WorldWideScience

Sample records for shielding information computer

  1. Shielding Benchmark Computational Analysis

    International Nuclear Information System (INIS)

    Hunter, H.T.; Slater, C.O.; Holland, L.B.; