor that can provide reliable measurement signals under extreme conditions in the high-temperature range without external power supply. This paper explains the feasibility of laser-joining such modified non-oxide ceramics, how to make electrically conductive joints, and thus, how to design complex assemblies. The parameters required for an optimal laser process to join ceramic materials were determined in extensive preliminary experiments. These investigations focused on the specific electrical resistances and optical properties. Specifically developed brazing fillers were fine-tuned so that the joints of the ceramics improved in terms of their physical interactions, chemical reactions and ability to bond or key chemically and mechanically with the ceramic surfaces. Thereby, the electrical

  6. Electrically conductive ceramics and new joining technology for applications in HTR engineering

    International Nuclear Information System (INIS)

    Hille, Carmen; Lippmann, Wolfgang; Hurtado, Antonio

    2012-01-01

    Ceramic constructional components are quite extensively required for operation of high-temperature nuclear reactors. Functional ceramics, in addition to constructional ceramics, are increasingly coming into the focus of research. Ceramic materials are predestined for use at high temperatures and in corrosive atmospheres. Modification of silicon carbide (SiC) by targeted doping, for instance, produces a suitable material for the production of heating conductors and thermoelectric generators. As a construction material, silicon carbide (SiC) is especially interesting due to its very good thermal, mechanical and radiological properties. SiC, furthermore, performs well when activated by neutron irradiation, with the induced activation subsiding after only a few hours (). This property vector makes it an ideal starting material for use in a wide range of functional elements in high-temperature power engineering, particularly in high-temperature nuclear reactor engineering (e.g. V/HTR) including thermochemical plants for hydrogen generation or Synfuel production. In principle, it is possible to produce all-ceramic assemblies consisting of a thermoelectric generator and a sensor that can provide reliable measurement signals under extreme conditions in the high-temperature range without external power supply. This paper explains the feasibility of laser-joining such modified non-oxide ceramics, how to make electrically conductive joints, and thus, how to design complex assemblies. The parameters required for an optimal laser process to join ceramic materials were determined in extensive preliminary experiments. These investigations focused on the specific electrical resistances and optical properties. Specifically developed brazing fillers were fine-tuned so that the joints of the ceramics improved in terms of their physical interactions, chemical reactions and ability to bond or key chemically and mechanically with the ceramic surfaces. Thereby, the electrical

  7. On the Expressiveness of Joining

    Directory of Open Access Journals (Sweden)

    Thomas Given-Wilson

    2015-08-01

    Full Text Available The expressiveness of communication primitives has been explored in a common framework based on the pi-calculus by considering four features: synchronism (asynchronous vs synchronous, arity (monadic vs polyadic data, communication medium (shared dataspaces vs channel-based, and pattern-matching (binding to a name vs testing name equality vs intensionality. Here another dimension coordination is considered that accounts for the number of processes required for an interaction to occur. Coordination generalises binary languages such as pi-calculus to joining languages that combine inputs such as the Join Calculus and general rendezvous calculus. By means of possibility/impossibility of encodings, this paper shows coordination is unrelated to the other features. That is, joining languages are more expressive than binary languages, and no combination of the other features can encode a joining language into a binary language. Further, joining is not able to encode any of the other features unless they could be encoded otherwise.

  8. Database and applications security integrating information security and data management

    CERN Document Server

    Thuraisingham, Bhavani

    2005-01-01

    This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and emerging

  9. Generic multiset programming with discrimination-based joins and symbolic Cartesian products

    DEFF Research Database (Denmark)

    Henglein, Fritz; Larsen, Ken Friis

    2010-01-01

    This paper presents GMP, a library for generic, SQL-style programming with multisets. It generalizes the querying core of SQL in a number of ways: Multisets may contain elements of arbitrary first-order data types, including references (pointers), recur- sive data types and nested multisets......: symbolic (term) repre- sentations of multisets, specifically for Cartesian products, for facilitating dynamic symbolic computation, which intersperses algebraic simplification steps with conventional data pro- cessing; and discrimination-based joins, a generic technique for computing equijoins based...

  10. The Advantages and Disadvantages of Seeking Commonality in Military Equipment

    Science.gov (United States)

    2011-01-01

    RAND ReseARch AReAs Children and Families eduCation and the arts energy and environment health and health Care inFrastruCture and transportation... international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this...rand 2011 www.rand.org The Advantages and Disadvantages of Seeking Commonality in Military Equipment I ncreasingly, the Army and the Department

  11. Safeguards techniques and equipment. 2003 ed

    International Nuclear Information System (INIS)

    2003-01-01

    The 1990s saw significant non-proliferation related developments in the world, resulting in a new period of safeguards development. Over several years an assessment was made of how to strengthen the effectiveness and improve the efficiency of IAEA safeguards. In May 1997 this culminated in the adoption by the IAEA Board of Governors of a Protocol Additional to Safeguards Agreements which significantly broadens the role of IAEA safeguards. As a consequence, the IAEA safeguards system entered a new era. In 1997 the IAEA began to publish a new series of booklets on safeguards, called the International Nuclear Verification Series (NVS). The objective of these booklets was to help in explaining IAEA safeguards, especially the new developments in safeguards, particularly for facility operators and government officers involved with these topics. The current booklet, which is a revision and update of IAEA/NVS/1, is intended to give a full and balanced description of the techniques and equipment used for both nuclear material accountancy and containment and surveillance measures, and for the new safeguards measure of environmental sampling. A completely new section on data security has been added to describe the specific features that are included in installed equipment systems in order to ensure the authenticity and confidentiality of information. As new verification measures continue to be developed the material in this booklet will be periodically reviewed and updated versions issued. The basic verification measure used by the IAEA is nuclear material accountancy. In applying nuclear material accountancy, IAEA safeguards inspectors make independent measurements to verify quantitatively the amount of nuclear material presented in the State's accounts. For this purpose, inspectors count items (e.g. fuel assemblies, bundles or rods, or containers of powdered compounds of uranium or plutonium) and measure attributes of these items during their inspections using non

  12. International Nuclear Security Education Network (INSEN) and the Nuclear Security Training and Support Centre (NSSC) Network

    International Nuclear Information System (INIS)

    Nikonov, Dmitriy

    2013-01-01

    International Nuclear Security Education Network established in 2010: A partnership between the IAEA and universities, research institutions and other stakeholders - •Promotion of nuclear security education; • Development of educational materials; • Professional development for faculty members; • Collaborative research and resource sharing. Currently over 90 members from 38 member states. Mission: to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. Nuclear Security Support Centre: Primary objectives are: • Develop human resources through the implementation of a tailored training programme; • Develop a network of experts; • Provide technical support for lifecycle equipment management and scientific support for the detection of and the response to nuclear security events

  13. Mycobacterium tuberculosis and Mycobacterium marinum non-homologous end-joining proteins can function together to join DNA ends in Escherichia coli.

    Science.gov (United States)

    Wright, Douglas G; Castore, Reneau; Shi, Runhua; Mallick, Amrita; Ennis, Don G; Harrison, Lynn

    2017-03-01

    Mycobacterium tuberculosis and Mycobacterium smegmatis express a Ku protein and a DNA ligase D and are able to repair DNA double strand breaks (DSBs) by non-homologous end-joining (NHEJ). This pathway protects against DNA damage when bacteria are in stationary phase. Mycobacterium marinum is a member of this mycobacterium family and like M. tuberculosis is pathogenic. M. marinum lives in water, forms biofilms and infects fish and frogs. M. marinum is a biosafety level 2 (BSL2) organism as it can infect humans, although infections are limited to the skin. M. marinum is accepted as a model to study mycobacterial pathogenesis, as M. marinum and M. tuberculosis are genetically closely related and have similar mechanisms of survival and persistence inside macrophage. The aim of this study was to determine whether M. marinum could be used as a model to understand M. tuberculosis NHEJ repair. We identified and cloned the M. marinum genes encoding NHEJ proteins and generated E. coli strains that express the M. marinum Ku (Mm-Ku) and ligase D (Mm-Lig) individually or together (LHmKumLig strain) from expression vectors integrated at phage attachment sites in the genome. We demonstrated that Mm-Ku and Mm-Lig are both required to re-circularize Cla I-linearized plasmid DNA in E. coli. We compared repair of strain LHmKumLig with that of an E. coli strain (BWKuLig#2) expressing the M. tuberculosis Ku (Mt-Ku) and ligase D (Mt-Lig), and found that LHmKumLig performed 3.5 times more repair and repair was more accurate than BWKuLig#2. By expressing the Mm-Ku with the Mt-Lig, or the Mt-Ku with the Mm-Lig in E. coli, we have shown that the NHEJ proteins from M. marinum and M. tuberculosis can function together to join DNA DSBs. NHEJ repair is therefore conserved between the two species. Consequently, M. marinum is a good model to study NHEJ repair during mycobacterial pathogenesis. © The Author 2016. Published by Oxford University Press on behalf of the UK Environmental Mutagen

  14. Changing nature of equipment and parts qualification

    International Nuclear Information System (INIS)

    Bucci, R.M.

    1988-01-01

    Ideally, the original supplier of a piece of nuclear safety-related equipment has performed a qualification program and will continue to support that equipment throughout the lifetime of the nuclear power plants in which in equipment is installed. The supplier's nuclear quality assurance program will be maintained and he will continue to offer all necessary replacement parts. These parts will be identical to the original parts, certified to the original purchase order requirements, and the parts will be offered at competitive prices. Due to the changing nature of the nuclear plant equipment market, however, one or more of those ideal features are frequently unavailable when safety-related replacement equipment or parts are required. Thus, the process of equipment and parts qualification has had to adjust in order to ensure obtaining qualified replacements when needed. This paper presents some new directions taken in the qualification of replacement equipment and parts to meet changes in the marketplace

  15. Ethics and European security

    Energy Technology Data Exchange (ETDEWEB)

    Paskins, B.

    1986-01-01

    The alliance between the United States and her NATO partners has been strained severely in the last few years. American perceptions of European disloyalty and European impressions of American assertiveness and lack of judgment have played a large part in generating tensions between the allies and emphasising the new peace movements. This book is an attempt to develop a broader understanding of the problem of European security based on Christian ethics. There are disagreements and differences of emphasis among the contributors but they have in common the view that an exclusive preoccupation with the military dimension is damagingly one-sided. Instead the contributors argue that moral and theological concerns are a vital part of the politics and mechanics of European security and must be incorporated in any effort to devise new policies for security in Europe and the West.

  16. FMEA and FTA Analyses of the Adhesive Joining Process using Electrically Conductive Adhesives

    Directory of Open Access Journals (Sweden)

    E. Povolotskaya

    2012-01-01

    Full Text Available This paper introduces a formulation of appropriate risk estimation methods that can be used for improving of processes in the electronics area. Two risk assessment methods have been chosen with regard to the specifics of adhesive joining based on electrically conductive adhesives. The paper provides a combination of a failure mode and effect analysis (FMEA and fault tree analysis (FTA for optimizing of the joining process. Typical features and failures of the process are identified. Critical operations are found and actions for avoiding failures in these actions are proposed. A fault treehas been applied to the process in order to get more precise information about the steps and operations in the process, and the relations between these operations. The fault tree identifies potential failures of the process. Then the effects of the failures have been estimated by the failure mode and effect analysis method. All major differences between failure mode and effect analysis and fault tree analysis are defined and there is a discussion about how to use the two techniquescomplement each other and achieve more efficient results.

  17. Materials and joining technologies of commercial jet plane. Jet ryokyakuki ni okeru zairyo to setsugo

    Energy Technology Data Exchange (ETDEWEB)

    Hira, H; Yoshino, Y [Kawasaki Heavy Industries,Ltd., Tokyo (Japan)

    1993-12-05

    The present report explained light weight and high strength materials which are strong against the corrosion and fatigue, and economical. Also explained were their joining technologies for the commercial jet plane production. Resin composites are acceleratedly used as light weight and high strength materials. Fiber to be used is heightened in strength by replacing the glassfiber by the hybrid and carbon fiber. As measures against the drop in both strength around the drilled holes, and compressive strength due to the separation between layers and dehumidification, which drop is a defect generated in the composite, improving measures are taken such as enlargement of allowable strain by carbon fiber of a medium elastic modulus, use of resin base hardly degraded by the dehumidification and diffusion of high toughness resin. Metallic materials are also heightened in characteristics. For the joining technologies, measures are progressively taken against the strength damage around the drilled holes and electric corrosion by fasteners in the composite. Also for the tightening of metallic materials, the fatigue strength is designed to be heightened by the introduction of compressive residual stress. Both thermal degradation and stress in the hardening process must be taken into consideration for the structure use adhesives which are mainly of an epoxy system. The corrosion control is indispensable at the time of etching for the metallic adhesion. The welding was also explained. 16 refs., 7 figs., 2 tabs.

  18. Ageing management and equipment qualification

    International Nuclear Information System (INIS)

    Stahl, Gunnar

    2014-01-01

    The knowledge of how the environment and load of organic material in general and especially polymers and lubricants, is affecting the degradation of important properties, have increased during the last decade. However the restrictions using established additives like some color pigments due to their poisonousness e.g. pigments based at cadmium, lead, mercury etc. have caused problems when replacing additives to polymers. The replacement additives have often been used in new design without going through the required material qualification procedure. There have also been observed that some non-qualified and non-approved materials have been installed in some power plants due to false documentation. There are also a lot of new manufacturers, of materials similar to the previously qualified materials, active at the market. This increases the difficulty to ensure that the required material quality is used. New materials, new additives and new manufacturers makes if more and more difficult to assure that the expected material is present. This causes more strict demands of how the new materials often used in equipment at type-testing and in replacement materials are analyzed and documented. By implementing new steps for chemical, mechanical and electrical analysis and increase the general quality assurance content this issue can be managed. (authors)

  19. Materials division facilities and equipment

    International Nuclear Information System (INIS)

    Biest, O. v.d.

    1984-01-01

    The research activities of the Division at the Petten Establishment have the aims of characterising the properties of high temperature materials in industrial process environments and of understanding the structures involved in order to gain an insight into behavioural mechanisms. Metallic materials fall within the scope of the programme; the activities are, at present, almost entirely concerned with austenitic steels and nickel based alloys. Starting in 1984, advanced ceramic materials will be studied as well. The equipment available permits the study of mechanical properties in controlled gaseous environments, of the rates and mechanisms of corrosive reactions between materials and those environments, and of the surface and bulk structures by advanced physical techniques. Special preparation and treatment techniques are available. The Division has developed a Data Bank on high temperature alloys. It also operates an information Centre, the activities of which include the organisation of scientific meetings, the commissioning of ''state of the art'' studies on topics in the field of high temperature materials and their applications and the development of a inventory of current research activities in the field in Europe. This booklet is intended to present the facilities and services of the Division to the organizations which are interested in its programmes of work

  20. Effects of different brazing and welding methods on the fracture load of various orthodontic joining configurations.

    Science.gov (United States)

    Bock, Jens J; Bailly, Jacqueline; Fuhrmann, Robert A

    2009-06-01

    The aim of this study was to compare the fracture load of different joints made by conventional brazing, tungston inert gas (TIG) and laser welding. Six standardized joining configurations of spring hard quality orthodontic wire were investigated: end-to-end, round, cross, 3 mm length, 9 mm length and 6.5 mm to orthodontic band. The joints were made by five different methods: brazing with universal silver solder, two TIG and two laser welding devices. The fracture loads were measured with a universal testing machine (Zwick 005). Data were analysed with the Mann-Whitney-Wilcoxon and Kruskal-Wallis tests. The significance level was set at Pwelding (Pwelding (826 N). No differences between the various TIG or laser welding devices were demonstrated, although it was not possible to join an orthodontic wire to an orthodontic band using TIG welding. For orthodontic purposes laser and TIG welding are solder free alternatives. TIG welding and laser welding showed similar results. The laser technique is an expensive, but sophisticated and simple method.

  1. The Ku80 carboxy terminus stimulates joining and artemis-mediated processing of DNA ends

    DEFF Research Database (Denmark)

    Weterings, Eric; Verkaik, Nicole S; Keijzers, Guido

    2008-01-01

    Repair of DNA double-strand breaks (DSBs) is predominantly mediated by nonhomologous end joining (NHEJ) in mammalian cells. NHEJ requires binding of the Ku70-Ku80 heterodimer (Ku70/80) to the DNA ends and subsequent recruitment of the DNA-dependent protein kinase catalytic subunit (DNA-PK(CS)) an......Repair of DNA double-strand breaks (DSBs) is predominantly mediated by nonhomologous end joining (NHEJ) in mammalian cells. NHEJ requires binding of the Ku70-Ku80 heterodimer (Ku70/80) to the DNA ends and subsequent recruitment of the DNA-dependent protein kinase catalytic subunit (DNA......-PK(CS)) and the XRCC4/ligase IV complex. Activation of the DNA-PK(CS) serine/threonine kinase requires an interaction with Ku70/80 and is essential for NHEJ-mediated DSB repair. In contrast to previous models, we found that the carboxy terminus of Ku80 is not absolutely required for the recruitment and activation...... was phosphorylated to normal levels. This resulted in severely reduced levels of Artemis nuclease activity in vivo and in vitro. We therefore conclude that the Ku80 carboxy terminus is important to support DNA-PK(CS) autophosphorylation at specific sites, which facilitates DNA end processing by the Artemis...

  2. XRCC1 suppresses somatic hypermutation and promotes alternative nonhomologous end joining in Igh genes.

    Science.gov (United States)

    Saribasak, Huseyin; Maul, Robert W; Cao, Zheng; McClure, Rhonda L; Yang, William; McNeill, Daniel R; Wilson, David M; Gearhart, Patricia J

    2011-10-24

    Activation-induced deaminase (AID) deaminates cytosine to uracil in immunoglobulin genes. Uracils in DNA can be recognized by uracil DNA glycosylase and abasic endonuclease to produce single-strand breaks. The breaks are repaired either faithfully by DNA base excision repair (BER) or mutagenically to produce somatic hypermutation (SHM) and class switch recombination (CSR). To unravel the interplay between repair and mutagenesis, we decreased the level of x-ray cross-complementing 1 (XRCC1), a scaffold protein involved in BER. Mice heterozygous for XRCC1 showed a significant increase in the frequencies of SHM in Igh variable regions in Peyer's patch cells, and of double-strand breaks in the switch regions during CSR. Although the frequency of CSR was normal in Xrcc1(+/-) splenic B cells, the length of microhomology at the switch junctions decreased, suggesting that XRCC1 also participates in alternative nonhomologous end joining. Furthermore, Xrcc1(+/-) B cells had reduced Igh/c-myc translocations during CSR, supporting a role for XRCC1 in microhomology-mediated joining. Our results imply that AID-induced single-strand breaks in Igh variable and switch regions become substrates simultaneously for BER and mutagenesis pathways.

  3. Joining of AZ31 and AZ91 Mg alloys by friction stir welding

    Directory of Open Access Journals (Sweden)

    B. Ratna Sunil

    2015-12-01

    Full Text Available Two dissimilar magnesium (Mg alloy sheets, one with low aluminium (AZ31 and another with high aluminium (AZ91 content, were successfully joined by friction stir welding (FSW. The effect of process parameters on the formation of hot cracks was investigated. A sound metallurgical joint was obtained at optimized process parameters (1400 rpm with 25 mm/min feed which contained fine grains and distributed β (Mg17Al12 phase within the nugget zone. An increasing trend in the hardness measurements has also confirmed more amount of dissolution of aluminium within the nugget zone. A sharp interface between nugget zone and thermo mechanical affected zone (TMAZ was clearly noticed at the AZ31 Mg alloy side (advancing but not on the AZ91 Mg alloy side (retreating. From the results it can be concluded that FSW can be effectively used to join dissimilar metals, particularly difficult to process metals such as Mg alloys, and hot cracking can be completely eliminated by choosing appropriate process parameters to achieve sound joint.

  4. Joining psychiatric care and faith healing in a prayer camp in Ghana: randomised trial.

    Science.gov (United States)

    Ofori-Atta, A; Attafuah, J; Jack, H; Baning, F; Rosenheck, R

    2018-01-01

    Care of people with serious mental illness in prayer camps in low-income countries generates human rights concerns and ethical challenges for outcome researchers. Aims To ethically evaluate joining traditional faith healing with psychiatric care including medications (Clinical trials.gov identifier NCT02593734). Residents of a Ghana prayer camp were randomly assigned to receive either indicated medication for schizophrenia or mood disorders along with usual prayer camp activities (prayers, chain restraints and fasting) (n = 71); or the prayer camp activities alone (n = 68). Masked psychologists assessed Brief Psychiatric Rating Scale (BPRS) outcomes at 2, 4 and 6 weeks. Researchers discouraged use of chaining, but chaining decisions remained under the control of prayer camp staff. Total BPRS symptoms were significantly lower in the experimental group (P = 0.003, effect size -0.48). There was no significant difference in days in chains. Joining psychiatric and prayer camp care brought symptom benefits but, in the short-run, did not significantly reduce days spent in chains. Declaration of interest None.

  5. Fluid Mechanics and Homeland Security

    Science.gov (United States)

    Settles, Gary S.

    2006-01-01

    Homeland security involves many applications of fluid mechanics and offers many opportunities for research and development. This review explores a wide selection of fluids topics in counterterrorism and suggests future directions. Broad topics range from preparedness and deterrence of impending terrorist attacks to detection, response, and recovery. Specific topics include aircraft hardening, blast mitigation, sensors and sampling, explosive detection, microfluidics and labs-on-a-chip, chemical plume dispersal in urban settings, and building ventilation. Also discussed are vapor plumes and standoff detection, nonlethal weapons, airborne disease spread, personal protective equipment, and decontamination. Involvement in these applications requires fluid dynamicists to think across the traditional boundaries of the field and to work with related disciplines, especially chemistry, biology, aerosol science, and atmospheric science.

  6. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  7. Fermi and nuclear security

    International Nuclear Information System (INIS)

    Alcober Bosch, V.

    2003-01-01

    Following the scientific life of Fermi the article reviews the historical evolution of nuclear security from the base of the first system foreseen for the CP-1 critical pile, which made it possible to demonstrate self-sustaining fission reaction, until the mid-fifties by which time the subsequent importance of this concept was perceived. Technological advances have gone hand in hand with the development of the concept of security, and have become a further point to be taken into account in any nuclear installation, and which Fermi always kept in mind during his professional life. (Author) 12 refs

  8. Computer Security: Cryptography and authentication (2/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Remi Mollon studied computer security at University and he first worked on Grids, with the EGEE project, for a French Bioinformatics institute. Information security being crucial in that field, he developed an encrypted file management system on top of Grid middleware, and he contributed in integrating legacy applications with Grids. Then, he was hired by CERN as a Grid Data Management developer, and he joined the Grid Operational Security Coordination Team. Remi has now moved to CERN Computer Security Team. Remi is involved in the daily security operations, in addition to be responsible to design Team's computer infrastructure, and to participate to several projects, like multi-factor authentication at CERN. With the prevalence of modern information technologies and its increasing integration into our daily live, digital systems become more and more playground for evil people. While in the past, attacks were driven by fame& kudos, nowadays money is the motivating factor. Just the recent months have s...

  9. Oil and gas products and energy equipment

    International Nuclear Information System (INIS)

    1996-01-01

    The planned activities of the Canadian oil and gas products and energy equipment industry for 1996-1997, were presented. The sector is made up of approximately 1500 small and medium sized enterprises. The Canadian oil field manufacturing and servicing industry holds only a small 2.5% share of the world export market, but it is recognized internationally as one of the leading suppliers of advanced petroleum equipment. Their exports include specialized equipment for extracting oil sands, gathering and treatment facilities for sour gas, underbalanced drilling technologies, equipment for wells experiencing declining production rates, top motor drives, winter drilling rigs, and horizontal drilling technologies. They also offer petroleum industry software products. Most exploration and production equipment sold abroad by Canadian firms is manufactured in Canada, but there is an increasing trend toward manufacturing in the country of operation. 2 tabs

  10. Security and arms control

    International Nuclear Information System (INIS)

    Kolodziej, E.A.; Morgan, P.M.

    1989-01-01

    This book attempts to clarify and define selected current issues and problems related to security and arms control from an international perspective. The chapters are organized under the following headings. Conflict and the international system, Nuclear deterrence, Conventional warfare, Subconventional conflict, Arms control and crisis management

  11. WP EMPLACEMENT CONTROL AND COMMUNICATION EQUIPMENT DESCRIPTIONS

    International Nuclear Information System (INIS)

    Raczka, N.T.

    1997-01-01

    The objective and scope of this document are to list and briefly describe the major control and communication equipment necessary for waste package emplacement at the proposed nuclear waste repository at Yucca Mountain. Primary performance characteristics and some specialized design features of the required equipment are explained and summarized in the individual subsections of this document. This task was evaluated in accordance with QAP-2-0 and found not to be quality affecting. Therefore, this document was prepared in accordance with NAP-MG-012. The following control and communication equipment are addressed in this document: (1) Programmable Logic Controllers (PLC's); (2) Leaky Feeder Radio Frequency Communication Equipment; (3) Slotted Microwave guide Communication Equipment; (4) Vision Systems; (5) Radio Control Equipment; and (6) Enclosure Cooling Systems

  12. Information security foundations, technologies and applications

    CERN Document Server

    Awad, Ali Ismail; Fairhurst, Michael

    2018-01-01

    This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

  13. US8,994,532 "Data Center Equipment Location and Monitoring System"

    DEFF Research Database (Denmark)

    2014-01-01

    A data center equipment location system includes both hardware and software to provide for location, monitoring, security and identification of servers and other equipment in equipment racks. The system provides a wired alternative to the wireless RFID tag system by using electronic ID tags...... connected to each piece of equipment, each electronic ID tag connected directly by wires to a equipment rack controller on the equipment rack. The equipment rack controllers then link over a local area network to a central control computer. The central control computer provides an operator interface......, and runs a software application program that communicates with the equipment rack controllers. The software application program of the central control computer stores IDs of the equipment rack controllers and each of its connected electronic ID tags in a database. The software application program...

  14. 9 CFR 590.502 - Equipment and utensils; PCB-containing equipment.

    Science.gov (United States)

    2010-01-01

    ... Sanitary Standards and accepted practices currently in effect for such equipment. (c) New or replacement equipment or machinery (including any replacement parts) brought onto the premises of any official plant... equipment and machinery, and any replacement parts for such equipment and machinery. Totally enclosed...

  15. PROMSYS, Plant Equipment Maintenance and Inspection Scheduling

    International Nuclear Information System (INIS)

    Morgan, D.L.; Srite, B.E.

    1986-01-01

    1 - Description of problem or function: PROMSYS is a computer system designed to automate the scheduling of routine maintenance and inspection of plant equipment. This 'programmed maintenance' provides the detailed planning and accomplishment of lubrication, inspection, and similar repetitive maintenance activities which can be scheduled at specified predetermined intervals throughout the year. The equipment items included are the typical pumps, blowers, motors, compressors, automotive equipment, refrigeration units, filtering systems, machine shop equipment, cranes, elevators, motor-generator sets, and electrical switchgear found throughout industry, as well as cell ventilation, shielding, containment, and material handling equipment unique to nuclear research and development facilities. Four related programs are used to produce sorted schedule lists, delinquent work lists, and optional master lists. Five additional programs are used to create and maintain records of all scheduled and unscheduled maintenance history. 2 - Method of solution: Service specifications and frequency are established and stored. The computer program reviews schedules weekly and prints, on schedule cards, instructions for service that is due the following week. The basic output from the computer program comes in two forms: programmed-maintenance schedule cards and programmed-maintenance data sheets. The data sheets can be issued in numerical building, route, and location number sequence as equipment lists, grouped for work assigned to a particular foreman as the foreman's equipment list, or grouped by work charged to a particular work order as the work-order list. Data sheets grouped by equipment classification are called the equipment classification list

  16. Equipment Replacement Decision Making: Opportunities and Challenges

    OpenAIRE

    Fan, Wei (David); Gemar, Mason D.; Machemehl, Randy

    2012-01-01

    The primary function of equipment managers is to replace the right equipment at the right time and at the lowest overall cost. In this paper, the opportunities and challenges associated with equipment replacement optimization (ERO) are discussed in detail. First, a comprehensive review of the state-of-the art and state-of-the practice literature for the ERO problem is conducted. Second, a dynamic programming (DP) based optimization solution methodology is presented to solve the ERO problem. T...

  17. History and development of the tennis equipment

    OpenAIRE

    Horáková, Kateřina

    2007-01-01

    Title: History and development of the tennis equipment. Aim of the work: Process an integral, tabular and synoptic historical development overview of the tennis equipment. This owerview will cover the period since the early beginnings of the game to present days. Methods: Advance work has historical charakter therefore used methods are historiogaphical methods such as chronological method and historical method. Results: Produce tabular description of the tennis equipment by means of reading a...

  18. The IAEA Assistance and Training Programme for Transport Security

    Energy Technology Data Exchange (ETDEWEB)

    Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

    2010-01-01

    The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

  19. 24 CFR 232.525 - Note and security form.

    Science.gov (United States)

    2010-04-01

    ... URBAN DEVELOPMENT MORTGAGE AND LOAN INSURANCE PROGRAMS UNDER NATIONAL HOUSING ACT AND OTHER AUTHORITIES MORTGAGE INSURANCE FOR NURSING HOMES, INTERMEDIATE CARE FACILITIES, BOARD AND CARE HOMES, AND ASSISTED... Fire Safety Equipment Eligible Security Instruments § 232.525 Note and security form. The lender shall...

  20. Joining of aluminum and stainless steel using AlSi10 brazing filler: Microstructure and mechanical properties

    Science.gov (United States)

    Fedorov, Vasilii; Uhlig, Thomas; Wagner, Guntram

    2017-07-01

    Joining of dissimilar materials like stainless steel and aluminum is of special interest for automotive applications. Due to the different properties of these materials, suitable joining techniques are required. Brazing offers the possibilities to manufacture high performance joints in one step and at low joining temperatures. However, these joints often need to withstand a high number of high cyclic loads during application. Therefore, in addition to the monotonic properties, the fatigue behavior of the produced joints must be considered and evaluated. In the present work, specimens are manufactured by induction brazing using an AlSi10 filler and a non-corrosive flux. The mechanical properties are determined by tensile shear tests as well as in fatigue tests at ambient and elevated temperatures. The microstructure of the brazed joints and the fracture surfaces of the tested samples are investigated by SEM.

  1. Ceramic to metal joining by using 1064 nm pulsed and CW laser energy source

    International Nuclear Information System (INIS)

    Lee, Young Min; Kim, Soo Won; Choi, Hae Woon; Kim, Joo Han

    2013-01-01

    A novel joining method for ceramic and metallic layers is proposed using laser drilling and surface tension driven liquid metal filling. A high intensity laser beam irradiated a 500 µm thick ceramic filter, and the irradiated laser drilled the ceramic layer. The pulsed or CW laser transmitted through the ceramic layer irradiated the bottom metallic layer; the molten metallic layer then filled the drilled ceramic holes by the capillary force between the liquid metal and ceramic layer. As process variables, average laser power, pulse duration, and the number of pulses were used. The scattering optical properties were also studied for both green and red lasers. There was no significant difference between the colors and the estimated extinction coefficients were -26.94 1/mm and -28.42 1/mm for the green and red lasers, respectively.

  2. Enhancing project-oriented learning by joining communities of practice and opening spaces for relatedness

    Science.gov (United States)

    Pascual, R.

    2010-03-01

    This article describes an extension to project-oriented learning to increase social construction of knowledge and learning. The focus is on: (a) maximising opportunities for students to share their knowledge with practitioners by joining communities of practice, and (b) increasing their intrinsic motivation by creating conditions for student's relatedness. The case study considers a last year capstone course in Mechanical Engineering. The work addresses innovative practices of active learning and beyond project-oriented learning through: (a) the development of a web-based decision support system, (b) meetings between the communities of students, maintenance engineers and academics, and (c) new off-campus group instances. The author hypothesises that this multi-modal approach increases deep learning and social impact of the educational process. Surveys to the actors support a successful achievement of the educational goals. The methodology can easily be extended to further improve the learning process.

  3. FDI and labour market: empirical evidence from the states that joined the European Union in 2004

    Directory of Open Access Journals (Sweden)

    Laura DIACONU (MAXIM

    2017-10-01

    Full Text Available The purpose of our study is to analyse the impact of FDI on the labour markets of the states that joined the EU in 2004, before and after the EU accession and in the context of the global economic crisis. To achieve this objective, we have investigated the literature and carried out a pooled OLS regression estimation. The analysis shows that, until 2003, FDI neither enhanced the labour force participation rate, nor reduced the youth unemployment in the analysed states. After EU adhesion, FDI had only one significant positive effect, exerted on real labour productivity, and negative effects on employment and labour force participation rate. In the context of the crisis, FDI had beneficial effects on the unemployment, but to a lesser extent on the youth unemployment. FDI did not have any significant effect on annual net earnings in none of the three periods.

  4. Personal messages reduce vandalism and theft of unattended scientific equipment.

    Science.gov (United States)

    Clarin, B-Markus; Bitzilekis, Eleftherios; Siemers, Björn M; Goerlitz, Holger R

    2014-02-01

    Scientific equipment, such as animal traps and autonomous data collection systems, is regularly left in the field unattended, making it an easy target for vandalism or theft. We tested the effectiveness of three label types, which differed in their information content and tone of the message, that is, personal , neutral or threatening , for reducing incidents of vandalism and theft of unattended scientific field equipment. The three label types were attached to 20 scientific equipment dummies each, which were placed semi-hidden and evenly distributed in four public parks in Munich, Germany. While the label type had no effect on the severity of the interactions with our equipment dummies, the personal label reduced the overall number of interactions by c . 40-60%, compared with the dummies showing the neutral or threatening label type. We suggest that researchers, in addition to securing their field equipment, label it with personal and polite messages that inform about the ongoing research and directly appeal to the public not to disturb the equipment. Further studies should extend these results to areas with different socio-economic structure.

  5.  Optimizing relational algebra operations using discrimination-based joins and lazy products

    DEFF Research Database (Denmark)

    Henglein, Fritz

    We show how to implement in-memory execution of the core re- lational algebra operations of projection, selection and cross-product eciently, using discrimination-based joins and lazy products. We introduce the notion of (partitioning) discriminator, which par- titions a list of values according...... to a specied equivalence relation on keys the values are associated with. We show how discriminators can be dened generically, purely functionally, and eciently (worst-case linear time) on top of the array-based basic multiset discrimination algorithm of Cai and Paige (1995). Discriminators provide the basis...... the selection operation to recognize on the y whenever it is applied to a cross-product, in which case it can choose an ecient discrimination-based equijoin implementation. The techniques subsume most of the optimization techniques based on relational algebra equalities, without need for a query preprocessing...

  6. Weld-brazing - a new joining process. [combination resistance spot welding and brazing of titanium alloys

    Science.gov (United States)

    Bales, T. T.; Royster, D. M.; Arnold, W. E., Jr.

    1972-01-01

    A joining process designated weld brazing which combines resistance spot welding and brazing has been developed. Resistance spot welding is used to position and align the parts as well as to establish a suitable faying surface gap for brazing. Fabrication is then completed by capillary flow of the braze alloy into the joint. The process has been used successfully to fabricate Ti-6Al-4V titanium alloy joints using 3003 aluminum braze alloy. Test results obtained on single overlap and hat-stiffened structural specimens show that weld brazed joints are superior in tensile shear, stress rupture, fatigue, and buckling than joint fabricated by spotwelding or brazing. Another attractive feature of the process is that the brazed joints is hermetically sealed by the braze material.

  7. CHANGES IN THE SECURITY AGENDA: CRITICAL SECURITY STUDIES AND HUMAN SECURITY. THE CASE OF CHINA

    Directory of Open Access Journals (Sweden)

    Nguyen THI THUY HANG

    2012-06-01

    Full Text Available Since the end of the Cold War the meaning of security has fundamentally changed. Issues which are labeled as non-traditional security namely human development, economic crises, environmental degradation, natural disaster, poverty, epidemics… have become a crucial part of the security agenda. These changes have been intensified with the development of the two approaches: Critical Security Studies and Human Security. This article explores how the meaning of security has changed and how the boundaries between traditional and non-traditional security have become blurred. The case of China is taken as empirical evidence to support the assertion that security has evolved beyond its traditional focus on the state.

  8. Depositing Nickel-based Hardfacing to Join Carbon Steel and Cast Iron

    Directory of Open Access Journals (Sweden)

    Tomás Fernández-Columbié

    2016-10-01

    Full Text Available The objective of this investigation is to determine the micro-structural behavior of a joint between cast iron and carbon steel by depositing a nickel-based substrate in the carbon steel. The filler was added through Shielded Metal Arc Welding using Castec 3099 (UTP 8 electrodes while the base materials were joined through Gas Tungsten Arc Welding with ER 70S – A1 bare electrodes. The Schaeffler diagram was used to analyze the chemical composition of the resulting weld beads. The results of the analysis performed on the welded area and the heat influence zone indicated the formation of acicular structures near the welded line when Castec 3099 electrodes are used and the formation of skeletal ferrite on the heat influence zone during the application of this welding process. An austenitic mixture is formed when ER 70S – A1 electrodes are used.

  9. Introduction to Hardware Security

    Directory of Open Access Journals (Sweden)

    Yier Jin

    2015-10-01

    Full Text Available Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently joined in this area better understand the challenges and tasks within the hardware security domain and to help both academia and industry investigate countermeasures and solutions to solve hardware security problems, we will introduce the key concepts of hardware security as well as its relations to related research topics in this survey paper. Emerging hardware security topics will also be clearly depicted through which the future trend will be elaborated, making this survey paper a good reference for the continuing research efforts in this area.

  10. Concept project of joining segment, connecting two folding bridge structures MS-54 and widened DMS-65

    Directory of Open Access Journals (Sweden)

    Jan Marszałek

    2015-09-01

    Full Text Available The article includes the concept project of truss segment enabling the constructions of MS-54 and DMS-65 bridges to joint. At the beginning, the basic technical and exploitative characteristics of joined constructions are introduced. On the basis of this data, geometrical analysis of the component is carried out. As a result, the concept project of fitting, enabling the crossing from two types of foldable constructions to be built, is developed. Sequentially, the computer calculations of the bridge including the part of the designed fitting are carried out.The article contains the fragments of M.A. dissertation awarded by the rector of Military University of Technology as the best from the Faculty of Civil Engineering in 2014. The article is summarized with the conclusions.[b]Keywords[/b]: construction, folding bridges, truss segment

  11. THz and Security Applications

    CERN Document Server

    Sizov, Fedir; Detectors, Sources and Associated Electronics for THz Applications

    2014-01-01

    These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to  overcome current operational limits.  The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additi...

  12. Special Equipment and/or Devices.

    Science.gov (United States)

    National Sanitation Foundation, Ann Arbor, MI.

    This standard covers the sanitation requirements for equipment and/or devices used in the storage, preparation, or handling of foods and beverages. The National Sanitation Foundation's basic criteria for the evaluation of special equipment and/or devices has been prepared to fulfill several specific needs, its major function being to serve as a…

  13. Radio monitoring problems, methods, and equipment

    CERN Document Server

    Rembovsky, Anatoly; Kozmin, Vladimir; Smolskiy, Sergey

    2009-01-01

    Offers a unified approach to fundamental aspects of Automated Radio Monitoring (ARM). This book discusses the development, modeling, design, and manufacture of ARM systems. It provides classification and descriptions of modern high-efficient hardware-software ARM equipment, including the equipment for detection and radio direction-finding.

  14. Joining elements of silicon carbide

    International Nuclear Information System (INIS)

    Olson, B.A.

    1979-01-01

    A method of joining together at least two silicon carbide elements (e.g.in forming a heat exchanger) is described, comprising subjecting to sufficiently non-oxidizing atmosphere and sufficiently high temperature, material placed in space between the elements. The material consists of silicon carbide particles, carbon and/or a precursor of carbon, and silicon, such that it forms a joint joining together at least two silicon carbide elements. At least one of the elements may contain silicon. (author)

  15. Nuclear energy and security

    International Nuclear Information System (INIS)

    Blejwas, Thomas E.; Sanders, Thomas L.; Eagan, Robert J.; Baker, Arnold B.

    2000-01-01

    Nuclear power is an important and, the authors believe, essential component of a secure nuclear future. Although nuclear fuel cycles create materials that have some potential for use in nuclear weapons, with appropriate fuel cycles, nuclear power could reduce rather than increase real proliferation risk worldwide. Future fuel cycles could be designed to avoid plutonium production, generate minimal amounts of plutonium in proliferation-resistant amounts or configurations, and/or transparently and efficiently consume plutonium already created. Furthermore, a strong and viable US nuclear infrastructure, of which nuclear power is a large element, is essential if the US is to maintain a leadership or even participatory role in defining the global nuclear infrastructure and controlling the proliferation of nuclear weapons. By focusing on new fuel cycles and new reactor technologies, it is possible to advantageously burn and reduce nuclear materials that could be used for nuclear weapons rather than increase and/or dispose of these materials. Thus, the authors suggest that planners for a secure nuclear future use technology to design an ideal future. In this future, nuclear power creates large amounts of virtually atmospherically clean energy while significantly lowering the threat of proliferation through the thoughtful use, physical security, and agreed-upon transparency of nuclear materials. The authors must develop options for policy makers that bring them as close as practical to this ideal. Just as Atoms for Peace became the ideal for the first nuclear century, they see a potential nuclear future that contributes significantly to power for peace and prosperity

  16. Blind-date Conversation Joining

    Directory of Open Access Journals (Sweden)

    Luca Cesari

    2013-07-01

    Full Text Available We focus on a form of joining conversations among multiple parties in service-oriented applications where a client may asynchronously join an existing conversation without need to know in advance any information about it. More specifically, we show how the correlation mechanism provided by orchestration languages enables a form of conversation joining that is completely transparent to clients and that we call 'blind-date joining'. We provide an implementation of this strategy by using the standard orchestration language WS-BPEL. We then present its formal semantics by resorting to COWS, a process calculus specifically designed for modelling service-oriented applications. We illustrate our approach by means of a simple, but realistic, case study from the online games domain.

  17. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  18. Computer Security: Security operations at CERN (4/4)

    CERN Document Server

    CERN. Geneva

    2012-01-01

    Stefan Lueders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and infrastructure control systems against cyber-threats. Subsequently, he joined the CERN Computer Security Incident Response Team and is today heading this team as CERN's Computer Security Officer with the mandate to coordinate all aspects of CERN's computer security --- office computing security, computer centre security, GRID computing security and control system security --- whilst taking into account CERN's operational needs. Dr. Lueders has presented on these topics at many different occasions to international bodies, governments, and companies, and published several articles. With the prevalence of modern information technologies and...

  19. The Possibility of Central and Eastern European Countries' Joining the EMU: Prospects and Implications for Korea

    Directory of Open Access Journals (Sweden)

    Jeong-Cheol Han

    1999-03-01

    Full Text Available The old socialistic states of Middle and Eastern Europe is positively trying to accede to the EMU in order to enjoy the manifold rights of joining currency combination, not mention the political and diplomatic purposes. The EU brought forward the regulation of macro-economic reduction, system and law terms as the requirement of the entrance of those Middle and Eastern Europe countries. According to a survey, including Poland and Hungary, countries which took the lead in reforming agreed with EU on most of EU’ requirements about acceding to EMU. However, because of the domestic and foreign economic conditions, in the next 1 or 2years, none of the Middle and Eastern Europe countries could meet the requirement of reducing macro-economy. Whereas the degree of fulfillment of the economy reducing requirement and the factor that the Middle and Eastern Europe countries could accede to EU after 2003, it was predicted that those countries could accede to EMU only after 2005. With the coming on of EMU, the Middle and Eastern countries will accelerate the activity of currency combination. The South Korean government and enterprises also should intensify the prediction and precaution to the systems, policy change and other economic effects of these Middle and Eastern Europe countries.

  20. Emergency team personnel and technical equipment

    International Nuclear Information System (INIS)

    Muralt, R.

    1989-01-01

    The most important requirements for the emergency team can be summarized in three points. 1) The emergency team must be made up of top personnel from all fields and it should be functionally equiped. 2) The emergency teams must have complete command of their equipment. 3) The members of the team must be well motivated. 1 fig

  1. Kuwait: Governance, Security, and U.S. Policy

    Science.gov (United States)

    2016-09-29

    Gulf Cooperation Council (GCC: Saudi Arabia, Kuwait, UAE, Qatar, Bahrain, and Oman). In March 2011, Kuwait joined a GCC military intervention to...before the start of [2013]”—a statement that furthered Iraq’s argument that the U.N. Security Council should remove any remaining “Chapter 7” (of the...with alternative mechanisms, as discussed below. On December 15, 2010, the U.N. Security Council passed three resolutions—1956, 1957, and 1958—that

  2. Development of ion/proton beam equipment for industrial uses

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Byung Ho; Lee, J. H.; Cho, Y. S.; Joo, P. K.; Kang, S. S.; Song, W. S.; Kim, H. J.; Chang, G. H.; Bang, S. W

    1999-12-01

    KAERI has possessed design and fabrication technologies of various ion sources including Duoplasmatron and DuoPiGatron developed by R and D projects of the long-term nuclear technology development program. In order to industrialize ion beam equipments utilizing these ion sources, a technology transfer project for a technology transfer project for a domestic firm has been performed. Under this project, engineers of the firm have been trained through classroom lectures of ion beam principles and OJT, an ion/proton beam equipment (DEMO equipment) has been designed, assembled and commissioned jointly with the engineers. Quality of the ion sources has been quantified, and technologies for ion beam equipment construction, functional test and application research have been developed. The DEMO equipment, which consists of an ion source, power supplies, vacuum, cooling and target systems, has been fabricated and tested to secure stability and reliability for industrial uses. Various characteristic tests including high voltage insulation, beam extraction, beam current measuring, etc. have been performed. This DEMO can be utilized for ion sources development as well as ion beam process development for various industrial products. Engineers of the firm have been trained for the industrialization of ion beam equipment and joined in beam application technology development to create industrial needs of beam equipment. (author)

  3. Childhood exposure to violence and lifelong health: Clinical intervention science and stress biology research join forces

    Science.gov (United States)

    Moffitt, Terrie E.

    2013-01-01

    Many young people who are mistreated by an adult, victimized by bullies, criminally assaulted, or who witness domestic violence react to this violence exposure by developing behavioral, emotional, or learning problems. What is less well known is that adverse experiences like violence exposure can lead to hidden physical alterations inside a child’s body, alterations which may have adverse effects on life-long health. We discuss why this is important for the field of developmental psychopathology and for society, and we recommend that stress-biology research and intervention science join forces to tackle the problem. We examine the evidence base in relation to stress-sensitive measures for the body (inflammatory reactions, telomere erosion, epigenetic methylation, and gene expression) and brain (mental disorders, neuroimaging, and neuropsychological testing). We also review promising interventions for families, couples, and children that have been designed to reduce the effects of childhood violence exposure. We invite intervention scientists and stress-biology researchers to collaborate in adding stress-biology measures to randomized clinical trials of interventions intended to reduce effects of violence exposure and other traumas on young people. PMID:24342859

  4. Supporting non proliferation and global security efforts

    International Nuclear Information System (INIS)

    Pochon, E.

    2013-01-01

    CEA contributes as a major actor of France's action against nuclear proliferation and to the strengthening of nuclear security at national level as European and International levels, in particular through the support of the IAEA activities in nuclear non proliferation with the French Support Programme for the IAEA safeguards system and security with the contribution to the IAEA Nuclear Security Plan and cooperation projects with the European Commission. The CEA is a French government funded technological research organization, organized around 5 branches: Nuclear Energy, Technological Researches, Defence (DAM), Material Sciences and Life Sciences. Within the scope of its activities, CEA covers most of the research areas and techniques in nuclear non-proliferation and security. The CEA is also the advisor of the French Government on nuclear policy. Treaty monitoring and the development and implementation of non proliferation and global security programs is an important mission of DAM which rely on nuclear weapons manufacture and past testing experience. The programmes on non proliferation and global security carried out to fulfil DAM's mission cover the following areas: development of monitoring and detection methods and equipments, country profiles and nuclear stockpiles assessment, arms control instruments, proliferation resistance of nuclear fuel cycle, monitoring of nuclear tests, operation and maintenance of national detection capabilities and contribution to CTBT verification systems. (A.C.)

  5. Design of Helical Self-Piercing Rivet for Joining Aluminum Alloy and High-Strength Steel Sheets

    Energy Technology Data Exchange (ETDEWEB)

    Kim, W. Y.; Kim, D. B.; Park, J. G; Kim, D. H.; Kim, K. H.; Lee, I. H.; Cho, H. Y. [Chungbuk National University, Cheongju (Korea, Republic of)

    2014-07-15

    A self-piercing rivet (SPR) is a mechanical component for joining dissimilar material sheets such as those of aluminum alloy and steel. Unlike conventional rivets, the SPR directly pierces sheets without the need for drilling them beforehand. However, the regular SPR can undergo buckling when it pierces a high-strength steel sheet, warranting the design of a helical SPR. In this study, the joining and forging processes using the helical SPR were simulated using the commercial FEM code, DEFORM-3D. High-tensile-strength steel sheets of different strengths were joined with aluminum alloy sheets using the designed helical SPR. The simulation results were found to agree with the experimental results, validating the optimal design of a helical SPR that can pierce high-strength steel sheets.

  6. Design of Helical Self-Piercing Rivet for Joining Aluminum Alloy and High-Strength Steel Sheets

    International Nuclear Information System (INIS)

    Kim, W. Y.; Kim, D. B.; Park, J. G; Kim, D. H.; Kim, K. H.; Lee, I. H.; Cho, H. Y.

    2014-01-01

    A self-piercing rivet (SPR) is a mechanical component for joining dissimilar material sheets such as those of aluminum alloy and steel. Unlike conventional rivets, the SPR directly pierces sheets without the need for drilling them beforehand. However, the regular SPR can undergo buckling when it pierces a high-strength steel sheet, warranting the design of a helical SPR. In this study, the joining and forging processes using the helical SPR were simulated using the commercial FEM code, DEFORM-3D. High-tensile-strength steel sheets of different strengths were joined with aluminum alloy sheets using the designed helical SPR. The simulation results were found to agree with the experimental results, validating the optimal design of a helical SPR that can pierce high-strength steel sheets

  7. Secure computing, economy, and trust

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Damgård, Ivan B.; Jakobsen, Thomas

    In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems. In essence this paper is an o...

  8. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  9. Security Policy and Developments in Central Asia : Security Documents Compared with Security Challenges

    NARCIS (Netherlands)

    Haas, de M.

    2016-01-01

    This article examines the security policy of the Central Asian (CA) states, by comparing theory (security documents) with practice (the actual security challenges). The lack of CA regional (security) cooperation and authoritarian rule puts political and economic stability at stake. The internal and

  10. Detection and Repair of Ionizing Radiation-Induced DNA Double Strand Breaks: New Developments in Nonhomologous End Joining

    International Nuclear Information System (INIS)

    Wang, Chen; Lees-Miller, Susan P.

    2013-01-01

    DNA damage can occur as a result of endogenous metabolic reactions and replication stress or from exogenous sources such as radiation therapy and chemotherapy. DNA double strand breaks are the most cytotoxic form of DNA damage, and defects in their repair can result in genome instability, a hallmark of cancer. The major pathway for the repair of ionizing radiation-induced DSBs in human cells is nonhomologous end joining. Here we review recent advances on the mechanism of nonhomologous end joining, as well as new findings on its component proteins and regulation

  11. Detection and Repair of Ionizing Radiation-Induced DNA Double Strand Breaks: New Developments in Nonhomologous End Joining

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Chen [Departments of Biochemistry and Molecular Biology and Oncology, and Southern Alberta Cancer Research Institute, University of Calgary, Calgary (Canada); Lees-Miller, Susan P., E-mail: leesmill@ucalgary.ca [Departments of Biochemistry and Molecular Biology and Oncology, and Southern Alberta Cancer Research Institute, University of Calgary, Calgary (Canada)

    2013-07-01

    DNA damage can occur as a result of endogenous metabolic reactions and replication stress or from exogenous sources such as radiation therapy and chemotherapy. DNA double strand breaks are the most cytotoxic form of DNA damage, and defects in their repair can result in genome instability, a hallmark of cancer. The major pathway for the repair of ionizing radiation-induced DSBs in human cells is nonhomologous end joining. Here we review recent advances on the mechanism of nonhomologous end joining, as well as new findings on its component proteins and regulation.

  12. Processing of pro-opiomelanocortin-derived amidated joining peptide and glycine-extended precursor in monkey pituitary

    DEFF Research Database (Denmark)

    Fenger, M

    1991-01-01

    The molecular forms of proopiomelanocortin (POMC) derived amidated and C-terminal glycine-extended joining peptide from monkey (Macaca mulatta) pituitary were determined. The predominant forms of joining peptide found were the low molecular peptides POMC(76-105) and POMC(76-106), respectively...... sequence of monkey and human POMC extremely conserved, but also the processing patterns are similar. The monkey therefore serves as a suitable model for studying regulation of the processing of POMC and the hypothalamus-pituitary-adrenal axis in man....

  13. Combustion Joining of Regolith Tiles for In-Situ Fabrication of Launch/Landing Pads on the Moon and Mars

    Science.gov (United States)

    Ferguson, Robert E.; Shafirovich, Evgeny; Mantovani, James G.

    2017-01-01

    To mitigate dust problems during launch/landing operations in lunar and Mars missions, it is desired to build solid pads on the surface. Recently, strong tiles have been fabricated from lunar regolith simulants using high-temperature sintering. The present work investigates combustion joining of these tiles through the use of exothermic intermetallic reactions. Specifically, nickel/aluminum (1:1 mole ratio) mixture was placed in a gap between the tiles sintered from JSC-1A lunar regolith simulant. Upon ignition by a laser, a self-sustained propagation of the combustion front over the mixture occurred. Joining was improved with increasing the tile thickness from 6.3 mm to 12.7 mm. The temperatures sufficient for melting the glass phase of JSC-1A were recorded for 12.7-mm tiles, which explains the observed better joining.

  14. Analytical and Experimental Evaluation of Joining Silicon Carbide to Silicon Carbide and Silicon Nitride to Silicon Nitride for Advanced Heat Engine Applications Phase II

    Energy Technology Data Exchange (ETDEWEB)

    Sundberg, G.J.

    1994-01-01

    Techniques were developed to produce reliable silicon nitride to silicon nitride (NCX-5101) curved joins which were used to manufacture spin test specimens as a proof of concept to simulate parts such as a simple rotor. Specimens were machined from the curved joins to measure the following properties of the join interlayer: tensile strength, shear strength, 22 C flexure strength and 1370 C flexure strength. In parallel, extensive silicon nitride tensile creep evaluation of planar butt joins provided a sufficient data base to develop models with accurate predictive capability for different geometries. Analytical models applied satisfactorily to the silicon nitride joins were Norton's Law for creep strain, a modified Norton's Law internal variable model and the Monkman-Grant relationship for failure modeling. The Theta Projection method was less successful. Attempts were also made to develop planar butt joins of siliconized silicon carbide (NT230).

  15. The Effect of Temperature and Rotational Speed on Structure and Mechanical Properties of Cast Cu Base Alloy (Cu-Al-Si-Fe) Welded by Semisolid Stir Joining Method

    Science.gov (United States)

    Ferasat, Keyvan; Aashuri, Hossein; Kokabi, Amir Hossein; Shafizadeh, Mahdi; Nikzad, Siamak

    2015-12-01

    Semisolid stir joining has been under deliberation as a possible method for joining of copper alloys. In this study, the effect of temperature and rotational speed of stirrer on macrostructure evaluation and mechanical properties of samples were investigated. Optical microscopy and X-ray diffraction were performed for macro and microstructural analysis. A uniform micro-hardness profile was attained by semisolid stir joining method. The ultimate shear strength and bending strength of welded samples were improved in comparison with the cast sample. There is also lower area porosity in welded samples than the cast metal. The mechanical properties were improved by increasing temperature and rotational speed of the joining process.

  16. Transport of bundles and equipment which contain radioactive material

    International Nuclear Information System (INIS)

    1987-01-01

    This norm settles down: 1) The requirements that should be completed in relation to safety precautions and protection against ionizing radiations during the transport radioactive material and/or equipment containing it, in order to avoid risks to the collective and the environment. 2) The basic information on procedures that will be completed in the event of happening accidents during the transport or the transit storage of radioactive material and/or equipment that contain it. 3) The measures of security and physical protection during the transport of radioactive material and/or equipment containing it. This norm is applied: 1) To all the ways of transport (by air, by ground and by ship, fluvial and marine) of radioactive material and/or equipment that contain it. 2) To all natural or legal, public or private person, devoted to install, produce, trade, market, import or export radioactive materials and/or equipment containing it, and that needs to transport them as main or secondary activity [es

  17. Data and Communication Security

    Directory of Open Access Journals (Sweden)

    Sadeq ALHAMOUZ

    2007-02-01

    Full Text Available The regional initiative was presented by the United Nations Economic and Social Commission for Western Asia in preparation for the world summit, Dec 2003. The Initiative by itself and away from regional trouble and differences between both the Arab countries and other countries in the regions is a good and noble Initiative. However with such differences and lack of trust the security issue should be the first issue tackled and resolved. In this paper it is aimed to look at present tools and techniques available, and then suggest alternatives when possible.

  18. Why Children Join and Stay in Sports Clubs: Case Studies in Australian, French and German Swimming Clubs

    Science.gov (United States)

    Light, Richard L.; Harvey, Stephen; Memmert, Daniel

    2013-01-01

    This article builds upon research on youth sport clubs conducted from a socio-cultural perspective by reporting on a study that inquired into the reasons why children aged 9-12 joined swimming clubs in France, Germany and Australia. Comprising three case studies it employed a mixed method approach with results considered within the framework of…

  19. PCI DSS: Security Standard and Security in Fact

    Directory of Open Access Journals (Sweden)

    M. V. Kuzin

    2011-12-01

    Full Text Available The article focuses on Payment Card Industry Data Security Standard (PCI DSS requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  20. PCI DSS: Security Standard and Security in Fact

    OpenAIRE

    M. V. Kuzin

    2011-01-01

    The article focuses on Payment Card Industry Data Security Standard (PCI DSS) requirements and practices, especially it’s issues and disadvantages to achieve the main goal — security of payment cards infrastructure.

  1. Macrosecuritization and Security Constellations

    DEFF Research Database (Denmark)

    Buzan, Barry; Wæver, Ole

    2009-01-01

    the middle and system levels, and asks whether there is not more of substance there than the existing Copenhagen school analyses suggests. It revisits the under-discussed concept of security constellations in Copenhagen school theory, and adds to it the idea of macrosecuritizations as ways of getting...... active both because of the facility with which collective political units can construct each other as threats, and the difficulty of finding audiences for the kinds of securitizations and referent objects that are available at the individual and system levels. This paper focuses on the gap between...

  2. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  3. Information security principles and practice

    CERN Document Server

    Stamp, Mark

    2011-01-01

    Now updated-your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a pract

  4. The Extended Concept of Security and the Czech Security Practice

    OpenAIRE

    Libor Stejskal; Antonín Rašek; Miloš Balabán

    2008-01-01

    According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-govern...

  5. Water System Security and Resilience in Homeland Security Research

    Science.gov (United States)

    EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.

  6. The intelligence-security services and national security

    OpenAIRE

    Mijalković, Saša

    2011-01-01

    Since their inception, states have been trying to protect their vital interests and values more effectively, in which they are often impeded by other countries. At the same time, they seek to protect the internal order and security against the so-called internal enemy. Therefore, the states organize (national) security systems within their (state) systems, in which they form some specialized security entities. Among them, however, intelligence and security services are the ones that stand out...

  7. Equipment for x- and gamma ray radiography

    International Nuclear Information System (INIS)

    Abd Nasir Ibrahim; Azali Muhammad; Ab Razak Hamzah; Abd Aziz Mohamed; Mohammad Pauzi Ismail

    2004-01-01

    The following topics related to the equipment for x - and gamma ray radiography are discussed in this chapter. The topics are x-ray source for Industrial Radiography: properties of x-ray, generation of x-ray, mechanism of x-ray production, x-ray equipment, power supply, distribution of x-ray intensity along the tube: gamma ray source for Industrial Radiography: properties of gamma rays, gamma ray sources, gamma ray projectors on cameras, source changing. Care of Radiographic Equipments: Merits and Demerits of x and Gamma Rays

  8. Maintenance and fabrication of nuclear electronic equipment

    International Nuclear Information System (INIS)

    Hong, Seok Boong; Chung, Chong Eun; Hwang, In Koo; Koo, In Soo; Park, Bum; Kim, Soo Hee; Lee, Seong Joo; Kim, Min Seok; Choi, Wha Lim

    2011-12-01

    - process equipment at PIEF, Chemical Analysis Team and RWFTF have been calibrated. - The electronic equipment and radiation equipment at RWTF and PIEF have been prepared. - Development and installation of integrated RMS software for Hanaro Cold Neutron Laboratory Building(CNLB) RMS, and development and performance upgrade of a portal monitor for CNLB. - Performance test of the Hardware/Software of digital unit controller has been performed, and functional upgrade of the Hardware/Software of stimulator for SMART MMIS performance test facility has also been performed. - A controller of high voltage power supply for a small electron beam generator and a controller for razer pinning and a remote monitoring apparatus of cathode power supply for a 0.2 Mev. small electron beam generator have been designed and fabricated. - Database construction for effective maintenance for the process equipment and radiation instruments are designed and constructed

  9. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  10. Manufacture and maintenance of laboratory equipment

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, Chang Kyu; Hwang, Bong Ha; Lee, Jong Wha; Kim, Jong Kyun; Yeum, Ki Eon; Park, Myung Ku; Hong, Soon Eon; Choi, Ho Young; An, Dae Kyu; An, Choon; Park, In Won; Kim, Kyung Sik; Lee, Won Jae; Yoon, Ki Byung; Kim, Heung Woo; Lee, In Bae; Yeom, Jeong Hyun; Lee, Chul Ku; Sin, Keon Ju; Oh, Wan Ho; Seo, Yong Chil; Yang, Song Yeul; Lee, Young Soon; Choi, Byung Kwon; Chang, Kyung Duk [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1993-12-01

    This report on the manufacture and maintenance of laboratory equipment contains working contents, scope and contents of request working to the machine shop, also records the principal production design, manufacture contents and a relevant working drawing. The working content and scope of the machine shop is to support the successful and convenient performance of the R and D by manufacture and maintenance of all sorts of laboratory equipment. 11 tabs., 3 figs. (Author) .new.

  11. Manufacture and maintenance of laboratory equipment

    International Nuclear Information System (INIS)

    Hwang, Chang Kyu; Hwang, Bong Ha; Lee, Jong Wha; Kim, Jong Kyun; Yeum, Ki Eon; Park, Myung Ku; Hong, Soon Eon; Choi, Ho Young; An, Dae Kyu; An, Choon; Park, In Won; Kim, Kyung Sik; Lee, Won Jae; Yoon, Ki Byung; Kim, Heung Woo; Lee, In Bae; Yeom, Jeong Hyun; Lee, Chul Ku; Sin, Keon Ju; Oh, Wan Ho; Seo, Yong Chil; Yang, Song Yeul; Lee, Young Soon; Choi, Byung Kwon; Chang, Kyung Duk

    1993-12-01

    This report on the manufacture and maintenance of laboratory equipment contains working contents, scope and contents of request working to the machine shop, also records the principal production design, manufacture contents and a relevant working drawing. The working content and scope of the machine shop is to support the successful and convenient performance of the R and D by manufacture and maintenance of all sorts of laboratory equipment. 11 tabs., 3 figs. (Author) .new

  12. Manufacture and maintenance of laboratory equipment

    International Nuclear Information System (INIS)

    Kim, Jong Kyun; Hwang, Chang Kyu; Hwang, Bong Ha; Lee, Jong Wha; Yeom, Ki Eon; Park, Myung Ku; Hong, Soon Hyeon; Choi, Ho Young; An, Dae Kyu; An, Choon; Park, In Won; Kim, Kyeong Sik; Lee, In Bae; Yeom, Jeong Heon; Lee, Chul Ku; Sin, Keon Ju; Oh, Wan Ho; Choi, Byung Kwon; Chang, Kyeong Duk; Lee, Young Soon

    1995-12-01

    This report on the manufacture and maintenance of laboratory equipment contains working contents, scope and contents of a request working to the Machine Shop, also records the principal production design, manufacture contents and a relevant working drawing. The working content and scope of the Machine Shop is to support the successful and convenient performance of the Research and development by manufacture and maintenance of all sorts of laboratory equipment. 12 tabs., 5 figs. (Author) .new

  13. Manufacture and maintenance of laboratory equipment

    International Nuclear Information System (INIS)

    Kim, J. K.; Whang, C. K.; Lee, J. H.; Youm, K. Y.; Hong, S. H.; Choi, H. Y.; An, C.; Park, I. W.; Kim, K. S.; Lee, W. J.; Yoon, K. B.; Kim, H. W.; Lee, I. B.; Lee, C. K.; Youm, J. H.; Oho, W. H.; Choi, B. K.; Jang, K. D.

    1996-12-01

    This report on the manufacture and maintenance of laboratory equipment contains working contents, scope and contents of a request working to the Machine Shop, also records the principal production design, manufacture contents and a relevant working drawing. The working content and scope of the Machine Shop is to support the successful and convenient performance of the R and D by manufacture and maintenance of all sorts of laboratory equipment. (author). 9 tabs., 12 figs

  14. Manufacture and maintenance of laboratory equipment

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jong Kyun; Hwang, Chang Kyu; Hwang, Bong Ha; Lee, Jong Wha; Yeom, Ki Eon; Park, Myung Ku; Hong, Soon Hyeon; Choi, Ho Young; An, Dae Kyu; An, Choon; Park, In Won; Kim, Kyeong Sik; Lee, In Bae; Yeom, Jeong Heon; Lee, Chul Ku; Sin, Keon Ju; Oh, Wan Ho; Choi, Byung Kwon; Chang, Kyeong Duk; Lee, Young Soon [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-12-01

    This report on the manufacture and maintenance of laboratory equipment contains working contents, scope and contents of a request working to the Machine Shop, also records the principal production design, manufacture contents and a relevant working drawing. The working content and scope of the Machine Shop is to support the successful and convenient performance of the Research and development by manufacture and maintenance of all sorts of laboratory equipment. 12 tabs., 5 figs. (Author) .new.

  15. Parallel trajectory similarity joins in spatial networks

    KAUST Repository

    Shang, Shuo

    2018-04-04

    The matching of similar pairs of objects, called similarity join, is fundamental functionality in data management. We consider two cases of trajectory similarity joins (TS-Joins), including a threshold-based join (Tb-TS-Join) and a top-k TS-Join (k-TS-Join), where the objects are trajectories of vehicles moving in road networks. Given two sets of trajectories and a threshold θ, the Tb-TS-Join returns all pairs of trajectories from the two sets with similarity above θ. In contrast, the k-TS-Join does not take a threshold as a parameter, and it returns the top-k most similar trajectory pairs from the two sets. The TS-Joins target diverse applications such as trajectory near-duplicate detection, data cleaning, ridesharing recommendation, and traffic congestion prediction. With these applications in mind, we provide purposeful definitions of similarity. To enable efficient processing of the TS-Joins on large sets of trajectories, we develop search space pruning techniques and enable use of the parallel processing capabilities of modern processors. Specifically, we present a two-phase divide-and-conquer search framework that lays the foundation for the algorithms for the Tb-TS-Join and the k-TS-Join that rely on different pruning techniques to achieve efficiency. For each trajectory, the algorithms first find similar trajectories. Then they merge the results to obtain the final result. The algorithms for the two joins exploit different upper and lower bounds on the spatiotemporal trajectory similarity and different heuristic scheduling strategies for search space pruning. Their per-trajectory searches are independent of each other and can be performed in parallel, and the mergings have constant cost. An empirical study with real data offers insight in the performance of the algorithms and demonstrates that they are capable of outperforming well-designed baseline algorithms by an order of magnitude.

  16. Parallel trajectory similarity joins in spatial networks

    KAUST Repository

    Shang, Shuo; Chen, Lisi; Wei, Zhewei; Jensen, Christian S.; Zheng, Kai; Kalnis, Panos

    2018-01-01

    The matching of similar pairs of objects, called similarity join, is fundamental functionality in data management. We consider two cases of trajectory similarity joins (TS-Joins), including a threshold-based join (Tb-TS-Join) and a top-k TS-Join (k-TS-Join), where the objects are trajectories of vehicles moving in road networks. Given two sets of trajectories and a threshold θ, the Tb-TS-Join returns all pairs of trajectories from the two sets with similarity above θ. In contrast, the k-TS-Join does not take a threshold as a parameter, and it returns the top-k most similar trajectory pairs from the two sets. The TS-Joins target diverse applications such as trajectory near-duplicate detection, data cleaning, ridesharing recommendation, and traffic congestion prediction. With these applications in mind, we provide purposeful definitions of similarity. To enable efficient processing of the TS-Joins on large sets of trajectories, we develop search space pruning techniques and enable use of the parallel processing capabilities of modern processors. Specifically, we present a two-phase divide-and-conquer search framework that lays the foundation for the algorithms for the Tb-TS-Join and the k-TS-Join that rely on different pruning techniques to achieve efficiency. For each trajectory, the algorithms first find similar trajectories. Then they merge the results to obtain the final result. The algorithms for the two joins exploit different upper and lower bounds on the spatiotemporal trajectory similarity and different heuristic scheduling strategies for search space pruning. Their per-trajectory searches are independent of each other and can be performed in parallel, and the mergings have constant cost. An empirical study with real data offers insight in the performance of the algorithms and demonstrates that they are capable of outperforming well-designed baseline algorithms by an order of magnitude.

  17. Solder free joining as a highly effective method for making contact between thermoelectric materials and metallic electrodes

    DEFF Research Database (Denmark)

    Malik, Safdar Abbas; Le, Thanh Hung; Van Nong, Ngo

    2017-01-01

    /react with both Ag and Ni electrodes, and penetrate into ZnSb legs. SEM-EDX analysis recorded a significant excess of Zn in the ZnSb leg after joining. We found that, using microlayers of Ti and Cr as interconnecting agent, a very good interfacial contact was obtained, and the starting composition of ZnSb legs...

  18. Health Security and Risk Aversion.

    Science.gov (United States)

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  19. Sorting cancer karyotypes using double-cut-and-joins, duplications and deletions.

    Science.gov (United States)

    Zeira, Ron; Shamir, Ron

    2018-05-03

    Problems of genome rearrangement are central in both evolution and cancer research. Most genome rearrangement models assume that the genome contains a single copy of each gene and the only changes in the genome are structural, i.e., reordering of segments. In contrast, tumor genomes also undergo numerical changes such as deletions and duplications, and thus the number of copies of genes varies. Dealing with unequal gene content is a very challenging task, addressed by few algorithms to date. More realistic models are needed to help trace genome evolution during tumorigenesis. Here we present a model for the evolution of genomes with multiple gene copies using the operation types double-cut-and-joins, duplications and deletions. The events supported by the model are reversals, translocations, tandem duplications, segmental deletions, and chromosomal amplifications and deletions, covering most types of structural and numerical changes observed in tumor samples. Our goal is to find a series of operations of minimum length that transform one karyotype into the other. We show that the problem is NP-hard and give an integer linear programming formulation that solves the problem exactly under some mild assumptions. We test our method on simulated genomes and on ovarian cancer genomes. Our study advances the state of the art in two ways: It allows a broader set of operations than extant models, thus being more realistic, and it is the first study attempting to reconstruct the full sequence of structural and numerical events during cancer evolution. Code and data are available in https://github.com/Shamir-Lab/Sorting-Cancer-Karyotypes. ronzeira@post.tau.ac.il, rshamir@tau.ac.il. Supplementary data are available at Bioinformatics online.

  20. Joined-up Planetary Information, in the Cloud and on Devices.

    Science.gov (United States)

    Smith, M. J.; Emmott, S.; Purves, D. W.; Joppa, L. N.; Lyutsarev, V.

    2014-12-01

    In scientific research and development, emphasis is placed on research over development. A significant cost is that the two-way interaction between scientific insights and societal needs does not function effectively to lead to impacts in the wider world. We simply must embrace new software and hardware approaches if we are to provide timely predictive information to address global problems, support businesses and inform governments and citizens. The Microsoft Research Computational Science Lab has been pioneering research into software and methodologies to provide useful and usable new environmental information. Our approach has been very joined-up: from accellerating data acquisition from the field with remote sensor technology, targetted data collection and citizen science, to enabling proces based modelling-using multiple heterogeneous data-sets in the cloud and enabling the resulting planetary information to be accessed from any device. This talk will demonstrate some of the specific research and development we are doing to accerate the pace in which important science has impact on the wider world and will emphasise the important insights gained from advancing the research and develoment together.

  1. Radiation therapy sources, equipment and installations

    International Nuclear Information System (INIS)

    2011-03-01

    The safety code for Telegamma Therapy Equipment and Installations, (AERB/SC/MED-1) and safety code for Brachytherapy Sources, Equipment and Installations, (AERB/SC/MED-3) were issued by AERB in 1986 and 1988 respectively. These codes specified mandatory requirements for radiation therapy facilities, covering the entire spectrum of operations ranging from the setting up of a facility to its ultimate decommissioning, including procedures to be followed during emergency situations. The codes also stipulated requirements of personnel and their responsibilities. With the advent of new techniques and equipment such as 3D-conformal radiation therapy, intensity modulated radiation therapy, image guided radiation therapy, treatment planning system, stereotactic radiosurgery, stereotactic radiotherapy, portal imaging, integrated brachytherapy and endovascular brachytherapy during the last two decades, AERB desires that these codes be revised and merged into a single code titled Radiation Therapy Sources, Equipment, and Installations

  2. The mining industry and the community: Joining forces for sustainable social development

    International Nuclear Information System (INIS)

    Labonne, B.

    1999-01-01

    This article joins the continuing policy debate over the social responsibility of corporations, particularly in the mining industry. The author argues that the 'old school mining orthodoxy' - approaching the exploitation of mineral deposits solely from the technical and economic points of view-is long dead. Mining companies must also encompass the social dimension. New policies for the mining industry are discussed in terms of recent worldwide trends and movements, e.g. globalization, economic interdependence and decentralization of governmental authority, and the rise of civil society as a political factor. These trends, together with the United Nations policies in quest of sustainable development and the consensus expressed at international conferences during the last decade, have deepened social awareness and set the stage for enhanced social responsiveness from the private sector. Socially responsible corporate policies include decentralization of decision-making to the field level, reaching out to stake holders and shareholders, supporting governments which provide official development assistance for good governance and building broad partnerships to reduce social exposures. (author)

  3. Development of remote handling tools and equipment

    International Nuclear Information System (INIS)

    Nakahira, Masataka; Oka, Kiyoshi; Taguchi, Kou; Ito, Akira; Fukatsu, Seiichi; Oda, Yasushi; Kajiura, Soji; Yamazaki, Seiichiro; Aoyama, Kazuo.

    1997-01-01

    The remote handling (RH) tools and equipment development in ITER focuses mainly on the welding and cutting technique, weld inspection and double-seal door which are essential factors in the replacement of in-vessel components such as divertor and blanket. The conceptual design of these RH tools and equipment has been defined through ITER engineering design activity (EDA). Similarly, elementary R and D of the RH tools and equipment have been extensively performed to accumulate a technological data base for process and performance qualification. Based on this data, fabrications of full-scale RH tools and equipment are under progress. A prototypical bore tool for pipe welding and cutting has already been fabricated and is currently undergoing integrated performance tests. This paper describes the design outline of the RH tools and equipment related to in-vessel components maintenance, and highlights the current status of RH tools and equipment development by the Japan Home Team as an ITER R and D program. This paper also includes an outline of insulation joint and quick-pipe connector development, which has also been conducted through the ITER R and D program in order to standardize RH operations and components. (author)

  4. Bibliography of the technical literature of the Materials Joining Group, Metals and Ceramics Division, 1951 through June 1987

    International Nuclear Information System (INIS)

    David, S.A.; Goodwin, G.M.; Gardner, K.

    1987-08-01

    This document contains a listing of the written scientific information originating in the Materials Joining Group (formerly the Welding and Brazing Group), Metals and Ceramics Division, Oak Ridge National Laboratory during 1951 through June 1987. It is a registry of about 400 documents as nearly as possible in the order in which they were issued

  5. Fork-join and data-driven execution models on multi-core architectures: Case study of the FMM

    KAUST Repository

    Amer, Abdelhalim; Maruyama, Naoya; Pericà s, Miquel; Taura, Kenjiro; Yokota, Rio; Matsuoka, Satoshi

    2013-01-01

    Extracting maximum performance of multi-core architectures is a difficult task primarily due to bandwidth limitations of the memory subsystem and its complex hierarchy. In this work, we study the implications of fork-join and data-driven execution

  6. Interfacial Reaction During Dissimilar Joining of Aluminum Alloy to Magnesium and Titanium Alloys

    Science.gov (United States)

    Robson, J. D.; Panteli, A.; Zhang, C. Q.; Baptiste, D.; Cai, E.; Prangnell, P. B.

    Ultrasonic welding (USW), a solid state joining process, has been used to produce welds between AA6111 aluminum alloy and AZ31 magnesium alloys or titanium alloy Ti-6Al-4V. The mechanical properties of the welds have been assessed and it has been shown that it is the nature and thickness of the intermetallic compounds (IMCs) at the joint line that are critical in determining joint strength and particularly fracture energy. Al-Mg welds suffer from a very low fracture energy, even when strength is comparable with that of similar metal Mg-Mg welds, due to a thick IMC layer always being formed. It is demonstrated that in USW of Al-Ti alloy the slow interdiffusion kinetics means that an IMC layer does not form during welding, and fracture energy is greater. A model has been developed to predict IMC formation during welding and provide an understanding of the critical factors that determine the IMC thickness. It is predicted that in Al-Mg welds, most of the lMC thickening occurs whilst the IMC regions grow as separate islands, prior to the formation of a continuous layer.

  7. Ajinomoto joins GO and NGO in promoting RH / nutrition in the Philippines.

    Science.gov (United States)

    2000-01-01

    The Integrated Project (IP) on Reproductive Health/Nutrition (RH/N) in Batangas Province in the Philippines was launched on December 2, 1999. This project is a new form of collaboration, joining government agencies, nongovernmental organizations, and corporate forces to promote a RH/N project in six municipalities in Batangas. The Ajinomoto Company, one of the largest food companies in Japan, decided to support the project because of its emphasis on training of trainers such as local leaders, community health workers, and volunteers, which is the key to self-sustainability. Another reason for support was that nutrition education is considered an integral part of the IP in the Philippines, which in some way is in line with the company's mission to contribute to the improvement of the people's quality of life. The IP on RH/N is designed to expand the successful IP model achieved in villages in the municipalities of Malvar and Balayan during the past 6 years, while reinforcing the capacities of these model areas to lead in transferring their lessons and experience with successful IP to four other municipalities in Batangas. Attention will also be given to promoting the use of integrated information, education, and communication materials for RH/N.

  8. Selecting one of several mating types through gene segment joining and deletion in Tetrahymena thermophila.

    Directory of Open Access Journals (Sweden)

    Marcella D Cervantes

    Full Text Available The unicellular eukaryote Tetrahymena thermophila has seven mating types. Cells can mate only when they recognize cells of a different mating type as non-self. As a ciliate, Tetrahymena separates its germline and soma into two nuclei. During growth the somatic nucleus is responsible for all gene transcription while the germline nucleus remains silent. During mating, a new somatic nucleus is differentiated from a germline nucleus and mating type is decided by a stochastic process. We report here that the somatic mating type locus contains a pair of genes arranged head-to-head. Each gene encodes a mating type-specific segment and a transmembrane domain that is shared by all mating types. Somatic gene knockouts showed both genes are required for efficient non-self recognition and successful mating, as assessed by pair formation and progeny production. The germline mating type locus consists of a tandem array of incomplete gene pairs representing each potential mating type. During mating, a complete new gene pair is assembled at the somatic mating type locus; the incomplete genes of one gene pair are completed by joining to gene segments at each end of germline array. All other germline gene pairs are deleted in the process. These programmed DNA rearrangements make this a fascinating system of mating type determination.

  9. Methods and equipments used in power reactors

    International Nuclear Information System (INIS)

    Beraha, R.; Delevallee, A.

    1976-01-01

    The various reactor γ fuel scanning facilities presently operating around the world are reviewed. Both equipments proposed by FRAMATOME are described: one is intended for scanning removable fuel pencils, and the other one for fuel assembly scanning [fr

  10. Days individual equipment of protection and professional risks; Equipements de protection individuelle et risques professionnelles

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The personal protection equipment is studied in the legal way (legal liabilities, certification, European texts), technical way (ergonomics, painfulness of ventilated equipment wearing, reliability of a respirable air line, protection gloves against the chemical risk, exposure to nano particulates, working in hot area), human factors (hostile area and emotion management), studies on personal equipment such evaluation, efficiency, conception of new equipment, physiological tolerance, limit of use, and some general safety studies on the working places. (N.C.)

  11. DCJ-RNA - double cut and join for RNA secondary structures.

    Science.gov (United States)

    Badr, Ghada H; Al-Aqel, Haifa A

    2017-10-16

    Genome rearrangements are essential processes for evolution and are responsible for existing varieties of genome architectures. Many studies have been conducted to obtain an algorithm that identifies the minimum number of inversions that are necessary to transform one genome into another; this allows for genome sequence representation in polynomial time. Studies have not been conducted on the topic of rearranging a genome when it is represented as a secondary structure. Unlike sequences, the secondary structure preserves the functionality of the genome. Sequences can be different, but they all share the same structure and, therefore, the same functionality. This paper proposes a double cut and join for RNA secondary structures (DCJ-RNA) algorithm. This algorithm allows for the description of evolutionary scenarios that are based on secondary structures rather than sequences. The main aim of this paper is to suggest an efficient algorithm that can help researchers compare two ribonucleic acid (RNA) secondary structures based on rearrangement operations. The results, which are based on real datasets, show that the algorithm is able to count the minimum number of rearrangement operations, as well as to report an optimum scenario that can increase the similarity between the two structures. The algorithm calculates the distance between structures and reports a scenario based on the minimum rearrangement operations required to make the given structure similar to the other. DCJ-RNA can also be used to measure the distance between the two structures. This can help identify the common functionalities between different species.

  12. Nominal and Real Convergence as a Determinant for Joining the European Monetary Union

    Directory of Open Access Journals (Sweden)

    Kasumović Merim

    2017-06-01

    Full Text Available The thematic framework of this work is the nominal and real convergence as a determinant for joining the European monetary union. The focus of the work is to prove that realising the criteria of the convergence affects the stability of the European monetary union, that is, that the cause of destabilisation is exactly the fact that certain member nations have not realised the assigned convergence criteria. The financial integration is an important question because it contributes to the economic growth affecting free exchange with the goal of a more efficient allocation of capital; it is the result of the economic theory and the empirical research. Introducing the Euro as a single payment method while losing the monetary sovereignty of the countries which have accepted it is the main reason for forming the European Central Bank. The mission of the European Central Bank is to define and conduct a single monetary policy within the Eurozone. Because of the already mentioned facts, the challenges of conducting the fiscal policy within the Eurozone as well as the key aspects of the monetary unification of Europe have been analysed. The results of this analysis should point out the stability of the EMU by the convergence degree of the member nations from a single monetary area.

  13. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  14. Industrial Employment, Investment Equipment and Economic Growth

    OpenAIRE

    Dellas, Harris

    2000-01-01

    The industrialization of labour is the main engine of growth during the early stages of economic development. In less developed countries, equipment investment has played a less important role than non-equipment investment; and it has only proved growth enhancing when it either encountered a substantial industrial labour force or fostered a large increase in the share of industrial employment. These findings draw attention to the effects of investment on the composition of the labour force; a...

  15. Requirement for XLF/Cernunnos in alignment-based gap filling by DNA polymerases ? and ? for nonhomologous end joining in human whole-cell extracts

    OpenAIRE

    Akopiants, Konstantin; Zhou, Rui-Zhe; Mohapatra, Susovan; Valerie, Kristoffer; Lees-Miller, Susan P.; Lee, Kyung-Jong; Chen, David J.; Revy, Patrick; de Villartay, Jean-Pierre; Povirk, Lawrence F.

    2009-01-01

    XLF/Cernunnos is a core protein of the nonhomologous end-joining pathway of DNA double-strand break repair. To better define the role of Cernunnos in end joining, whole-cell extracts were prepared from Cernunnos-deficient human cells. These extracts effected little joining of DNA ends with cohesive 5? or 3? overhangs, and no joining at all of partially complementary 3? overhangs that required gap filling prior to ligation. Assays in which gap-filled but unligated intermediates were trapped us...

  16. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  17. Sensitive Security Information and Transportation Security: Issues and Congressional Options

    National Research Council Canada - National Science Library

    Sollenberger, Mitchel A

    2004-01-01

    .... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...

  18. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  19. Women and social security

    NARCIS (Netherlands)

    Westerveld, M.; Pennings, F.; Vonk, G.

    2015-01-01

    Does ‘the’ social security take sufficient account of women? Are its protection schemes sufficiently aimed at safeguarding women’s interests? These are the questions I was invited to answer for this handbook on social security law. At the same time I was asked to adopt an unorthodox approach, one

  20. Joining of polymer-metal lightweight structures using self-piercing riveting (SPR) technique: Numerical approach and simulation results

    Science.gov (United States)

    Amro, Elias; Kouadri-Henni, Afia

    2018-05-01

    Restrictions in pollutant emissions dictated at the European Commission level in the past few years have urged mass production car manufacturers to engage rapidly several strategies in order to reduce significantly the energy consumption of their vehicles. One of the most relevant taken action is light-weighting of body in white (BIW) structures, concretely visible with the increased introduction of polymer-based composite materials reinforced by carbon/glass fibers. However, the design and manufacturing of such "hybrid" structures is limiting the use of conventional assembly techniques like resistance spot welding (RSW) which are not transferable as they are for polymer-metal joining. This research aims at developing a joining technique that would eventually enable the assembly of a sheet molding compound (SMC) polyester thermoset-made component on a structure composed of several high strength steel grades. The state of the art of polymer-metal joining techniques highlighted the few ones potentially able to respond to the industrial challenge, which are: structural bonding, self-piercing riveting (SPR), direct laser joining and friction spot welding (FSpW). In this study, the promising SPR technique is investigated. Modelling of SPR process in the case of polymer-metal joining was performed through the building of a 2D axisymmetric FE model using the commercial code Abaqus CAE 6.10-1. Details of the numerical approach are presented with a particular attention to the composite sheet for which Mori-Tanaka's homogenization method is used in order to estimate overall mechanical properties. Large deformations induced by the riveting process are enabled with the use of a mixed finite element formulation ALE (arbitrary Lagrangian-Eulerian). FE model predictions are compared with experimental data followed by a discussion.

  1. Nuclear security and law

    International Nuclear Information System (INIS)

    Gozal, Y.

    1999-01-01

    The aim of this study is to show that the classical distinction between the military nuclear law and the civil nuclear law is outdated. The technologies are dual and might be misused from a pacific to a military goal. The central element of the nuclear law is thus the integration of the safety rules: the nuclear risk being universal, it has created an universal law (first part) that reflects our scientific knowledge and might thus evaluate. This universal law has been a factor of nuclear security (part 2), as in 50 years, there had been only one major nuclear accident and no nuclear conflict. The horizontal proliferation has been limited and the international community has understood that time had come to reduce our arsenals. (author)

  2. Role of joined farmer groups in enhancing production and farmers income

    Science.gov (United States)

    Arsyad, M.; Rahmadanih; Bulkis, S.; Hasnah; Sulili, A.; Darwis; Bustan, A.; Aswad, M.

    2018-05-01

    Production and farmers income still becomes a global issue in economic development. The study aims to (1) describe the implementation of the role of Joined farmer groups (called Gapoktan) in accordance its function and (2) to analyze the role of Gapoktan in increasing production and farming income. The study was conducted in Camba Sub District, Maros District, South Sulawesi, Indonesia in 2017 and choosing Aspana Gapoktan as Case Unit. Data collection is done by a combination of qualitative and quantitative methods. Qualitative data were collected by Focus Group Discussions method, indepth interview and document study while quantitative data was collected through survey method on 60 farmers respondents. The results showed that, (1) Aspana Gapoktan has implemented a role related to its function as a business unit in the provision of production facilities and farming as well as marketing but has not implemented roles related to its function as a processing business unit, and saving and loan (2) Gapoktan role in increasing production and income of farming is facilitating procurement of farm inputs and agricultural production tools for farmers and developing various commodities in farming activities, especially horticultural crops. More than 44.00% of farmers perceived that their production increased about 10.00% - 25.00% and more than 68.00% of farmers perceived that their income increased by about 10.00% - 25.00% for the last three years. It is necessary to increase the role of Gapoktan through (1) the procurement of horticultural product processing industry and (2) doing savings and loan activities by utilizing 40.00% of funds managed by Gapoktan or through the formation of cooperatives under the management of Gapoktan.

  3. Homeland Security and Civil Liberties

    National Research Council Canada - National Science Library

    Wong, Leonard; Lovelace, Douglas C., Jr

    2004-01-01

    .... The conference examined national security issues related to civil liberties, immigration policy, privacy issues, first amendment rights, and the balance of executive and judicial power in relation...

  4. Prosperity, Security and Politics

    DEFF Research Database (Denmark)

    Lauridsen, Laurids Sandager

    Governing elites in Southeast Asia are preoccupied with high-speed railways, which are also a cornerstone in China’s new Silk Road initiative - the “One Belt, One Road.” Chinese political leaders have in recent years travelled around Southeast- and Central Asia to promote Chinese high-speed railway...... as rationales behind the Sino-Thai high-speed rail project. It is argued that there are multiple motives behind the “One-Road-One-Belt” initiative and that the Sino-Thai project is driven by a mixture economic and security concerns on the Chinese side, while it on the Thai side combines the need for economic...

  5. Emergence and oscillation of cosmic space by joining M1-branes

    International Nuclear Information System (INIS)

    Sepehri, Alireza; Rahaman, Farook; Capozziello, Salvatore; Ali, Ahmed Farag; Pradhan, Anirudh

    2016-01-01

    Recently, it has been proposed by Padmanabhan that the difference between the number of degrees of freedom on the boundary surface and the number of degrees of freedom in a bulk region leads to the expansion of the universe. Now, a natural question arises; how could this model explain the oscillation of the universe between contraction and expansion branches? We try to address this issue in the framework of a BIonic system. In this model, M0-branes join to each other and give rise to a pair of M1-anti-M1-branes. The fields which live on these branes play the roles of massive gravitons that cause the emergence of a wormhole between them and formation of a BIon system. This wormhole dissolves into M1-branes and causes a divergence between the number of degrees of freedom on the boundary surface of M1 and the bulk leading to an expansion of M1-branes. When M1-branes become close to each other, the square energy of their system becomes negative and some tachyonic states emerge. To remove these states, M1-branes become compact, the sign of compacted gravity changes, causing anti-gravity to arise: in this case, branes get away from each other. By articulating M1-BIons, an M3-brane and an anti-M3-brane are created and connected by three wormholes forming an M3-BIon. This new system behaves like the initial system and by closing branes to each other, they become compact and, by getting away from each other, they open. Our universe is located on one of these M3-branes and, by compactifying the M3-brane, it contracts and, by opening it, it expands. (orig.)

  6. Emergence and oscillation of cosmic space by joining M1-branes

    Energy Technology Data Exchange (ETDEWEB)

    Sepehri, Alireza [Shahid Bahonar University, Faculty of Physics, Kerman (Iran, Islamic Republic of); Research Institute for Astronomy and Astrophysics of Maragha (RIAAM), Maragha (Iran, Islamic Republic of); Rahaman, Farook [Jadavpur University, Department of Mathematics, Kolkata, West Bengal (India); Capozziello, Salvatore [Universita di Napoli Federico II, Dipartimento di Fisica ' ' E. Pancini' ' , Naples (Italy); Gran Sasso Science Institute (INFN), L' Aquila (Italy); Tomsk State Pedagogical University, Tomsk (Russian Federation); INFN Sezione di Napoli, Naples (Italy); Ali, Ahmed Farag [Benha University, Department of Physics, Faculty of Science, Benha (Egypt); Pradhan, Anirudh [G L A University, Department of Mathematics, Institute of Applied Sciences and Humanities, Mathura, Uttar Pradesh (India)

    2016-05-15

    Recently, it has been proposed by Padmanabhan that the difference between the number of degrees of freedom on the boundary surface and the number of degrees of freedom in a bulk region leads to the expansion of the universe. Now, a natural question arises; how could this model explain the oscillation of the universe between contraction and expansion branches? We try to address this issue in the framework of a BIonic system. In this model, M0-branes join to each other and give rise to a pair of M1-anti-M1-branes. The fields which live on these branes play the roles of massive gravitons that cause the emergence of a wormhole between them and formation of a BIon system. This wormhole dissolves into M1-branes and causes a divergence between the number of degrees of freedom on the boundary surface of M1 and the bulk leading to an expansion of M1-branes. When M1-branes become close to each other, the square energy of their system becomes negative and some tachyonic states emerge. To remove these states, M1-branes become compact, the sign of compacted gravity changes, causing anti-gravity to arise: in this case, branes get away from each other. By articulating M1-BIons, an M3-brane and an anti-M3-brane are created and connected by three wormholes forming an M3-BIon. This new system behaves like the initial system and by closing branes to each other, they become compact and, by getting away from each other, they open. Our universe is located on one of these M3-branes and, by compactifying the M3-brane, it contracts and, by opening it, it expands. (orig.)

  7. Innovative Structural and Joining Concepts for Lightweight Design of Heavy Vehicle Systems

    Energy Technology Data Exchange (ETDEWEB)

    Jacky C. Prucz; Samir N. Shoukry; Gergis W. William

    2005-08-31

    heavy vehicles. The research work planed for the first year of this project (June 1, 2003 through May 30, 2004) focused on a theoretical investigation of weight benefits and structural performance tradeoffs associated with the design, fabrication, and joining of MMC components for heavy-duty vehicles. This early research work conducted at West Virginia University yielded the development of integrated material-structural models that predicted marginal benefits and significant barriers to MMC applications in heavy trailers. The results also indicated that potential applications of MMC materials in heavy vehicles are limited to components identified as critical for either loadings or weight savings. Therefore, the scope of the project was expanded in the following year (June 1, 2004 through May 30, 2005) focused on expanding the lightweight material-structural design concepts for heavy vehicles from the component to the system level. Thus, the following objectives were set: (1) Devise and evaluate lightweight structural configurations for heavy vehicles. (2) Study the feasibility of using Metal Matrix Composites (MMC) for critical structural components and joints in heavy vehicles. (3) Develop analysis tools, methods, and validated test data for comparative assessments of innovative design and joining concepts. (4) Develop analytical models and software for durability predictions of typical heavy vehicle components made of particulate MMC or fiber-reinforced composites. This report summarizes the results of the research work conducted during the past two years in this projects.

  8. Proactive Security Testing and Fuzzing

    Science.gov (United States)

    Takanen, Ari

    Software is bound to have security critical flaws, and no testing or code auditing can ensure that software is flaw-less. But software security testing requirements have improved radically during the past years, largely due to criticism from security conscious consumers and Enterprise customers. Whereas in the past, security flaws were taken for granted (and patches were quietly and humbly installed), they now are probably one of the most common reasons why people switch vendors or software providers. The maintenance costs from security updates often add to become one of the biggest cost items to large Enterprise users. Fortunately test automation techniques have also improved. Techniques like model-based testing (MBT) enable efficient generation of security tests that reach good confidence levels in discovering zero-day mistakes in software. This technique is called fuzzing.

  9. Nuclear and radiological Security: Introduction.

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-24

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  10. Nuclear and radiological Security: Introduction

    International Nuclear Information System (INIS)

    Miller, James Christopher

    2016-01-01

    Nuclear security includes the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer, or other malicious acts involving nuclear or other radioactive substances or their associated facilities. The presentation begins by discussing the concept and its importance, then moves on to consider threats--insider threat, sabotage, diversion of materials--with considerable emphasis on the former. The intrusion at Pelindaba, South Africa, is described as a case study. The distinction between nuclear security and security of radiological and portable sources is clarified, and the international legal framework is touched upon. The paper concludes by discussing the responsibilities of the various entities involved in nuclear security.

  11. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  12. 7 CFR 58.229 - Filler and packaging equipment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Filler and packaging equipment. 58.229 Section 58.229....229 Filler and packaging equipment. All filling and packaging equipment shall be of sanitary... equipment should comply with the 3-A Sanitary Standards for equipment for Packaging Dry Milk and Dry Milk...

  13. Computer and information security handbook

    CERN Document Server

    Vacca, John R

    2012-01-01

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed

  14. Hacking Facebook Privacy and Security

    Science.gov (United States)

    2012-08-28

    REPORT Hacking Facebook Privacy and Security 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: When people talk about hacking and social networks , they’re...12211 Research Triangle Park, NC 27709-2211 15. SUBJECT TERMS Facebook , Privacy, Security, Social Network Dr. Jeff Duffany (Advisor), Omar Galban...transmit personal information that many people that they dare not do it personally. FACEBOOK PLATFORM Facebook is a popular social networking

  15. Atom probe tomography of intermetallic phases and interfaces formed in dissimilar joining between Al alloys and steel

    International Nuclear Information System (INIS)

    Lemmens, B.; Springer, H.; Duarte, M.J.; De Graeve, I.; De Strycker, J.; Raabe, D.; Verbeken, K.

    2016-01-01

    While Si additions to Al are widely used to reduce the thickness of the brittle intermetallic seam formed at the interface during joining of Al alloys to steel, the underlying mechanisms are not clarified yet. The developed approach for the site specific atom probe tomography analysis revealed Si enrichments at grain and phase boundaries between the θ (Fe 4 Al 13 ) and η (Fe 2 Al 5 ) phase, up to about ten times that of the concentration in Al. The increase in Si concentration could play an important role for the growth kinetics of the intermetallic phases formed for example in hot-dip aluminizing of steel. - Highlights: •Si additions to Al reduce thickness of intermetallic seam in joining with steel. •Approach developed for the site specific APT analysis of the intermetallic seam •Si enrichment at grain and phase boundaries possibly affects growth of intermetallics.

  16. Secure integrated circuits and systems

    CERN Document Server

    Verbauwhede, Ingrid MR

    2010-01-01

    On any advanced integrated circuit or 'system-on-chip' there is a need for security. In many applications the actual implementation has become the weakest link in security rather than the algorithms or protocols. The purpose of the book is to give the integrated circuits and systems designer an insight into the basics of security and cryptography from the implementation point of view. As a designer of integrated circuits and systems it is important to know both the state-of-the-art attacks as well as the countermeasures. Optimizing for security is different from optimizations for speed, area,

  17. Homomorphic encryption and secure comparison

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Geisler, Martin; Krøigaard, Mikkel

    2008-01-01

    Computation (MPC). We show how our comparison protocol can be used to improve security of online auctions, and demonstrate that it is efficient enough to be used in practice. For comparison of 16 bits numbers with security based on 1024 bits RSA (executed by two parties), our implementation takes 0.28 sec......We propose a protocol for secure comparison of integers based on homomorphic encryption.We also propose a homomorphic encryption scheme that can be used in our protocol, makes it more efficient than previous solutions, and can also be used as the basis of efficient and general secure Multiparty...

  18. Practical Unix and Internet Security

    CERN Document Server

    Garfinkel, Simson; Spafford, Gene

    2003-01-01

    When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix varia

  19. PEP surveying procedures and equipment

    International Nuclear Information System (INIS)

    Linker, F.

    1982-06-01

    The PEP Survey and Alignment System, which employs both laser-based and optical survey methods, is described. The laser is operated in conjunction with the Tektronix 4051 computer and surveying instruments such as ARM and SAM, system which is designed to automate data input, reduction, and production of alignment instructions. The laser system is used when surveying ring quadrupoles, main bend magnets, sextupoles, and is optional when surveying RF cavities and insertion quadrupoles. Optical methods usually require that data be manually entered into the computer for alignment, but in some cases, an element can be aligned using nominal values of fiducial locations without use of the computer. Optical surveying is used in the alignment of NIT and SIT, low field bend magnets, wigglers, RF cavities, and insertion quadrupoles

  20. RPC industries - UV and EB equipment manufacturers

    International Nuclear Information System (INIS)

    Rodrigues, A.M.

    1987-01-01

    RPC Industries has been manufacturing electron beam and ultraviolet equipment for the industrial processing of materials for more than 15 years. RPC maintains its headquarters and electron processor manufacturing plant in Hayward, California. UV equipment is made in the company's plant near Chicago. Sales offices are maintained in New York, Illinois, and California in the USA, and in Germany, Japan, Australia, Italy, Israel, and Sweden. Complete testing and pilot facilities are available in Hayward (EB) and near Chicago (UV). Described below are the basic system components, applications and advantages of RPC's UV and EB systems. (orig.)

  1. The Extended Concept of Security and the Czech Security Practice

    Directory of Open Access Journals (Sweden)

    Libor Stejskal

    2008-12-01

    Full Text Available According to the extended concept of security, the nation state is no longer the sole privileged reference object of security. The traditional model of national security is developing from military terms to a broader concept which embraces the international, economic, social, environmental, and human rights dimensions of security. The meaning and relevance of the concept is being extended “upwards”, to international organisations, and “downwards”, to regional and local authorities, non-governmental organisations, communities, and individual citizens. This has immediate bearing on the everyday security reality of the Czech Republic. In international context, the “security frontier” of the Czech Republic is expanding, e.g. through the country’s involvement in UN and NATO security missions in conflict-ridden regions of Europe and the world. The country also helps enhance the internal security of the European Union, whose strength depends on its Member States’ willingness to “harmonise” the pursuit of their respective national security interests. This approach is especially important with regard to the principal security threats Europe faces and will continue to face in the future: terrorism and organised crime. It is vital that the Czech Republic have a well-working security system capable of responding effectively to a broad range of threats. This requirement applies first and foremost to the Police, the Fire and Rescue Service, and intelligence services. Unfortunately, with the present effectiveness of the Czech security system, much remains wishful thinking and, due to the lack of a comprehensive framework, a comparatively low level of protection against emergencies exists. Fight against crime is hampered by inefficient operation of the Police and judiciary. A thorough analysis of the aforementioned problems could provide basis for a broader public debate over the priorities and goals of Czech security policy, which should

  2. Influence of reduced glutathione on end-joining of DNA double-strand breaks: Cytogenetical and molecular approach

    Energy Technology Data Exchange (ETDEWEB)

    Ghoshal, Nitin [Molecular Genetics Laboratory, Department of Biotechnology & Bioinformatics, North-Eastern Hill University, Shillong, Meghalaya-793022 (India); Sharma, Sheetal [Department of Biochemistry, Indian Institute of Science, Bangalore, 560 012 (India); Banerjee, Atanu; Kurkalang, Sillarine [Molecular Genetics Laboratory, Department of Biotechnology & Bioinformatics, North-Eastern Hill University, Shillong, Meghalaya-793022 (India); Raghavan, Sathees C. [Department of Biochemistry, Indian Institute of Science, Bangalore, 560 012 (India); Chatterjee, Anupam, E-mail: chatterjeeanupam@hotmail.com [Molecular Genetics Laboratory, Department of Biotechnology & Bioinformatics, North-Eastern Hill University, Shillong, Meghalaya-793022 (India)

    2017-01-15

    Highlights: • DNA lesions induced by Blem and radiation interact well and form higher frequency of exchange aberrations. • Cellular level of glutathione does influence such interaction of DNA lesions. • Oligomer-based cell-free assay system demonstrated better end-joining efficiency at higher level of endogenous GSH. - Abstract: Radiation induced DNA double-strand breaks (DSB) are the major initial lesions whose misrejoining may lead to exchange aberrations. However, the role of glutathione (GSH), a major cellular thiol, in regulating cell’s sensitivity to DNA damaging agents is not well understood. Influence of endogenous GSH on the efficiency of X-rays and bleomycin (Blem) induced DNA DSBs end-joining has been tested here cytogenetically, in human lymphocytes and Hct116 cells. In another approach, oligomeric DNA (75 bp) containing 5′-compatible and non-compatible overhangs mimicking the endogenous DSB were for rejoining in presence of cell-free extracts from cells having different endogenous GSH levels. Frequency of aberrations, particularly exchange aberrations, was significantly increased when Blem was combined with radiation. The exchange aberration frequency was further enhanced when combined treatment was given at 4 °C since DNA lesions are poorly repaired at 4 °C so that a higher number of DNA breaks persist and interact when shifted from 4 °C to 37 °C. The exchange aberrations increased further when the combined treatment was given to Glutathione-ester (GE) pre-treated cells, indicating more frequent rejoining of DNA lesions in presence of higher cellular GSH. This is further supported by the drastic reduction in frequency of exchange aberrations but significant increase in incidences of deletions when combined treatment was given to GSH-depleted cells. End-joining efficiency of DNA DSBs with compatible ends was better than for non-compatible ends. End-joining efficiency of testicular and MCF7 cell extracts was better than that of lungs and

  3. Security Controls for NPP I and C Systems

    International Nuclear Information System (INIS)

    Kim, Y. M.; Jeong, C. H.; Kim, T. H.

    2014-01-01

    In Korea, regulatory body have required cyber security plan for nuclear I and C system. Also, all I and C systems and equipment must be classified according to cyber security level and technical, operational and managerial security controls must be provided based on each level. It is necessary to determine the best set of security controls for NPP I and C system. In our research, selection, implementation and verification process of security controls which can be used for I and C systems has developed. For establishing the cyber security of the nuclear I and C system, special cyber security system which consider the difference between general IT system and nuclear I and C system is needed. This research, we developed security improvement methodology for NPP I and C system through establishing security control, applying and verifying activity. Also, the cyber security activities which are needed during development are defined. It is expected that the methodology which has been developed by this research can be used for establish, implement, evaluate the security controls for protecting nuclear I and C system from cyber-attacks

  4. Security Controls for NPP I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Y. M.; Jeong, C. H. [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, T. H. [Formal Works Inc., Seoul (Korea, Republic of)

    2014-05-15

    In Korea, regulatory body have required cyber security plan for nuclear I and C system. Also, all I and C systems and equipment must be classified according to cyber security level and technical, operational and managerial security controls must be provided based on each level. It is necessary to determine the best set of security controls for NPP I and C system. In our research, selection, implementation and verification process of security controls which can be used for I and C systems has developed. For establishing the cyber security of the nuclear I and C system, special cyber security system which consider the difference between general IT system and nuclear I and C system is needed. This research, we developed security improvement methodology for NPP I and C system through establishing security control, applying and verifying activity. Also, the cyber security activities which are needed during development are defined. It is expected that the methodology which has been developed by this research can be used for establish, implement, evaluate the security controls for protecting nuclear I and C system from cyber-attacks.

  5. Diagnostic imaging and radiation therapy equipment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1990-05-01

    This is the third edition of CSA Standard C22.2 No. 114 (now CAN/CSA-C22.2 No. 114), which is one of a series of standards issued by the Canadian Standards Association under Part II of the Canadian Electrical Code. This edition marks an important shift towards harmonization of Canadian requirements with those of the European community and the United States. Also important to this edition is the expansion of its scope to include the complete range of diagnostic imaging and radiation therapy equipment, rather than solely radiation-emitting equipment. In so doing, equipment previously addressed by CSA Standard C22.2 No. 125, Electromedical Equipment, specifically lasers for medical applications and diagnostic ultrasound units, is now dealt with in the new edition. By virtue of this expanded scope, many of the technical requirements in the electromedical equipment standard have been introduced to the new edition, thereby bringing CSA Standard C22.2 No. 114 up to date. 14 tabs., 16 figs.

  6. Diagnostic imaging and radiation therapy equipment

    International Nuclear Information System (INIS)

    1990-05-01

    This is the third edition of CSA Standard C22.2 No. 114 (now CAN/CSA-C22.2 No. 114), which is one of a series of standards issued by the Canadian Standards Association under Part II of the Canadian Electrical Code. This edition marks an important shift towards harmonization of Canadian requirements with those of the European community and the United States. Also important to this edition is the expansion of its scope to include the complete range of diagnostic imaging and radiation therapy equipment, rather than solely radiation-emitting equipment. In so doing, equipment previously addressed by CSA Standard C22.2 No. 125, Electromedical Equipment, specifically lasers for medical applications and diagnostic ultrasound units, is now dealt with in the new edition. By virtue of this expanded scope, many of the technical requirements in the electromedical equipment standard have been introduced to the new edition, thereby bringing CSA Standard C22.2 No. 114 up to date. 14 tabs., 16 figs

  7. USSR Report, Engineering and Equipment

    Science.gov (United States)

    1987-01-22

    hydraulic assembly abuts against the automaton through a panel and consists of a hydraulic station, panels of the pumping unit of the hydraulic assembly...mechanization of the storage of molding materials. The system involves the use of a dismountable prefabricated metal ware- house structure and high

  8. Water Supply and Treatment Equipment

    Science.gov (United States)

    2009-09-15

    j. Results of physical inspection and record of any repair or maintenance accomplished to restore the system to a fully functional state...for the specific membrane; b. For technologies employing membrane ultrafiltration and/or membrane microfiltration , identification of the

  9. Maintenance and fabrication of electronic equipment

    International Nuclear Information System (INIS)

    Chung, Chong Eun; Moon, Byung Soo; Hong, Suk Boong; Kim, Yong Keun; Kim, Jung Bok

    2003-12-01

    Development of radiation monitoring equipment could be the base of domestic development of RMS. And the technique could be adapted to development of other radiation equipment of KAERI as well as hospitals and nuclear power plants. The RMS technology could be adapted to the development of precision instruments related to nuclear radiation and be the base of fundamental technology such as protein structure analysis of bio technology, development of nano advanced material and aircraft material. The technology of multi-channel readout ASIC for nuclear radiation detector, which has been imported from abroad, could be adapted to development of radiation equipment for image processing, position of detection, NDT etc., and also the technique will be expected to contribute to increase the use of radiation technology to industrial applications

  10. USSR Report, Engineering and Equipment

    Science.gov (United States)

    1987-01-20

    determining refractive indices— refractometry —has come into being. A great variety of refractometers, designed for several different sectors of the national...S.I. Vavilova. The outcome has been what is in essence a new scientific departure—reflective refractometry of absorptive media—and the development

  11. Electrical Appliances and other Equipment

    DEFF Research Database (Denmark)

    Nørgaard, Jørgen

    2006-01-01

    After some reflection on the efficiency concept, the paper first outlines how the most important electrical end-use technologies, used in households as well as in many service institutions, can be designed to consume much less energy than they do today. This is based on techno-physical analyses...... combined with some consideration on the future human need for the energy service output from the technologies. On the above basis is suggested one set of energy services, which a family in a cold climate can enjoy from just annually consuming 250 kWh of electricity per person. This is actually sufficient......-use technologies, are here suggested progressive electricity taxes, followed by critical reflections on the use of energy suppliers to promote selling less energy. Finally are suggested how research can be most effective and useful by being more interdisciplinary and less dependent on business interests...

  12. Security and Network Operations [video

    OpenAIRE

    Myrick, Matthew

    2012-01-01

    Senior Security Engineer, Matthew Myrick discusses the current cyber threats that we are all facing, the five W's (who, what, when, where, and how) of cyber security, past and present cyber-attack trends, and ways you can help protect yourself and your enterprise from cyber-attack.

  13. Software Security and the "Building Security in Maturity" Model

    CERN Document Server

    CERN. Geneva

    2011-01-01

    Using the framework described in my book "Software Security: Building Security In" I will discuss and describe the state of the practice in software security. This talk is peppered with real data from the field, based on my work with several large companies as a Cigital consultant. As a discipline, software security has made great progress over the last decade. Of the sixty large-scale software security initiatives we are aware of, thirty-two---all household names---are currently included in the BSIMM study. Those companies among the thirty-two who graciously agreed to be identified include: Adobe, Aon, Bank of America, Capital One, The Depository Trust & Clearing Corporation (DTCC), EMC, Google, Intel, Intuit, McKesson, Microsoft, Nokia, QUALCOMM, Sallie Mae, Standard Life, SWIFT, Symantec, Telecom Italia, Thomson Reuters, VMware, and Wells Fargo. The BSIMM was created by observing and analyzing real-world data from thirty-two leading software security initiatives. The BSIMM can...

  14. Information Security and Integrity Systems

    Science.gov (United States)

    1990-01-01

    Viewgraphs from the Information Security and Integrity Systems seminar held at the University of Houston-Clear Lake on May 15-16, 1990 are presented. A tutorial on computer security is presented. The goals of this tutorial are the following: to review security requirements imposed by government and by common sense; to examine risk analysis methods to help keep sight of forest while in trees; to discuss the current hot topic of viruses (which will stay hot); to examine network security, now and in the next year to 30 years; to give a brief overview of encryption; to review protection methods in operating systems; to review database security problems; to review the Trusted Computer System Evaluation Criteria (Orange Book); to comment on formal verification methods; to consider new approaches (like intrusion detection and biometrics); to review the old, low tech, and still good solutions; and to give pointers to the literature and to where to get help. Other topics covered include security in software applications and development; risk management; trust: formal methods and associated techniques; secure distributed operating system and verification; trusted Ada; a conceptual model for supporting a B3+ dynamic multilevel security and integrity in the Ada runtime environment; and information intelligence sciences.

  15. Resilience and (in)security

    DEFF Research Database (Denmark)

    dunn cavelty, myriam; Kaufmann, Mareile; Kristensen, Kristian Søby

    2015-01-01

    , and redefine relations of security and insecurity. We show the increased attention – scholarly as well as political – given to resilience in recent times and provide a review of the state of critical security studies literature on resilience. We argue that to advance this discussion, resilience needs...

  16. Information Security and the Internet.

    Science.gov (United States)

    Doddrell, Gregory R.

    1996-01-01

    As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…

  17. Process plant equipment operation, control, and reliability

    CERN Document Server

    Holloway, Michael D; Onyewuenyi, Oliver A

    2012-01-01

    "Process Plant Equipment Book is another great publication from Wiley as a reference book for final year students as well as those who will work or are working in chemical production plants and refinery…" -Associate Prof. Dr. Ramli Mat, Deputy Dean (Academic), Faculty of Chemical Engineering, Universiti Teknologi Malaysia "…give[s] readers access to both fundamental information on process plant equipment and to practical ideas, best practices and experiences of highly successful engineers from around the world… The book is illustrated throughout with numerous black & white p

  18. Improvements in remote equipment torquing and fastening

    International Nuclear Information System (INIS)

    Garin, J.

    1978-01-01

    Remote torquing and fastening is a requirement of generic interest for application in an environment not readily accessible to man. The developments over the last 30 years in torque-controlled equipment above 200 nm (150 ft/lb) have not been emphasized. The development of specialized subassemblies to torque and fasten equipment in a remotely controlled environment is an integral part of the Advanced Fuel Recycle Program at Oak Ridge National Laboratory. Commercially available subassemblies have been adapted into a system that would provide remote torquing and fastening in the range of 200 to 750 nm (150 to 550 ft/lb). 9 figures

  19. Development and analysis of security policies in security enhanced Android

    OpenAIRE

    Rimando, Ryan A.

    2012-01-01

    Approved for public release; distribution is unlimited. This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate ho...

  20. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  1. Computers, business, and security the new role for security

    CERN Document Server

    Schweitzer, James A

    1987-01-01

    Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communicat

  2. Biofuels and food security

    Directory of Open Access Journals (Sweden)

    Dmitry S. STREBKOV

    2015-03-01

    Full Text Available The major source of energy comes from fossil fuels. The current situation in the field of fuel and energy is becoming more problematic as world population continues to grow because of the limitation of fossil fuels reserve and its pressure on environment. This review aims to find economic, reliable, renewable and non-polluting energy sources to reduce high energy tariffs in Russian Federation. Biofuel is fuel derived directly from plants, or indirectly from agricultural, commercial, domestic, and/or industrial wastes. Other alternative energy sources including solar energy and electric power generation are also discussed. Over 100 Mt of biomass available for energy purposes is produced every year in Russian. One of the downsides of biomass energy is its potential threatens to food security and forage industries. An innovative approach proved that multicomponent fuel (80% diesel oil content for motor and 64% for in stove fuel can remarkably reduce the costs. This paper proposed that the most promising energy model for future is based on direct solar energy conversion and transcontinental terawatt power transmission with the use of resonant wave-guide technology.

  3. Maintenence and fabrication of Electronic Equipment

    International Nuclear Information System (INIS)

    Chung, Chong Eun; Moon, Byung Soo; Hong, Suk Boong; Kim, Young Keun; Kim, Jung Bok; Lee, Sang Suk

    2004-12-01

    Development of the SPND Monitor could be the base of development of small signal processing circuits and the technique could be used to develop other precision equipment. The repair technology for high purity germanium(HPGe) detector system could be adapted to other areas where high purity detectors are used such as hospitals, universities etc. The technology of multi-channel ASIC for nuclear radiation detector, which has been imported from abroad, could be adapted to development of radiation equipment for image processing, position of detection, NDT etc., and also the technique will be expected to contribute to increase the use of radiation technology to industrial applications

  4. Homomorphic encryption and secure comparison

    NARCIS (Netherlands)

    Damgard, Ivan; Geisler, M.; Kroigaard, M.

    2008-01-01

    We propose a protocol for secure comparison of integers based on homomorphic encryption.We also propose a homomorphic encryption scheme that can be used in our protocol, makes it more efficient than previous solutions, and can also be used as the basis of efficient and general secure Multiparty

  5. Security Engine Management of Router based on Security Policy

    OpenAIRE

    Su Hyung Jo; Ki Young Kim; Sang Ho Lee

    2007-01-01

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. It controls an unauthorized router access and detects an illegal network intrusion. This paper re...

  6. Altered kinetics of nonhomologous end joining and class switch recombination in ligase IV-deficient B cells.

    Science.gov (United States)

    Han, Li; Yu, Kefei

    2008-11-24

    Immunoglobulin heavy chain class switch recombination (CSR) is believed to occur through the generation and repair of DNA double-strand breaks (DSBs) in the long and repetitive switch regions. Although implied, the role of the major vertebrate DSB repair pathway, nonhomologous end joining (NHEJ), in CSR has been controversial. By somatic gene targeting of DNA ligase IV (Lig4; a key component of NHEJ) in a B cell line (CH12F3) capable of highly efficient CSR in vitro, we found that NHEJ is required for efficient CSR. Disruption of the Lig4 gene in CH12F3 cells severely inhibits the initial rate of CSR and causes a late cell proliferation defect under cytokine stimulation. However, unlike V(D)J recombination, which absolutely requires NHEJ, CSR accumulates to a substantial level in Lig4-null cells. The data revealed a fast-acting NHEJ and a slow-acting alterative end joining of switch region breaks during CSR.

  7. [Morita Therapy to Treat Depression: When and How to Encourage Patients to Join Activities].

    Science.gov (United States)

    Nakamura, Kei

    2015-01-01

    The author discusses how Morita therapy is used to treat depression, illustrated with a clinical case, and makes comparisons between Morita therapy and behavioral activation (BA). The author further examines the issue of when and how to encourage patients to join activities in clinical practice in Japan. Both Morita therapy and BA share at least a common view that it is effective to activate patients' constructive behavior at a certain point in depression treatment. However, BA therapists, compared to Morita therapists, seem to pay less attention to the necessity of resting and the appropriate timing for introducing behavioral activation. There may be some contextual differences between depressive patients in Japan and those in North America. In the case of Japanese patients, exhaustion from overwork is often considered a factor triggering the development of depression. At the same time, the Morita-based pathogenic model of depression seems different from BA's model of the same disorder. BA's approach to understanding depression may be considered a psychological (behavioristic) model. In this model, the cause of depression lies in: (a) a lack of positive reinforcement, and (b) negative reinforcement resulting from avoidance of the experience of discomfort. Therefore, the basic strategy of BA is to release depressive patients from an avoidant lifestyle, which serves as a basis for negative reinforcement, and to redirect the patients toward activities which offer the experience of positive reinforcement BA is primarily practiced by clinical psychologists in the U. S. while psychiatrists prescribe medication as a medical service. On the other hand, the clinical practice of treating depression in Japan is based primarily on medical models of depression. This is also true of Morita therapy, but in a broad sense. While those who follow medical models in a narrow sense try to identify the cause of illness and then remove it, Morita therapists pay more attention to the

  8. Equipment installation structure of roof slab for tank type FBR and method of equipment installation

    International Nuclear Information System (INIS)

    Sakai, Takao; Yamakawa, Masanori; Otsuka, Masaya; Sekine, Katsuhisa

    1986-01-01

    Purpose: To reduce equipment thermal stress and deformation by eliminating uneven temperature distribution caused at the equipment through section of the roof slab for the tank FBR, and at the same time, simplify the structure installation. Method: Multiple number of vertical fin projects are fit on the equipment through-section inside wall for the roof slab and the cylindrical equipment peripheral wall, and with these projected fins, the ring space of the through section is vertically divided into multiple sections in the circumferential direction. The vertical fins on the through-section inside wall and the fins on the equipment peripheral wall are contacted with each other by revolving them in the lateral direction. As a result, the natural convection caused by the difference of temperatures in the vertical direction of the ring space becomes a convection within each sector divided, and never generates circumferential circulation, which reduce uneven temperature distribution caused at the equipment through section. (Kawakami, Y.)

  9. Dissimilar Joining of ODS and F/M Steel Tube by Friction Stir Welding

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Suk Hoon; Noh, Sanghoon; Kim, Jun Hwan; Kim, Tae Kyu [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2014-05-15

    martensite, and the oxide particles are uniformly distributed as the mechanical alloying (MA) process. FSW was successfully applied for joining of tube and end-plug.

  10. Dissimilar Joining of ODS and F/M Steel Tube by Friction Stir Welding

    International Nuclear Information System (INIS)

    Kang, Suk Hoon; Noh, Sanghoon; Kim, Jun Hwan; Kim, Tae Kyu

    2014-01-01

    martensite, and the oxide particles are uniformly distributed as the mechanical alloying (MA) process. FSW was successfully applied for joining of tube and end-plug

  11. Characteristics of physicians and patients who join team-based primary care practices: evidence from Quebec's Family Medicine Groups.

    Science.gov (United States)

    Coyle, Natalie; Strumpf, Erin; Fiset-Laniel, Julie; Tousignant, Pierre; Roy, Yves

    2014-06-01

    New models of delivering primary care are being implemented in various countries. In Quebec, Family Medicine Groups (FMGs) are a team-based approach to enhance access to, and coordination of, care. We examined whether physicians' and patients' characteristics predicted their participation in this new model of primary care. Using provincial administrative data, we created a population cohort of Quebec's vulnerable patients. We collected data before the advent of FMGs on patients' demographic characteristics, chronic illnesses and health service use, and their physicians' demographics, and practice characteristics. Multivariate regression was used to identify key predictors of joining a FMG among both patients and physicians. Patients who eventually enrolled in a FMG were more likely to be female, reside outside of an urban region, have a lower SES status, have diabetes and congestive heart failure, visit the emergency department for ambulatory sensitive conditions and be hospitalized for any cause. They were also less likely to have hypertension, visit an ambulatory clinic and have a usual provider of care. Physicians who joined a FMG were less likely to be located in urban locations, had fewer years in medical practice, saw more patients in hospital, and had patients with lower morbidity. Physicians' practice characteristics and patients' health status and health care service use were important predictors of joining a FMG. To avoid basing policy decisions on tenuous evidence, policymakers and researchers should account for differential selection into team-based primary health care models. Copyright © 2014. Published by Elsevier Ireland Ltd.

  12. Joining of hybrid AA6063-6SiCp-3Grp composite and AISI 1030 steel by friction welding

    Directory of Open Access Journals (Sweden)

    N. Rajesh Jesudoss Hynes

    2017-10-01

    Full Text Available Joining of metals and aluminium hybrid metal matrix composites has significant applications in aviation, ship building and automotive industries. In the present work, investigation is carried out on Friction Welding of AISI 1030 steel and hybrid AA6063-6SiCp-3Grpcomposite, that are difficult to weld by fusion welding technique. Silicon carbide and graphite particle reinforced AA6063 matrix hybrid composite was developed successfully using stir casting method and the joining feasibility of AISI1030 steel with AA6063-6SiCp-3Grp hybrid composite was tried out by friction stud welding technique. During friction stage of welding process, the particulates (SiC & Graphite used for reinforcement, tend to increase the viscosity and lead to improper mixing of matrix and reinforcement. This eventually results in lower strength in dissimilar joints. To overcome this difficulty AA1100 interlayer is used while joining hybrid composite to AISI 1030 steel. Experimentation was carried out using Taguchi based design of experiments (DOE technique. Multiple regression methods were applied to understand the relationship between process parameters of the friction stud welding process. Micro structural examination reveals three separate zones namely fully plasticized zone, partially deformed zone and unaffected base material zone. Ultra fine dynamically recrystallized grains of about 341 nm were observed at the fully plasticized zone. EDX analysis confirms the presence of intermetallic compound Fe2Al5 at the joint interface. According to the experimental analysis using DOE, rotational speed and interlayer sheet thickness contribute about 39% and 36% respectively in determining the impact strength of the welded joints. It is found that joining with 0.5 mm interlayer sheet provides efficient joints. Developed regression model could be used to predict the axial shortening distance and impact strength of the welded joint with reasonable accuracy.

  13. Physical linkage of a human immunoglobulin heavy chain variable region gene segment to diversity and joining region elements

    International Nuclear Information System (INIS)

    Schroeder, H.W. Jr.; Walter, M.A.; Hofker, M.H.; Ebens, A.; Van Dijk, K.W.; Liao, L.C.; Cox, D.W.; Milner, E.C.B.; Perlmutter, R.M.

    1988-01-01

    Antibody genes are assembled from a series of germ-line gene segments that are juxtaposed during the maturation of B lymphocytes. Although diversification of the adult antibody repertoire results in large part from the combinatorial joining of these gene segments, a restricted set of antibody heavy chain variable (V H ), diversity (D H ), and joining (J H ) region gene segments appears preferentially in the human fetal repertoire. The authors report here that one of these early-expressed V H elements (termed V H 6) is the most 3' V H gene segment, positioned 77 kilobases on the 5' side of the J H locus and immediately adjacent to a set of previously described D H sequences. In addition to providing a physical map linking human V H , D H , and J H elements, these results support the view that the programmed development of the antibody V H repertoire is determined in part by the chromosomal position of these gene segments

  14. Hardware IP security and trust

    CERN Document Server

    Bhunia, Swarup; Tehranipoor, Mark

    2017-01-01

    This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs. This book would enable readers to overcome these vulnerabilities through an efficient combination of proactive countermeasures and design-for-security solutions, as well as a wide variety of IP security and trust assessment and validation techniques. This book serves as a single-source of reference for system designers and practitioners for designing secure, reliable and trustworthy SoCs.

  15. Environmental/dynamic mechanical equipment qualification and dynamic electrical equipment qualification program (EDQP)

    International Nuclear Information System (INIS)

    Hunter, J.A.

    1984-01-01

    Equipment qualification research is being conducted to investigate acceptable criteria, requirements, and methodologies for the dynamic (including seismic) and environmental qualification of mechanical equipment and for the dynamic (including seismic) qualification of electrical equipment. The program is organized into three elements: (1) General Research, (2) Environmental Research, and (3) Dynamic Research. This paper presents the highlights of the results to date in these three elements of the program

  16. Privacy and security in teleradiology

    International Nuclear Information System (INIS)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  17. Privacy and security in teleradiology

    Energy Technology Data Exchange (ETDEWEB)

    Ruotsalainen, Pekka [National Institute for Health and Welfare, Helsinki (Finland)], E-mail: pekka.ruotsalainen@THL.fi

    2010-01-15

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  18. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  19. OEE and equipment effectiveness : an evaluation

    NARCIS (Netherlands)

    Ron, de A.J.; Rooda, J.E.

    2006-01-01

    The overall equipment effectiveness or efficiency (OEE) is a metric that has been accepted in the semiconductor industry. OEE is simple and clear, and standards and guidelines have been developed. Nonetheless, the literature indicates imperfections in applying OEE with regard to the time base and

  20. Climatic change and security stakes

    International Nuclear Information System (INIS)

    Ambrosi, Ph.; Hallegatte, St.

    2006-01-01

    This paper explores the relationships between climate change and security. Potential threats from climate change, as a unique source of stress or together with other factors, to human security are first examined. Some of the most explicit examples illustrate this section: food security, water availability, vulnerability to extreme events and vulnerability of small islands States and coastal zones. By questioning the basic needs of some populations or at least aggravating their precariousness, such risks to human security could also raise global security concerns, which we examine in turn, along four directions: rural exodus with an impoverishment of displaced populations, local conflicts for the use of natural resources, diplomatic tensions and international conflicts, and propagation to initially-unaffected regions through migratory flows. (authors)

  1. Applications for cyber security - System and application monitoring

    International Nuclear Information System (INIS)

    Marron, J. E.

    2006-01-01

    Standard network security measures are adequate for defense against external attacks. However, many experts agree that the greater threat is from internal sources. Insiders with malicious intentions can change controller instructions, change alarm thresholds, and issue commands to equipment which can damage equipment and compromise control system integrity. In addition to strict physical security the state of the system must be continually monitored. System and application monitoring goes beyond the capabilities of network security appliances. It will include active processes, operating system services, files, network adapters and IP addresses. The generation of alarms is a crucial feature of system and application monitoring. The alarms should be integrated to avoid the burden on operators of checking multiple locations for security violations. Tools for system and application monitoring include commercial software, free software, and ad-hoc tools that can be easily created. System and application monitoring is part of a 'defense-in-depth' approach to a control network security plan. Layered security measures prevent an individual security measure failure from being exploited into a successful security breach. Alarming of individual failures is essential for rapid isolation and correction of single failures. System and application monitoring is the innermost layer of this defense strategy. (authors)

  2. Alojamiento conjunto madre-hijo y lactancia humana exclusiva Joined mother-child hospital lodging and exclusive human lactation

    Directory of Open Access Journals (Sweden)

    SAMUEL FLORES-HUERTA

    1997-03-01

    Full Text Available Objetivo. Conocer la influencia del alojamiento conjunto (AC madre-hijo, en la frecuencia de lactancia humana exclusiva (LHE, desde el nacimiento hasta los cuatro meses de vida. Material y métodos. Estudio de cohortes no aleatorizado realizado en la clínica de lactancia del Hospital "Luis Castelazo Ayala", del Instituto Mexicano del Seguro Social, de enero de 1993 a octubre de 1994, en el que participaron 178 binomios madre-hijo (BMH sanos con gestación de término. El grupo con alojamiento conjunto (AC se integró con 90 BMH, y la madre recibió asesoría para lactar; 88 se atendieron en forma separada, sin asesoría para lactar. Se realizó análisis estadístico de los datos para apreciar frecuencia y asociaciones de las variables. Resultados. La alimentación se registró como LHE, fórmula o ambas. Los grupos con y sin AC se estratificaron por la forma de nacimiento, parto o cesárea. Con X² de Mantel-Haenszel y de rango logarítmico se aceptaron diferencias con pObjective. To determine the influence of joined mother-child hospital lodging (JL on the frequency of exclusive human lactation (EHL from birth to four months of age. Material and methods. Non-randomized cohort study performed at the lactation clinic of the "Luis Castelazo Ayala" Hospital of the Mexican Social Security Institute from January 1993 to October 1994 which included 178 healthy mother-child pairs (MCP with term pregnancy. The jointly lodged group (JL consisted of 90 MCP in which mothers received assessment for lactation; 88 MCP were lodged separately and no assessment was provided. Results were statistically analyzed to determine frequency and variable associations. Results. Feeding was recorded as either EHL, powdered milk or both. Groups with or without JL were stratified by form of birth, either labor or Cesarean section. With the Mantel-Haenszel X² and logarithmic range, differences were significant with p<0.05. During the study, global lactation was similar

  3. Security and trust requirements engineering

    NARCIS (Netherlands)

    Giorgini, P.; Massacci, F.; Zannone, N.; Aldini, A.; Gorrieri, R.; Martinelli, F.

    2005-01-01

    Integrating security concerns throughout the whole software development process is one of today’s challenges in software and requirements engineering research. A challenge that so far has proved difficult to meet. The major difficulty is that providing security does not only require to solve

  4. Environmental security and sustainable development

    International Nuclear Information System (INIS)

    Kok, M.T.J.

    1996-01-01

    Environmental security has become an important problem area for the social sciences and is becoming a key concept in long-term environmental policy and global environmental change issues. In taking Environmental Security on board, the International Human Dimensions Programme (IHDP) intends to stimulate research on approaches to solve global environmental issues, responses to climate change, food and water security, extreme weather events, etc. Both the Netherlands and Canadian HDP committee have placed environmental security and sustainable development on their national agendas. However, a research agenda for the role of social sciences in environmental security and societal impacts of global change has not been sufficiently elaborated yet, except for economic research on the impacts of climate change. This was the main reason for holding the title workshop. The aims of the workshop were: (1) to define environmental security as a research theme; (2) to explore the research agenda on environmental security for the social sciences; and (3) to establish and reinforce (inter)national research networks in this field. Two papers served as input for the participants of the workshop. First, in the Scoping Report Global Environmental Change and Human Security a brief overview is given of research conducted so far, as well as a working plan for the recently formed ad hoc Working Group on Environmental Security and Global Environmental Change. Secondly, the preliminary results of a programming study on Environmental Security and the societal impacts of climate change are presented. Special attention was given to the involvement of policymakers in the workshop. figs., tabs., 3 appendices, refs

  5. Metallurgical and Mechanical Characterization of High Temperature Titanium Alloys Joined by Friction Stir Welding

    Science.gov (United States)

    Gangwar, Kapil Dev

    In the world of joining, riveting and additive manufacturing, weight reduction, and omission of defects (at both macro and micro level) remain of paramount. Therefore, in the wake of ubiquitous fusion welding (FW) and widely accepted approach of riveting using Inconel bolts to resist corrosion at higher temperature, friction stir welding (FSW) has emerged as a novice jewel in friction based additive manufacturing industry. With advancements in automation of welding process and tool material, FSW of materials with higher work hardening such as steel and titanium has also become probable. Process and property relations associated with FSW are inevitable in case of dissimilar titanium alloys, due to presence of heterogeneity (whether atrocious or advantageous) in and around the weld nugget. These process property relationships are needed to be studied and addressed properly in order to optimize the processing window for improved mechanical and metallurgical properties. In this study FSWed similar and dissimilar butt joints of α+β, and near α titanium, alloys have been produced for varying processing conditions in order to study the effect of rotation speed (rpm) and traverse speed (TS; mm-min-1). The aim of this study is to assess the effect of tool geometry, tool rpm, TS on microstructure and mechanical properties of most widely used α+β titanium alloy, Ti-6Al-4V (Ti-64), standard grain and fine grain in addition to α+β,Ti-5Al-4V (T-54M), standard grain, and near α, Ti-6Al-2Mo-4Zr-2Sn (Ti-6242), standard grain (SG) and fine grain (FG). During FSW, a unique α+β fine-grained microstructure has been formed depending on whether or not the peak temperature in the weld nugget (WN) reached above or below β transus temperature. The resulting microstructure consists of acicular α+β, emanating from the prior β grain boundary as the weld cools off. The changes in the microstructure are observed by optical microscopy (OM). Later, a detailed analysis of material

  6. Willingness to join and pay for the newly proposed social health insurance among teachers in Wolaita Sodo Town, South Ethiopia.

    Science.gov (United States)

    Agago, Tesfamichael Alaro; Woldie, Mirkuzie; Ololo, Shimeles

    2014-07-01

    Cost-sharing between beneficiaries and governments is critical to achieve universal health care coverage. To address this, Ethiopia is currently introducing Social Health Insurance. However, there has been limited evidence on willingness to join the newly proposed insurance scheme in the country. The purpose of this study is to assess willingness to join and pay for the scheme among teachers in Wolaita Sodo Town government educational institutions, South Ethiopia. A cross-sectional study was conducted from February 5 to March 10, 2012 on 335 teachers. Stratified simple random sampling technique was used and data were collected using structured interviewer administered questionnaire. Binary and multiple logistic regressions were used to estimate the crude and adjusted odds ratios for willingness to pay. Three hundred twenty-eight teachers participated in the study with response rate of 98%. About 55% of the teachers had never heard of any type of health insurance scheme. However, 74.4% of them were willing to pay for the suggested insurance scheme. About 47% of those who were willing to pay agreed to contribute greater than or equal to 4% of their monthly salaries. Willingness to pay was more likely among those who had heard about health insurance, had previous history of inability to pay for medical bills and achieved higher educational status. The majority of the teachers were willing to join social health insurance; however, adequate awareness creation and discussion should be made with all employees at various levels for the successful implementation of the scheme.

  7. Linking process and structure in the friction stir scribe joining of dissimilar materials: A computational approach with experimental support

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Varun; Upadhyay, Piyush; Fifield, Leonard S.; Roosendaal, Timothy; Sun, Xin; Nelaturu, Phalgun; Carlson, Blair

    2018-04-01

    The friction stir welding (FSW) is a popular technique to join dissimilar materials in numerous applications. The solid state nature of the process enables joining materials with strikingly different physical properties. For the welds in lap configuration, an enhancement to this technology is made by introducing a short hard insert, referred to as cutting-scribe, at the bottom of the tool pin. The cutting-scribe induces deformation in the bottom plate which leads to the formation of mechanical interlocks or hook like structures at the interface of two materials. A thermo-mechanically coupled computational model employing coupled Eulerian-Lagrangian approach is developed to quantitatively capture the morphology of these interlocks during the FSW process. The simulations using developed model are validated by the experimental observations.The identified interface morphology coupled with the predicted temperature field from this process-structure model can then be used to estimate the post-weld microstructure and joint strength.

  8. Maritime energy and security: Synergistic maximization or necessary tradeoffs?

    International Nuclear Information System (INIS)

    Nyman, Elizabeth

    2017-01-01

    Offshore energy is big business. The traditional source of maritime energy, offshore petroleum and gas, has been on the rise since a reliable method of extraction was discovered in the mid-20th century. Lately, it has been joined by offshore wind and tidal power as alternative “green” sources of maritime energy. Yet all of this has implications for maritime environmental regimes as well, as maritime energy extraction/generation can have a negative effect on the ocean environment. This paper considers two major questions surrounding maritime energy and environmental concerns. First, how and why do these two concerns, maritime energy and environmental protection, play against each other? Second, how can states both secure their energy and environmental securities in the maritime domain? Maximizing maritime energy output necessitates some environmental costs and vice versa, but these costs vary with the type of offshore energy technology used and with the extent to which states are willing to expend effort to protect both environmental and energy security. - Highlights: • Security is a complicated concept with several facets including energy and environmental issues. • Offshore energy contributes to energy supply but can have environmental and monitoring costs. • Understanding the contribution of offshore energy to security depends on which security facet is deemed most important.

  9. Mechanical equipment for magnet measurement and alignment

    International Nuclear Information System (INIS)

    Harvey, A.

    1992-05-01

    The mechanical equipment for measuring and aligning (or fiducializing) magnets is described by reference to devices designed and built by a number of laboratories. Some of these are now available commercially. The descriptions are supplemented by a list of representative sources of hardware

  10. Fork-join and data-driven execution models on multi-core architectures: Case study of the FMM

    KAUST Repository

    Amer, Abdelhalim

    2013-01-01

    Extracting maximum performance of multi-core architectures is a difficult task primarily due to bandwidth limitations of the memory subsystem and its complex hierarchy. In this work, we study the implications of fork-join and data-driven execution models on this type of architecture at the level of task parallelism. For this purpose, we use a highly optimized fork-join based implementation of the FMM and extend it to a data-driven implementation using a distributed task scheduling approach. This study exposes some limitations of the conventional fork-join implementation in terms of synchronization overheads. We find that these are not negligible and their elimination by the data-driven method, with a careful data locality strategy, was beneficial. Experimental evaluation of both methods on state-of-the-art multi-socket multi-core architectures showed up to 22% speed-ups of the data-driven approach compared to the original method. We demonstrate that a data-driven execution of FMM not only improves performance by avoiding global synchronization overheads but also reduces the memory-bandwidth pressure caused by memory-intensive computations. © 2013 Springer-Verlag.

  11. Multimedia Security System for Security and Medical Applications

    Science.gov (United States)

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  12. Attachment Security and Pain

    DEFF Research Database (Denmark)

    Andersen, Tonny Elmose; Lahav, Yael; Defrin, Ruth

    2015-01-01

    The present study assesses for the first time, the possible disruption effect of posttraumatic stress symptoms (PTSS) with regard to the protective role of attachment on pain, among ex-POWs. While secure attachment seems to serve as a buffer, decreasing the perception of pain, this function may...

  13. Bluetooth and security

    Science.gov (United States)

    Ivo, Penn

    2004-04-01

    frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This is because short packages and fast hopping limit the impact of microwave ovens and other sources of disturbances. Use of Forward Error Correction (FEC) limits the impact of random noise on long-distance links. Bluetooth transmissions are secure in a business and home environment. Bluetooth has built in sufficient encryption and authentication and is thus very secure in any environment. In addition to this, a frequency-hopping scheme with 1600 hops/sec. is employed. This is far quicker than any other competing system. This, together with an automatic output power adaption to reduce the range exactly to requirement, makes the system extremely difficult to eavesdrop. Information Integrity in Bluetooth has these components: Random Number Generation, Encryption, Encryption Key Management and Authentication.

  14. Longevity and Depreciation of Audiovisual Equipment.

    Science.gov (United States)

    Post, Richard

    1987-01-01

    Describes results of survey of media service directors at public universities in Ohio to determine the expected longevity of audiovisual equipment. Use of the Delphi technique for estimates is explained, results are compared with an earlier survey done in 1977, and use of spreadsheet software to calculate depreciation is discussed. (LRW)

  15. Enabling secure and privacy preserving communications in smart grids

    CERN Document Server

    Li, Hongwei

    2014-01-01

    This brief focuses on the current research on security and privacy preservation in smart grids. Along with a review of the existing works, this brief includes fundamental system models, possible frameworks, useful performance, and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient Merkle tree based authentication, and fine-grained keywords comparison in the smart grid auction market. By examining the current and potential security and privacy threats, the author equips readers to understand the developing issues in sma

  16. Special event launches new partnership. IAEA and NFCR join forces to fight cancer in developing world

    International Nuclear Information System (INIS)

    2007-01-01

    Full text: IAEA Director General and Nobel Laureate Mohamed ElBaradei will join more than 100 leading public figures, philanthropists and cancer experts at the United Nations Headquarters in New York on 29 October to mark the launch of a new partnership between the IAEA and the US based National Foundation for Cancer Research (NFCR). Through this partnership, and the endowment fund called the PACT Fund at NFCR, Americans can support the IAEA and its partners in helping poor countries to combat the looming cancer epidemic. 'The IAEA has long provided radiotherapy machines and expertise to developing countries, but the growing cancer crisis cannot be fought with radiotherapy alone,' says Mohamed ElBaradei. 'Our Programme of Action for Cancer Therapy (PACT), which draws on the Agency's long experience in radiation therapy, is building international partnerships to assist in cancer prevention, early detection, treatment and palliative care. Now, through the PACT Fund at NFCR, Americans have the opportunity to support these efforts and bring hope to millions of cancer patients in developing nations.' According to the World Health Organization (WHO), the world is on the brink of a cancer crisis. New cases are expected to double to more than 16 million a year by 2020, unless action is taken now. Hardest hit will be low-income countries, whose health systems are already overburdened by infectious diseases such as HIV/AIDS, Tuberculosis and Malaria. PACT, which was created within the IAEA in 2004, is forging international partnerships with other cancer organizations in both the public and private sectors. Together with partners such as WHO, the American Cancer Society (ACS), the National Cancer Institute (NCI) and the International Agency for Research on Cancer (IARC), it has established pilot projects called Model Demonstration Sites (PMDS) in six countries (Albania, Nicaragua, Sri Lanka, Tanzania, Vietnam and Yemen) to develop and implement comprehensive, integrated

  17. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  18. Dependence and power in healthcare equipment supply chains.

    Science.gov (United States)

    de Jong, Jurriaan L; Benton, W C

    2018-03-05

    Most healthcare organizations (HCOs) engage Group Purchasing Organizations (GPOs) as an outsourcing strategy to secure their supplies and materials. When an HCO outsources the procurement function to a GPO, this GPO will directly interact with the HCO's supplier on the HCO's behalf. This study investigates how an HCO's dependence on a GPO affects supply chain relationships and power in the healthcare medical equipment supply chain. Hypotheses are tested through factor analysis and structural equation modeling, using primary survey data from HCO procurement managers. An HCO's dependence on a GPO is found to be positively associated with a GPO's reliance on mediated power, but, surprisingly, negatively associated with a GPO's mediated power. Furthermore, analysis indicates that an HCO's dependence on a GPO is positively associated with an HCO's dependence on a GPO-contracted Original Equipment Manufacturer (OEM). HCO reliance on GPOs may lead to a buyer's dependence trap, where HCOs are increasingly dependent on GPOs and OEMs. Implications for HCO procurement managers and recommended steps for mitigation are offered. Power-dependence relationships in the medical equipment supply chain are not consistent with relationships in other, more traditional, supply chains. While dependence in a supply chain relationship typically leads to an increase in reliance on mediated power, GPO-dependent HCOs instead perceive a decrease in GPO mediated power. Furthermore, HCOs that rely on procurement service from GPOs are increasingly dependent on the OEMs.

  19. Social Security and Medicare Benefits

    Data.gov (United States)

    Social Security Administration — Cash benefits and rehabilitation benefits paid in each year from the Old-Age and Survivors Insurance, and Disability Insurance Trust Funds, and benefits paid from...

  20. Innovative Structural and Joining Concepts for Lightweight Design of Heavy Vehicle Systems

    Energy Technology Data Exchange (ETDEWEB)

    Prucz, Jacky C; Shoukry, Samir N; William, Gergis W; Evans, Thomas H

    2006-09-30

    The extensive research and development effort was initiated by the U.S. Department of Energy (DOE) in 2002 at West Virginia University (WVU) in order to investigate practical ways of reducing the structural weight and increasing the durability of heavy vehicles through the judicious use of lightweight composite materials. While this project was initially focused on specific Metal Matrix Composite (MMC) material, namely Aluminum/Silicon Carbide (Al/SiC) commercially referenced as ''LANXIDE'', the current research effort was expanded from the component level to the system level and from MMC to other composite material systems. Broadening the scope of this research is warranted not only by the structural and economical deficiencies of the ''LANXIDE'' MMC material, but also by the strong coupling that exists between the material and the geometric characteristics of the structure. Such coupling requires a truly integrated design approach, focused on the heaviest sections of a van trailer. Obviously, the lightweight design methods developed in this study will not be implemented by the commercial industry unless the weight savings are indeed impressive and proven to be economically beneficial in the context of Life Cycle Costs (LCC). ''Bulk Haul'' carriers run their vehicles at maximum certified weight, so that each pound saved in structural weight would translate into additional pound of cargo, and fewer vehicles necessary to transport a given amount of freight. It is reasonable to ascertain that a typical operator would be ready to pay a premium of about $3-4 for every additional pound of cargo, or every pound saved in structural weight. The overall scope of this project is to devise innovative, lightweight design and joining concepts for heavy vehicle structures, including cost effective applications of components made of metal matrix composite (MMC) and other composite materials in selected sections of such

  1. Social security and firm performance

    DEFF Research Database (Denmark)

    Lee, Sangheon; Torm, Nina

    2017-01-01

    This article investigates how social security provision - a key determinant of formality - impacts on small and medium-sized firm performance in Viet Nam. Based on enterprise census data covering all registered firms from 2006 to 2011, the authors find that firms which increase their social...... security coverage by 10 per cent experience a revenue gain of 1.4-2.0 per cent per worker and a profit gain of up to 1.8 per cent, depending on the survival time of the firm. However, given the time lag between 'investment' (in social security contributions) and returns (enhanced firm performance...

  2. Weak states and security

    OpenAIRE

    Rakipi, Albert

    2006-01-01

    Cataloged from PDF version of article. Although the weak 1 failing states have often been deseribed as the single most important problem for the international order s ince the en d of Cold W ar (F .Fukuyaına 2004:92) several dimensions of this phenomenon still remain unexplored. While this phenomenon has been present in the international politics even earlier, only the post Cold W ar period accentuated its relationship with security issues. Following the Cold W ar' s "peacef...

  3. Certified training for nuclear and radioactive source security management

    International Nuclear Information System (INIS)

    Johnson, Daniel

    2017-01-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. (author)

  4. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  5. Media rights and media security

    Science.gov (United States)

    Baugher, Mark

    2005-03-01

    Digital Rights Management (DRM) systems typically do not treat rights management as a security problem. DRM uses cryptographic techniques but not security relationships. Instead, DRM systems use "tamper-resistant mechanisms" to discourage unauthorized access to rights-managed content. Although proven ineffective in practice, tamper-resistant mechanisms penalize legitimate customers with added complexity and costs that arise from tamper-resisting data or program code. This paper explores how a security relationship between provider and consumer might be more effective for managing rights to content works on two-way networks.

  6. Microstructure and mechanical properties of low-activation glass-ceramic joining and coating for SiC/SiC composites

    International Nuclear Information System (INIS)

    Katoh, Yutai; Kotani, M.; Kohyama, A.; Montorsi, M.; Salvo, M.; Ferraris, M.

    2000-01-01

    Calcia-alumina (CA) glass-ceramic was studied as a candidate low-activation joining and sealing material for SiC/SiC components for fusion blanket and diverter structures, in terms of microstructural stability and mechanical properties. The CA glass-ceramic joining and seal coating were applied to the Hi-Nicalon TM SiC fiber-reinforced SiC matrix composites in which the matrix had been formed through chemical vapor infiltration and polymer impregnation and pyrolysis methods. Microstructural characterization was carried out for the joined and coated materials by optical and scanning electron microscopy (SEM). The mechanical property of the joint was evaluated through a shear test on sandwich joints. The average shear strength of the joined structures was 28 MPa at room temperature. Fractography revealed that the fracture occurred in the glass phase and the shear strength may be improved by reduction of the glass fraction

  7. Security and policy driven computing

    CERN Document Server

    Liu, Lei

    2010-01-01

    Security and Policy Driven Computing covers recent advances in security, storage, parallelization, and computing as well as applications. The author incorporates a wealth of analysis, including studies on intrusion detection and key management, computer storage policy, and transactional management.The book first describes multiple variables and index structure derivation for high dimensional data distribution and applies numeric methods to proposed search methods. It also focuses on discovering relations, logic, and knowledge for policy management. To manage performance, the text discusses con

  8. Requirement for XLF/Cernunnos in alignment-based gap filling by DNA polymerases lambda and mu for nonhomologous end joining in human whole-cell extracts.

    Science.gov (United States)

    Akopiants, Konstantin; Zhou, Rui-Zhe; Mohapatra, Susovan; Valerie, Kristoffer; Lees-Miller, Susan P; Lee, Kyung-Jong; Chen, David J; Revy, Patrick; de Villartay, Jean-Pierre; Povirk, Lawrence F

    2009-07-01

    XLF/Cernunnos is a core protein of the nonhomologous end-joining pathway of DNA double-strand break repair. To better define the role of Cernunnos in end joining, whole-cell extracts were prepared from Cernunnos-deficient human cells. These extracts effected little joining of DNA ends with cohesive 5' or 3' overhangs, and no joining at all of partially complementary 3' overhangs that required gap filling prior to ligation. Assays in which gap-filled but unligated intermediates were trapped using dideoxynucleotides revealed that there was no gap filling on aligned DSB ends in the Cernunnos-deficient extracts. Recombinant Cernunnos protein restored gap filling and end joining of partially complementary overhangs, and stimulated joining of cohesive ends more than twentyfold. XLF-dependent gap filling was nearly eliminated by immunodepletion of DNA polymerase lambda, but was restored by addition of either polymerase lambda or polymerase mu. Thus, Cernunnos is essential for gap filling by either polymerase during nonhomologous end joining, suggesting that it plays a major role in aligning the two DNA ends in the repair complex.

  9. Space station wardroom habitability and equipment study

    Science.gov (United States)

    Nixon, David; Miller, Christopher; Fauquet, Regis

    1989-01-01

    Experimental designs in life-size mock-up form for the wardroom facility for the Space Station Habitability Module are explored and developed. In Phase 1, three preliminary concepts for the wardroom configuration are fabricated and evaluated. In Phase 2, the results of Phase 1 are combined with a specific range of program design requirements to provide the design criteria for the fabrication of an innovative medium-fidelity mock-up of a wardrobe configuration. The study also focuses on the design and preliminary prototyping of selected equipment items including crew exercise compartments, a meal/meeting table and a portable workstation. Design criteria and requirements are discussed and documented. Preliminary and final mock-ups and equipment prototypes are described and illustrated.

  10. 14 CFR 25.1441 - Oxygen equipment and supply.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Oxygen equipment and supply. 25.1441... Oxygen equipment and supply. (a) If certification with supplemental oxygen equipment is requested, the... oxygen available in each source of supply. (d) The oxygen flow rate and the oxygen equipment for...

  11. Amidated joining peptide in the human pituitary, gut, adrenal gland and bronchial carcinoids. Immunocytochemical and immunochemical evidence

    DEFF Research Database (Denmark)

    Bjartell, A; Fenger, M; Ekman, R

    1990-01-01

    The distribution of the proopiomelanocortin-derivated amidated joining peptide (JP-N) was examined in the human pituitary gland, adrenal gland, gut and in three bronchial carcinoids. Double immunostaining showed coexistence of immunoreactive JP-N and other proopiomelanocortin derivatives, e......-N, respectively, but under reduced conditions most of the immunoreactive material appeared as of low molecular weight in both extracts. In conclusion, immunoreactive JP-N is a major product from the processing of proopiomelanocortin in human extrapituitary tissues. The molecular forms of immunoreactive JP......-N correspond to previous findings in the human pituitary gland....

  12. 24 CFR 965.306 - Energy conservation equipment and practices.

    Science.gov (United States)

    2010-04-01

    ... Measures § 965.306 Energy conservation equipment and practices. In purchasing original or, when needed, replacement equipment, PHAs shall acquire only equipment that meets or exceeds the minimum efficiency... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Energy conservation equipment and...

  13. 7 CFR 58.419 - Curd mill and miscellaneous equipment.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Curd mill and miscellaneous equipment. 58.419 Section... Service 1 Equipment and Utensils § 58.419 Curd mill and miscellaneous equipment. Knives, hand rakes... of the curd mill should be of stainless steel. All pieces of equipment shall be so constructed that...

  14. Equipment for extracting and conveying stratified minerals

    Energy Technology Data Exchange (ETDEWEB)

    Blumenthal, G.; Kunzer, H.; Plaga, K.

    1991-08-14

    This invention relates to equipment for extracting stratified minerals and conveying the said minerals along the working face, comprising a trough shaped conveyor run assembled from lengths, a troughed extraction run in lengths matching the lengths of conveyor troughing, which is linked to the top edge of the working face side of the conveyor troughing with freedom to swivel vertically, and a positively guided chain carrying extraction tools and scrapers along the conveyor and extraction runs.

  15. Equipment Obsolescence Analysis and Management Software

    Energy Technology Data Exchange (ETDEWEB)

    Redmond, J.; Carret, L.; Shaon, S.; Schultz, C.

    2015-07-01

    The procurement engineering resources at Nuclear Power Plants (NPPs) are experiencing increasing backlog for procurement items primarily due to the inability to order the original replacement parts. The level of effort and time required to prepare procurement packages is increasing since the number of obsolete parts are increasing exponentially. Procurement packages for obsolete components and parts are much more complex and take more time to prepare because of the need to perform equivalency evaluations, testing requirements and test acceptance criteria development, commercial grade dedication or equipment qualification, and increasing efforts to verify that no fraudulent or counterfeit parts are procured. This problem will be further compounded when NPPs pursue license renewal and approval for plant-life extension. Advanced planning and advanced knowledge of equipment obsolescence is required to allow for sufficient time to properly procure replacement parts for obsolete items. The uncertain supply chain capability due to obsolescence is a real problem and can cause a risk to reliable plant operations due to the potential for a lack of available spare parts and replacement components to support outages and unplanned component failures. Advanced notification of obsolescence is increasingly more important to ensure that adequate time and planning is scheduled to procure the proper replacement parts. A thorough analysis of Original Equipment Manufacturer (OEM) availability and inventory as well as an analysis of failure rates and usage rates is required to predict critical part needs to allow for early identification of obsolescence issues so that a planned and controlled strategy to qualify replacement equipment can be implemented. (Author)

  16. Resilient Infrastructure and Building Security

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew

    inference. Persistent authentication offers an effective integrated protection measure that is distributed directly in the facility and is non-intrusive to the public and affordable to the facility owners. Persistent authentication is suitable for security sensitive applications and can help protect...... to authentication that combines traditional access control systems with the sensing technologies and tracking capabilities offered by smart environments. Our approach is called Persistent Authentication for Location-based Services. Persistent authentication enables the secure provision of location-based services...

  17. Decontamination and Decommissioning Equipment Tracking System (DDETS)

    International Nuclear Information System (INIS)

    Cook, S.

    1994-07-01

    At the request of the Department of Energy (DOE)(EM-50), the Scientific Computing Unit developed a prototype system to track information and data relevant to equipment and tooling removed during decontamination and decommissioning activities. The DDETS proof-of-concept tracking system utilizes a one-dimensional (1D) and two-dimensional (2D) bar coding technology to retain and track information such as identification number, manufacturer, requisition information, and various contaminant information, etc. The information is encoded in a bar code, printed on a label and can be attached to corresponding equipment. The DDETS was developed using a proven relational database management system which allows the addition, modification, printing, and deletion of data. In addition, communication interfaces with bar code printers and bar code readers were developed. Additional features of the system include: (a) Four different reports available for the user (REAPS, transaction, and two inventory), (b) Remote automated inventory tracking capabilities, (c) Remote automated inventory tracking capability (2D bar codes allow equipment to be scanned/tracked without being linked to the DDETS database), (d) Edit, update, delete, and query capabilities, (e) On-line bar code label printing utility (data from 2D bar codes can be scanned directly into the data base simplifying data entry), and (f) Automated data backup utility. Compatibility with the Reportable Excess Automated Property System (REAPS) to upload data from DDETS is planned

  18. 45 CFR 95.707 - Equipment management and disposition.

    Science.gov (United States)

    2010-10-01

    ... participation in the costs of replacement equipment shall be limited to the additional outlay. (4) If the... 45 Public Welfare 1 2010-10-01 2010-10-01 false Equipment management and disposition. 95.707... PROGRAMS) Equipment Acquired Under Public Assistance Programs § 95.707 Equipment management and disposition...

  19. 32 CFR 34.21 - Real property and equipment.

    Science.gov (United States)

    2010-07-01

    ... original equipment as trade-in or sell it and use the proceeds to offset the costs of the replacement... request approval to use equipment as trade-in or offset for replacement equipment (see paragraph (e)(1)(i... 32 National Defense 1 2010-07-01 2010-07-01 false Real property and equipment. 34.21 Section 34.21...

  20. Radiological security of portable equipment used in the industry; Seguridad radiologica de equipos portatiles utilizados en la industria

    Energy Technology Data Exchange (ETDEWEB)

    Cateriano, M.A. [Autoridad Regulatoria Nuclear, Av. Del Libertdor 8250, (C1429BNP), Ciudad Autonoma de Buenos Aires (Argentina)]. e-mail: mcateria@sede.arn.gov.ar

    2006-07-01

    The industrial meters with encapsulated sources are used intensely in the present time due to the economic benefits that generate. Their use in all the one world has been reflected in an improvement of the quality of the analyzed product and of one optimization of the production process, allowing to carry out these measurements and controls without interrupting the process and in non destructive form generating an energy saving in turn and of materials. Although these industrial meters are intrinsically safe for design in the portable meters their safety also is strongly governed in the strict pursuit of procedures and in the adequate personnel's training that operate these equipment. In the Argentine Republic in 2005 the Nuclear Regulatory Authority (RNA) had registered a quantity of 160 portable equipment. In the period 1995-2003, 2 incidents took place with these equipment one of them used to measure soils humidity of Troxler trademark containing a source of Am-241(Be) of 370 MBq and the remaining one also of Troxler trademark used to measure density and humidity of soils containing 2 sources of Cs-137 of 296 MBq and Am-241(Be) of 1.48 GBq respectively. The incidents were developed without relevant radiological implications had taken place. In this work those mentioned incidents are analyzed in order to determining the causes that originated the same ones, for this way to be able to elaborate recommendations with the purpose of to correct errors and to diminish the recurrence probability improving the safety in the use of these equipment. From the analyses of these incidents result that should put on more emphasis in the personnel training and the invigoration of the safety culture in the use of the industrial meters. Also a present panorama of the inventory of equipment, sources and users that possess these portable meters in the Argentine Republic is also presented. (Author)

  1. Equipment abnormality monitoring method and device therefor

    International Nuclear Information System (INIS)

    Yamada, Izumi; Asakura, Yamato; Uemura, Hiroshi; Uchida, Shunsuke; Oyamada, Osamu; Oyobe, Koji.

    1994-01-01

    In the present invention, it is judged whether the operation state of equipments used in a plant are normal or not by using learning performances. That is, a plurality of monitoring parameters are measured for an equipment. Previously determined monitoring parameters are extracted. A leaning mode or a monitoring mode is selected. In the leaning mode, based on the values of previously determined monitoring parameters, values of other monitoring parameters during normal states are learned. In the monitoring mode, based on the values of the previously determined monitoring parameters, typical values of other leaned monitoring parameters are outputted. The typical values of other normal monitoring parameters after learning and the values of other parameters at the present time are compared. If the values of the other parameters at the present time are out of normal range, it is judged as abnormal, and the result is alarmed and displayed. (I.S.)

  2. Efficient Joins with Compressed Bitmap Indexes

    Energy Technology Data Exchange (ETDEWEB)

    Computational Research Division; Madduri, Kamesh; Wu, Kesheng

    2009-08-19

    We present a new class of adaptive algorithms that use compressed bitmap indexes to speed up evaluation of the range join query in relational databases. We determine the best strategy to process a join query based on a fast sub-linear time computation of the join selectivity (the ratio of the number of tuples in the result to the total number of possible tuples). In addition, we use compressed bitmaps to represent the join output compactly: the space requirement for storing the tuples representing the join of two relations is asymptotically bounded by min(h; n . cb), where h is the number of tuple pairs in the result relation, n is the number of tuples in the smaller of the two relations, and cb is the cardinality of the larger column being joined. We present a theoretical analysis of our algorithms, as well as experimental results on large-scale synthetic and real data sets. Our implementations are efficient, and consistently outperform well-known approaches for a range of join selectivity factors. For instance, our count-only algorithm is up to three orders of magnitude faster than the sort-merge approach, and our best bitmap index-based algorithm is 1.2x-80x faster than the sort-merge algorithm, for various query instances. We achieve these speedups by exploiting several inherent performance advantages of compressed bitmap indexes for join processing: an implicit partitioning of the attributes, space-efficiency, and tolerance of high-cardinality relations.

  3. Fermilab Friends for Science Education | Join Us

    Science.gov (United States)

    Fermilab Friends for Science Education FFSE Home About Us Join Us Support Us Contact Us Join Us improving science (science, technology, engineering and mathematics) education. Your donation allows us to membership dues allow us to create new, innovative science education programs, making the best use of unique

  4. Radioactive wastes assay technique and equipment

    International Nuclear Information System (INIS)

    Lee, K. M.; Hong, D. S; Kim, T. K.; Bae, S. M.; Shon, J. S.; Hong, K. P.

    2004-12-01

    The waste inventory records such as the activities and radio- nuclides contained in the waste packages are to be submitted with the radioactive wastes packages for the final disposal. The nearly around 10,000 drums of waste stocked in KAERI now should be assayed for the preparation of the waste inventory records too. For the successive execution of the waste assay, the investigation into the present waste assay techniques and equipment are to be taken first. Also the installation of the waste assay equipment through the comprehensive design, manufacturing and procurement should be proceeded timely. As the characteristics of the KAERI-stocked wastes are very different from that of the nuclear power plant and those have no regular waste streams, the application of the in-direct waste assay method using the scaling factors are not effective for the KAERI-generated wastes. Considering for the versal conveniency including the accuracy over the wide range of waste forms and the combination of assay time and sensitivity, the TGS(Tomographic Gamma Scanner) is appropriate as for the KAERI -generated radioactive waste assay equipment

  5. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  6. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin; Papadias, Dimitris; Papadopoulos, Stavros; Kalnis, Panos

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner's signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  7. Process for joining by diffusion two metal parts, particularly in nickel and in Ag-In-Cd alloy

    International Nuclear Information System (INIS)

    Lelievre, Bernard.

    1973-01-01

    The description is given of a process for joining by diffusion two parts in different metals and having a first and second surface identical in shape. This process, which is particularly advantageous for parts in nickel and in an alloy of silver, indium and cadmium, is characterised by the fact that a third and fourth surface parallel to the first and second surface are made on the parts and that the first and second surface are pressed one against the other by means of pressure applied on the third and fourth surface, so as to cause a metal substance to diffuse in the other [fr

  8. Social Security, Intergenerational Transfers, and Endogenous Growth

    OpenAIRE

    Junsen Zhang; Junxi Zhang

    1998-01-01

    In this paper, the effects of social security in a simple model of endogenous growth with alternative motives of having children are analyzed. It shows how the effects of social security depend on the size of the social security tax, the motive to have children, and the pattern of intergenerational transfers. The pattern of intergenerational transfers itself, however, is shown to change with the social security tax rate. When the social security tax is not too high, social security increases ...

  9. Cyber Security and Resilient Systems

    International Nuclear Information System (INIS)

    Anderson, Robert S.

    2009-01-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation's cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested - both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  10. Cyber Security and Resilient Systems

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the

  11. Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

    OpenAIRE

    Jinsoo Shin; Hanseong Son; Gyunyoung Heo

    2017-01-01

    Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluatio...

  12. 46 CFR 159.005-15 - Approval of equipment or material: Suspensions, withdrawals, and terminations.

    Science.gov (United States)

    2010-10-01

    ..., withdrawals, and terminations. 159.005-15 Section 159.005-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL APPROVAL OF..., withdrawals, and terminations. (a) The Commandant suspends an approval issued under this subchapter in...

  13. Security Force Assistance and Security Sector Reform

    Science.gov (United States)

    2013-09-01

    regional trade, on the region’s tourism and fish- ing industries, and on food prices.”42 Other ungoverned maritime territory attractive to illicit...Verde, Mali, Benin, Togo, and Ghana. Drugs from Colombia and Peru , which often transit through Brazil, are shipped across the Atlantic and enter...intrastate struggles that pitted ideological movements against regimes they sought to change. These included Sendero Luminoso in Peru , the Farabundo

  14. Sequences of the joining region genes for immunoglobulin heavy chains and their role in generation of antibody diversity.

    OpenAIRE

    Gough, N M; Bernard, O

    1981-01-01

    To assess the contribution to immunoglobulin heavy chain diversity made by recombination between variable region (VH) genes and joining region (JH) genes, we have determined the sequence of about 2000 nucleotides spanning the rearranged JH gene cluster associated with the VH gene expressed in plasmacytoma HPC76. The active VH76 gene has recombined with the second germ-line JH gene. The region we have studied contains two other JH genes, designated JH3 and JH4. No other JH gene was found withi...

  15. Basic requirements to be established in a norm of radiologic security for operation of measuring equipment

    International Nuclear Information System (INIS)

    Milagros Ruiz, M.; Cateriano, Miguel A.

    2001-01-01

    According to the requirements in Argentina, each user of radioactive material must have a specific Authorization and a person who acts as the responsible for these material. But there is not any specific norm for each one. Dew to what we said before, it is necessary to make a rule to Industrials Uses. That is why this paper tries to establish the basis to do it. (author)

  16. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  17. Problems and future outlook in the nuclear equipment manufacturing industry

    International Nuclear Information System (INIS)

    Suenaga, Soichiro

    1984-01-01

    The energy policy in Japan is based on a balance between the energy security and the energy cost for the purpose of realizing optimal supply/demand structure. In this field, nuclear equipment manufacturers should cooperate in the settlement of LWR power generation through plant safety and reliability and through high economical efficiency, all involving the advancement of technology. As a new concept being developed, there is an APWR (advanced PWR) which has the electric output of 1,350 MWe. The export of nuclear power plants, though there are various problems, should be enhanced in the high-technology export area. The following matters are described: the settlement of and the heightening of technology in nuclear power generation, the development of the advanced PWR, and the measures for the export of nuclear power plants and components. (Mori, K.)

  18. Alberta petroleum equipment and services directory, 1992

    International Nuclear Information System (INIS)

    1992-01-01

    A directory is presented of Alberta companies that provide equipment and services to the oil industry. In the main section, companies are listed alphabetically by name, along with their addresses, phone/fax numbers, contact personnel, and lists of products and/or services. A separate alphabetical name index and a product/service index are included. A section covering provincial and territorial government agencies and non-governmental associations and institutes is appended, giving name, address, phone/fax number, leading personnel, and a summary of activities

  19. Secure Transportation Management

    International Nuclear Information System (INIS)

    Gibbs, P. W.

    2014-01-01

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  20. Hydrogen and Fuel Cells for IT Equipment

    Energy Technology Data Exchange (ETDEWEB)

    Kurtz, Jennifer

    2016-03-09

    With the increased push for carbon-free and sustainable data centers, data center operators are increasingly looking to renewable energy as a means to approach carbon-free status and be more sustainable. The National Renewable Energy Laboratory (NREL) is a world leader in hydrogen research and already has an elaborate hydrogen infrastructure in place at the Golden, Colorado, state-of-the-art data center and facility. This presentation will discuss hydrogen generation, storage considerations, and safety issues as they relate to hydrogen delivery to fuel cells powering IT equipment.

  1. Procuring, maintaining and using equipment: the key issues in controlling exposure to patients

    International Nuclear Information System (INIS)

    Hendra, I.R.F.

    1989-01-01

    Radiological equipment is not purpose-built for each individual application. Thus, not only are acceptance criteria directly related to the design of equipment and the quality assurance exercised during its manufacture, but also the performance, safety and reliability of equipment must feature in the requirements for procuring new equipment. In the UK this issue is dealt with under the Department of Health and Social Security Manufacturer Registration Scheme for Medical Equipment in its application to radiological equipment. Similarly the continuing reliability of equipment in service is directly related to the quality of maintenance services. This is determined largely by the manner in which such services are procured. In the UK this issue has been considered by one of four Working Parties commissioned by the South-East Thames Regional Health Authority who are the ''Centre of Responsibility'' for diagnostic imaging equipment. The report prepared from the first phase of activity of this working group describes features of a procurement specification for maintenance services and prescribes the complementary duties of contractors and customers. The use in X-ray departments of the kind of manufacturing quality system that is used by most reputable equipment manufacturers has the potential for a dramatic reduction in exposure to patients. (author)

  2. Video equipment of tele dosimetry and audio

    International Nuclear Information System (INIS)

    Ojeda R, M.A.; Padilla C, I.

    2007-01-01

    To develop a work in an area with high radiation, it requires of a detailed knowledge of the surroundings work, a communication and effective vision, a near dosimetric control. In a work where the spaces variables and reduced accesses exist, noise that hinders the communication, defendant operative condition, radiation field and taking of decision, it is necessary to have tools that allow a total control of the environment to make opportune and effective decisions, there where the task is developed. Under this elementary concept, it was developed in the Laguna Verde Central a project that it allowed a mechanism, interactive of control in spaces complex; to see, to hear, to speak, to measure. This concept takes to the creation of an equipped system with closed circuit of television, wireless communication systems, tele dosimetry wireless systems, VHS and DVD recording equipment, uninterrupted energy units. The system requires of an electric power socket, and the installation of two cables by CCTV camera. The system is mobilized by a person. He puts on in operation in 5 minutes using a verification list. The concept was developed in the project denominated VETA-1, (Video Equipment of Tele dosimetry and Audio). It is objective of this work to present before the society the development of the VETA-1 tool that conclude in their first prototype in May of the present year. The VETA-1 project arises by a necessity of optimizing dose, it is an ALARA tool, with a countless applications, like it was proven in the 12 recharge stop of the Unit 1. The VETA-1 project integrate a recording system, with the primary end of analyzing in the place where the task is developed the details for an effective and opportune decision, but the resulting information is of utility for the personnel's training and the planning of future works. The VETA-1 system is an ALARA tool of quick response control. (Author)

  3. 17 CFR 404.5 - Securities counts by registered government securities brokers and dealers.

    Science.gov (United States)

    2010-04-01

    ... registered government securities brokers and dealers. 404.5 Section 404.5 Commodity and Securities Exchanges... AND PRESERVATION OF RECORDS § 404.5 Securities counts by registered government securities brokers and dealers. (a) Securities counts. Every registered government securities broker or dealer shall comply with...

  4. Use of commercial grade equipment and industrial standards for equipment qualification

    International Nuclear Information System (INIS)

    Gradin, L.P.; Muller, E.S.

    1984-01-01

    One of the most controversial issues is the proper application of Arrhenius aging methodology. Naturally and artificially aged equipment used in type test programs are often costly and burdensome tasks. Appropriate use of non-nuclear industrial standards and comparison to past history can demonstrate, with reasonable assurance, that equipment is qualified with proper consideration of aging. Specific review of the industrial standards available and application examples are provided

  5. Equipment for linking source stand and film holder carriage

    International Nuclear Information System (INIS)

    Fajt, P.; Zeman, M.

    1987-01-01

    A device is described for precision link-up of a source stand provided with a spring-loaded cam and a film holder carriage provided with an arm with catches. The catches are mechanically connected to a control device firmly connected to the bottom part of the film holder carriage arm. The cam whose extended part is slidably mounted in the cover guide is secured in position with springs fitted from both sides. The control device consists of an electromagnet with armature connected to the control device pull-rod. The pull-rod provides mechanical connection of the catches and the control device. Upon pressing the pushbutton, the catches automatically engage the film holder cariage arm so that the motorized source stand operates without connection to the carriage. This significantly facilitates the operation of the equipment and reduces physical effort of the technician. The most significant advantage is the possibility of immediate change in operation mode. (J.B.). 5 figs

  6. Biomedical devices and systems security.

    Science.gov (United States)

    Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup

    2011-01-01

    Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.

  7. Chrysler Upset Protrusion Joining Techniques for Joining Dissimilar Metals

    Energy Technology Data Exchange (ETDEWEB)

    Logan, Stephen [FCA US LLC, Auburn Hills, MI (United States)

    2017-09-28

    The project goal was to develop and demonstrate a robust, cost effective, and versatile joining technique, known as Upset Protrusion Joining (UPJ), for joining challenging dissimilar metal com-binations, especially those where one of the metals is a die cast magnesium (Mg) component. Since two of the key obstacles preventing more widespread use of light metals (especially in high volume automotive applications) are 1) a lack of robust joining techniques and 2) susceptibility to galvanic corrosion, and since the majority of the joint combinations evaluated in this project include die cast Mg (the lightest structural metal) as one of the two materials being joined, and since die casting is the most common and cost effective process for producing Mg components, then successful project completion provides a key enabler to high volume application of lightweight materials, thus potentially leading to reduced costs, and encouraging implementation of lightweight multi-material vehicles for significant reductions in energy consumption and reduced greenhouse gas emissions. Eco-nomic benefits to end-use consumers are achieved primarily via the reduction in fuel consumption. Unlike currently available commercial processes, the UPJ process relies on a very robust mechanical joint rather than intermetallic bonding, so the more cathodic material can be coated prior to joining, thus creating a robust isolation against galvanic attack on the more anodic material. Additionally, since the UPJ protrusion is going through a hole that can be pre-drilled or pre-punched prior to coating, the UPJ process is less likely to damage the coating when the joint is being made. Further-more, since there is no additional cathodic material (such as a steel fastener) used to create the joint, there is no joining induced galvanic activity beyond that of the two parent materials. In accordance with its originally proposed plan, this project has successfully developed process variants of UPJ to enable

  8. Tertiary recovery and tritide injection equipment

    International Nuclear Information System (INIS)

    Li Lin

    1989-01-01

    The exploitation of an oil field is a continously developing process, undergoing seveal stages, such as the low production, the high production, the stable production and the decline. The tertiary recovery is an important means of the enhanced oil recovery. Since the object of the tertiary recovery is to treat the oil in micropores which is difficult to be produced, it is more necessary to know further the reservoir. Tritide can be used as a tracer and is an ideal marker of knowing the reservoir and the state of the fluid movement. The paper presents the tritide injection equipment

  9. The House of Security: Stakeholder Perceptions of Security Assessment and Importance

    OpenAIRE

    Ang, Wee Horng; Deng, Vicki; Lee, Yang; Madnick, Stuart; Mistree, Dinsha; Siegel, Michael; Strong, Diane

    2007-01-01

    In this paper we introduce a methodology for analyzing differences regarding security perceptions within and between stakeholders, and the elements which affect these perceptions. We have designed the €܈ouse of Security€ݬ a security assessment model that provides the basic framework for considering eight different constructs of security: Vulnerability, Accessibility, Confidentiality, Technology Resources for Security, Financial Resources for Security, Business Strategy for Security, Secur...

  10. Joining of pressureless-sintered SiC to stainless steel using Ag-Cu alloy and insert-metals

    International Nuclear Information System (INIS)

    Yano, Toyohiko; Takada, Naohiro; Iseki, Takayoshi

    1987-01-01

    Brazing of pressureless-sintered SiC to stainless steel using Ag-28 wt% Cu alloy was studied. In SiC plate joined to stainless steel rod (6 mm in diameter) using an Ag-Cu alloy powder containing 1.5 wt% Ti, the bond strength increased with decreasing brazing temperature and holding time. When the increased size of stainless steel plate (10 x 10 x 4 mm), joining was unsuccessful by the method mentioned above and even with Ti insert-metal. However, simultaneous use of Ti and Mo as insert-metal gave a good bonding in the order SiC/Ti/Mo/stainless steel, because of relaxation of residual stress due to thermal expansion mismatch. The shear strength was 30 - 50 MPa. A thin layer, probably Ti 3 SiC 2 , was observed at the interface between SiC and brazing filler immediately after melting. But with increasing both temperature and time, Ti 5 Si 3 (C) and TiC x were formed if Ti was continuously provided from the brazing filler. Since the interface of Ti 3 SiC 2 and either Ti 5 Si 3 (C) or TiC x seemed to be brittle, the formation of Ti 5 Si 3 (C) and TiC x decreased the bond strength. At lower temperature and short time, a high bond strength is expected when Ti was inserted in contact with SiC. (author)

  11. Atomic Structure and Nonhomologous End-Joining Function of the Polymerase Component of Bacterial DNA Ligase D

    Energy Technology Data Exchange (ETDEWEB)

    Zhu,H.; Nandakumar, J.; Aniukwu, J.; Wang, L.; Glickman, M.; Lima, C.; Shuman, S.

    2006-01-01

    DNA ligase D (LigD) is a large polyfunctional protein that participates in a recently discovered pathway of nonhomologous end-joining in bacteria. LigD consists of an ATP-dependent ligase domain fused to a polymerase domain (Pol) and a phosphoesterase module. The Pol activity is remarkable for its dependence on manganese, its ability to perform templated and nontemplated primer extension reactions, and its preference for adding ribonucleotides to blunt DNA ends. Here we report the 1.5- Angstroms crystal structure of the Pol domain of Pseudomonas LigD and its complexes with manganese and ATP-dATP substrates, which reveal a minimized polymerase with a two-metal mechanism and a fold similar to that of archaeal DNA primase. Mutational analysis highlights the functionally relevant atomic contacts in the active site. Although distinct nucleoside conformations and contacts for ATP versus dATP are observed in the cocrystals, the functional analysis suggests that the ATP-binding mode is the productive conformation for dNMP and rNMP incorporation. We find that a mutation of Mycobacterium LigD that uniquely ablates the polymerase activity results in increased fidelity of blunt-end double-strand break repair in vivo by virtue of eliminating nucleotide insertions at the recombination junctions. Thus, LigD Pol is a direct catalyst of mutagenic nonhomologous end-joining in vivo. Our studies underscore a previously uncharacterized role for the primase-like polymerase family in DNA repair.

  12. Radiation hardened equipment and material data base

    International Nuclear Information System (INIS)

    Sumita, Kenji; Yamaoka, Hitoshi; Kakuta, Tsunemi; Shono, Yoshihiko; Nakamura, Tetsuo; Nakase, Yoshiaki; Furuta, Junichiro.

    1988-01-01

    In order to collect and put in order the results regarding radiation-withstanding equipment and materials, the Osaka Nuclear Science Association organized the committee composed of the experts in various fields in fiscal year 1986 for the purpose of building up the data base, and began the activity. From the trend of the research and development and the usefulness for the future, the fields of collecting data were decided as organic materials, optical fibers, semiconductor elements and compound semiconductors. By fiscal year 1987, the building-up of the prototype data base was aimed at, and system configuration, the making of the formats on the items and attributes of collected data, the action test of the system and so on were carried out. Under the background of the upgrading of LWRs, the development of FBRs and nuclear fusion reactors, the construction of a reprocessing plant and a low level waste storage facility, and the progress of various advanced technologies, the research on the equipment and materials having excellent radiation resistance and the development for heightening the performance have been carried out in many places separately, accordingly the activity for building up the prototype data base was begun, and about 600 cases were collected. (Kako, I.)

  13. Interfacial microstructure and joining properties of Titanium–Zirconium–Molybdenum alloy joints brazed using Ti–28Ni eutectic brazing alloy

    Energy Technology Data Exchange (ETDEWEB)

    Song, X.G., E-mail: songxg@hitwh.edu.cn [State Key Laboratory of Advanced Welding and Joining, Harbin Institute of Technology, Harbin 150001 (China); Shandong Provincial Key Lab of Special Welding Technology, Harbin Institute of Technology at Weihai, Weihai 264209 (China); Tian, X. [State Key Laboratory of Advanced Welding and Joining, Harbin Institute of Technology, Harbin 150001 (China); Shandong Provincial Key Lab of Special Welding Technology, Harbin Institute of Technology at Weihai, Weihai 264209 (China); Zhao, H.Y. [Shandong Provincial Key Lab of Special Welding Technology, Harbin Institute of Technology at Weihai, Weihai 264209 (China); Si, X.Q.; Han, G.H.; Feng, J.C. [State Key Laboratory of Advanced Welding and Joining, Harbin Institute of Technology, Harbin 150001 (China); Shandong Provincial Key Lab of Special Welding Technology, Harbin Institute of Technology at Weihai, Weihai 264209 (China)

    2016-01-20

    Vacuum brazing of Titanium–Zirconium–Molybdenum (Abbreviated as TZM) alloy using Ti–28Ni (wt%) eutectic brazing alloy was successfully achieved in this study. Reliable TZM brazed joints were obtained at the temperatures ranging from 1000 °C to 1160 °C for 600 s. The interfacial microstructure of TZM joints was characterized by employing SEM, EDS and XRD. The effects of brazing temperature on interfacial microstructure and joining properties were investigated in details. TZM brazed joints mainly consisted of δ-Ti{sub 2}Ni phase and Ti-based solid solution (Ti(s,s)). The interfacial microstructure of TZM joints was influenced obviously by brazing temperature. Both the thickness of brazing seam and the amount of δ-Ti{sub 2}Ni phase was reduced with the increasing brazing temperature, while the Ti(s,s) layer did not change significantly. The maximum average shear strength of TZM joints reached 107 MPa when brazed at 1080 °C. The presence of δ-Ti{sub 2}Ni intermetallic phase and crack-like structure in joints deteriorated the joining properties, which resulted in the formation of brittle fracture after shear test. In addition, fracture locations were related to the brazing temperature. When the brazing temperature was relatively low, cracks initiated and propagated in the continuous δ-Ti{sub 2}Ni layer. However, the fracture locations preferred to locating at the interface between TZM substrate and brazing seam when brazing temperature exceeded 1080 °C.

  14. Synthesis and characterization of Ni-Mo filler brazing alloy for Mo-W joining for microwave tube technology

    Directory of Open Access Journals (Sweden)

    Frank Ferrer Sene

    2013-04-01

    Full Text Available A brazing process based on Ni-Mo alloy was developed to join porous tungsten cathode bottom and dense molybdenum cathode body for microwave tubes manufacture. The Ni-Mo alloy was obtained by mixing and milling powders in the eutectic composition, and applied on the surface of the components. The brazing was made at 1400 °C by using induction heating in hydrogen for 5 minutes. Alumina surfaces were coated with the binder and analyzed by Energy Dispersive X-rays Fluorescence. The brazed samples were analyzed by Scanning Electron Microscopy coupled to Energy Dispersive Spectroscopy. Stress-strain tests were performed to determine the mechanical behavior of the joining. The quality of the brazing was evaluated by assuring the presence of a "meniscus" formed by the Ni-Mo alloy on the border of the tungsten and molybdenum joint, the absence of microstructural defects in the interface between the tungsten and molybdenum alloys, and the adhesion of the brazed components.

  15. Carboxylate and amino group coated silver nanoparticles as joining materials for copper-to-copper silver joints.

    Science.gov (United States)

    Oestreicher, A; Röhrich, T; Lerch, M

    2012-12-01

    Organic silver complexes are introduced where silver is linked either with a carboxyl group or with an amino group. Upon heating, nanoparticles are generated if the respective ligands are long enough to act as stabilizing agents in the nanoparticulate regime. With decomposition and volatilization of the organic material, the sintering of silver occurs. The thermal characteristics of the carboxylates silver-n-octanoate, silver-n-decanoate, and AgOOC(CH2OCH2)2CH2OCH3 are compared with silver-n-alkylamines (n = 8, 9, and 12), and their thermal behavior is discussed based on thermogravimetry (TG) measurements. The consecutive stages of a metallization process are addressed based on the properties of AgOOC(CH2OCH2)2CH2OCH3, and the usable effects of the individual phases of this metal organic compound are analyzed by cross-sectional scanning electron microscope (SEM) images of silver joints. Selection criteria are addressed based on the thermal behavior. A mechanism for the joining process is proposed, considering formation and sintering of the nanoparticles. It was found that the bulk material can be used for low-temperature joining processes. Strong adherence to copper as a basic material can be achieved.

  16. Digital I and C: Safety, Security and Availability

    International Nuclear Information System (INIS)

    Liebhart, E.

    2012-01-01

    When planning to use digital I and C equipment in nuclear facilities (such as nuclear power plants or research reactors) the main concern is how to manage and control the aspect of 'software as part of digital I and C equipment'. Advantages, possible implications and risks of using digital signal processing channels, especially regarding the two key aspects of operational safety and cyber security are addressed, including examples of today's electronics such as Mirion's digital signal processing system Model proTK (or TK 250). (author)

  17. Redundant function of DNA ligase 1 and 3 in alternative end-joining during immunoglobulin class switch recombination.

    Science.gov (United States)

    Masani, Shahnaz; Han, Li; Meek, Katheryn; Yu, Kefei

    2016-02-02

    Nonhomologous end-joining (NHEJ) is the major DNA double-strand break (DSB) repair pathway in mammals and resolves the DSBs generated during both V(D)J recombination in developing lymphocytes and class switch recombination (CSR) in antigen-stimulated B cells. In contrast to the absolute requirement for NHEJ to resolve DSBs associated with V(D)J recombination, DSBs associated with CSR can be resolved in NHEJ-deficient cells (albeit at a reduced level) by a poorly defined alternative end-joining (A-EJ) pathway. Deletion of DNA ligase IV (Lig4), a core component of the NHEJ pathway, reduces CSR efficiency in a mouse B-cell line capable of robust cytokine-stimulated CSR in cell culture. Here, we report that CSR levels are not further reduced by deletion of either of the two remaining DNA ligases (Lig1 and nuclear Lig3) in Lig4(-/-) cells. We conclude that in the absence of Lig4, Lig1, and Lig3 function in a redundant manner in resolving switch region DSBs during CSR.

  18. Security and the networked society

    CERN Document Server

    Gregory, Mark

    2013-01-01

    This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors' analysis forms the basis of a discussion on future technological directions and their potential impact on society. T

  19. Willmore energy for joining of carbon nanostructures

    Science.gov (United States)

    Sripaturad, P.; Alshammari, N. A.; Thamwattana, N.; McCoy, J. A.; Baowan, D.

    2018-06-01

    Numerous types of carbon nanostructure have been found experimentally, including nanotubes, fullerenes and nanocones. These structures have applications in various nanoscale devices and the joining of these structures may lead to further new configurations with more remarkable properties and applications. The join profile between different carbon nanostructures in a symmetric configuration may be modelled using the calculus of variations. In previous studies, carbon nanostructures were assumed to deform according to perfect elasticity, thus the elastic energy, depending only on the axial curvature, was used to determine the join profile consisting of a finite number of discrete bonds. However, one could argue that the relevant energy should also involve the rotational curvature, especially when its size is comparable to the axial curvature. In this paper, we use the Willmore energy, a natural generalisation of the elastic energy that depends on both the axial and rotational curvatures. Catenoids are absolute minimisers of this energy and pieces of these may be used to join various nanostructures. We focus on the cases of joining a fullerene to a nanotube and joining two fullerenes along a common axis. By comparing our results with the earlier work, we find that both energies give similar joining profiles. Further work on other configurations may reveal which energy provides a better model.

  20. Welding technologies for nuclear machinery and equipment

    International Nuclear Information System (INIS)

    Kobayashi, Masahiro; Yokono, Tomomi.

    1991-01-01

    The main welding methods applied to nuclear machinery and equipment are shielded metal arc welding, submerged arc welding, MAG welding and TIG welding. But in the last 10 years, in order to improve the reliability required for the welding of nuclear machinery and equipment, the welding technologies aiming at the reduction of heat input, the decrease of the number of welding pass and the automatic control of welding factors have been applied for the main purpose of bettering the quality and excluding human errors. The merits and the technology of narrow gap, pulsed MAG welding and melt-through welding are explained. As the automation of TIG welding, image processing type narrow gap, hot wire TIG welding and remote control type automatic TIG welding are described. For the longitudinal welding of active metal sheet products, plasma key-hole welding is applied. Since the concentration of its arc is good, high speed welding with low heat input can be done. For the stainless steel cladding by welding, electroslag welding has become to be employed in place of conventional submerged arc welding. Arc is not generated in the electroslag welding, and the penetration into base metal is small. (K.I.)

  1. Investigation equipment and methods used by Posiva

    International Nuclear Information System (INIS)

    Oehberg, A.

    2006-10-01

    Posiva Oy, a company jointly owned by TVO and Fortum, submitted an application for the Decision in Principle to the Finnish Government in May 1999. A positive decision was made at the end of 2000 by the Government. The Finnish Parliament ratified the Decision in Principle on the final disposal facility for spent nuclear fuel at Olkiluoto, Eurajoki in May 2001. The decision makes it possible for Posiva to focus the confirming bedrock investigations at Olkiluoto, where in the next few years an underground research facility, ONKALO, for rock characterisation for the final disposal of spent nuclear fuel will be constructed. The construction of the ONKALO access tunnel was started in September 2004. This report describes the investigation methods and equipment developed and used by Posiva Oy during the confirming site investigations from the surface. The report covers the areas of drilling of deep investigation holes, geophysical loggings, geophysical ground and tunnel surveys, hydrogeological and hydrogeochemical as well as rock mechanical methods. Emphasis is given on those equipment and methods developed by Posiva and those that have frequently and recently been used in the Posiva's characterisation programmes including methods applied during excavation of ONKALO access tunnel. The database used for the field investigation data is also briefly described in this report. (orig.)

  2. Security Economics and European Policy

    Science.gov (United States)

    Anderson, Ross; Böhme, Rainer; Clayton, Richard; Moor, Tyler

    In September 2007, we were awarded a contract by the European Network and Information Security Agency (ENISA) to investigate failures in the market for secure electronic communications within the European Union, and come up with policy recommendations. In the process, we spoke to a large number of stakeholders, and held a consultative meeting in December 2007 in Brussels to present draft proposals, which established most had wide stakeholder support. The formal outcome of our work was a detailed report, “Security Economics and the Internal Market”, published by ENISA in March 2008. This paper presents a much abridged version: in it, we present the recommendations we made, along with a summary of our reasoning.

  3. Wireless network security theories and applications

    CERN Document Server

    Chen, Lei; Zhang, Zihong

    2013-01-01

    Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth

  4. Northern Security and Global Politics

    DEFF Research Database (Denmark)

    This book takes a comprehensive approach to security in the Nordic-Baltic region, studying how this region is affected by developments in the international system. The advent of the new millennium coincided with the return of the High North to the world stage. A number of factors have contributed......-unipolar", indicating a period of flux and of declining US unipolar hegemony. Drawing together contributions from key thinkers in the field, Northern Security and Global Politics explores how this situation has affected the Nordic-Baltic area by addressing two broad sets of questions. First, it examines what impact...... declining unipolarity - with a geopolitical shift to Asia, a reduced role for Europe in United States policy, and a more assertive Russia - will have on regional Nordic-Baltic security. Second, it takes a closer look at how the regional actors respond to these changes in their strategic environment...

  5. International security and arms control

    International Nuclear Information System (INIS)

    Ekeus, R.

    2000-01-01

    The end of the cold war also ended the focus on the bilateral approach to arms control and disarmament. Key concepts of security needed to be revisited, along with their implications for the disarmament and arms control agenda. Though there is currently a unipolar global security environment, there remain important tasks on the multilateral arms control agenda. The major task is that of reducing and eliminating weapons of mass destruction, especially nuclear weapons. The author contends that maintaining reliance on the nuclear-weapons option makes little sense in a time when the major Powers are strengthening their partnerships in economics, trade, peacemaking and building. (author)

  6. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  7. Lipofection and nucleofection of substrate plasmid can generate widely different readings of DNA end-joining efficiency in different cell lines.

    Science.gov (United States)

    Magin, Simon; Saha, Janapriya; Wang, Minli; Mladenova, Veronika; Coym, Nadine; Iliakis, George

    2013-02-01

    In vivo plasmid end-joining assays are valuable tools for dissecting important qualitative and quantitative aspects of non-homologous end-joining (NHEJ)--a key mechanism for the repair of DNA double-strand breaks (DSBs) in higher eukaryotes. They enable the use of defined DNA ends as substrates for end-joining and the analysis by sequencing of the resulting junctions to identify the repair pathways engaged. Yet, plasmid assays have generated divergent results of end-joining capacity in the same DSB repair mutants when used under different conditions, which implies contributions from undefined and therefore uncontrolled parameters. To help standardize these assays, we searched for parameters underpinning these variations and identified transfection method as an important determinant. Here, we compare a lipid-based transfection method, lipofection, with an electroporation method, nucleofection, and find large, unanticipated and cell line-dependent differences in percent end-joining without recognizable trends. For example, in rodent cells, transfection using lipofection gives nearly WT end-joining in DNA-PKcs mutants and only mildly inhibited end-joining in Lig4 and Ku mutants. In contrast, transfection using nucleofection shows marked end-joining inhibition in all NHEJ mutants tested as compared to the WT. In human HCT116 cells, end-joining after nucleofection is strongly suppressed even in the WT and the differences to the mutants are small. After lipofection, in contrast, end-joining is high in WT cells and markedly suppressed in the mutants. We conclude that better understanding and control of the physicochemical/biological and analytical parameters underpinning these differences will be required to generate with plasmid assays results with quantitative power comparable to that of well-established methods of DSB analysis such as pulsed-field gel electrophoresis or γ-H2AX foci scoring. Until then, caution is needed in the interpretation of the results obtained

  8. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  9. 21 CFR 211.67 - Equipment cleaning and maintenance.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Equipment cleaning and maintenance. 211.67 Section 211.67 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED... Equipment cleaning and maintenance. (a) Equipment and utensils shall be cleaned, maintained, and, as...

  10. Symmetric bends how to join two lengths of cord

    CERN Document Server

    Miles, Roger E

    1995-01-01

    A bend is a knot securely joining together two lengths of cord (or string or rope), thereby yielding a single longer length. There are many possible different bends, and a natural question that has probably occurred to many is: "Is there a 'best' bend and, if so, what is it?"Most of the well-known bends happen to be symmetric - that is, the two constituent cords within the bend have the same geometric shape and size, and interrelationship with the other. Such 'symmetric bends' have great beauty, especially when the two cords bear different colours. Moreover, they have the practical advantage o

  11. Diagnostic x-ray equipment and its use

    International Nuclear Information System (INIS)

    1993-01-01

    The guide contains the requirements for the use, structure and operation of diagnostic x-ray equipment necessary to ensure the radiation safety of workers and patients. The guide is intended for the party responsible for operating the x-ray units, the staff operating, installing and maintaining x-ray examination equipment, and companies manufacturing and selling such equipment. Special requirements for mammographic and dental x-ray equipments are given in separate ST guides. (5 refs., 1 figs., 2 tabs.)

  12. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    International Nuclear Information System (INIS)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-01-01

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a 'dirty bomb'. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  13. School Security: Planning and Costs.

    Science.gov (United States)

    Hunter, Richard C.; Mazingo, Terri H.

    2003-01-01

    Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…

  14. Convergence of Corporate and Information Security

    OpenAIRE

    Syed; Rahman, M.; Donahue, Shannon E.

    2010-01-01

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper rep...

  15. 14 CFR 121.303 - Airplane instruments and equipment.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Airplane instruments and equipment. 121.303... Airplane instruments and equipment. (a) Unless otherwise specified, the instrument and equipment... airspeed limitation and item of related information in the Airplane Flight Manual and pertinent placards...

  16. 21 CFR 211.182 - Equipment cleaning and use log.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 4 2010-04-01 2010-04-01 false Equipment cleaning and use log. 211.182 Section 211.182 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES... Reports § 211.182 Equipment cleaning and use log. A written record of major equipment cleaning...

  17. Plant-wide integrated equipment monitoring and analysis system

    International Nuclear Information System (INIS)

    Morimoto, C.N.; Hunter, T.A.; Chiang, S.C.

    2004-01-01

    A nuclear power plant equipment monitoring system monitors plant equipment and reports deteriorating equipment conditions. The more advanced equipment monitoring systems can also provide information for understanding the symptoms and diagnosing the root cause of a problem. Maximizing the equipment availability and minimizing or eliminating consequential damages are the ultimate goals of equipment monitoring systems. GE Integrated Equipment Monitoring System (GEIEMS) is designed as an integrated intelligent monitoring and analysis system for plant-wide application for BWR plants. This approach reduces system maintenance efforts and equipment monitoring costs and provides information for integrated planning. This paper describes GEIEMS and how the current system is being upgraded to meet General Electric's vision for plant-wide decision support. (author)

  18. chemical safety and chemical security overview

    African Journals Online (AJOL)

    IICBA01

    Wafaa M. Abdou. Chemical Industries Division, National Research Centre, ... substances to attain an acceptably low risk of exposure. Security is: ... Sharing locations of chemicals can publicize targets for theft .... D. Personal Protective Equipments (PPE): ... E. Lighting & Noise Levels ... PPE. ➢ Autoclave or sterilize wastes.

  19. 29 CFR 1910.306 - Specific purpose equipment and installations.

    Science.gov (United States)

    2010-07-01

    ...) Cranes and hoists. This paragraph applies to the installation of electric equipment and wiring used in..., and similar events. This paragraph covers the installation of portable wiring and equipment, including... 29 Labor 5 2010-07-01 2010-07-01 false Specific purpose equipment and installations. 1910.306...

  20. 21 CFR 58.63 - Maintenance and calibration of equipment.

    Science.gov (United States)

    2010-04-01

    ... GOOD LABORATORY PRACTICE FOR NONCLINICAL LABORATORY STUDIES Equipment § 58.63 Maintenance and... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Maintenance and calibration of equipment. 58.63..., maintenance, testing, calibration, and/or standardization of equipment, and shall specify, when appropriate...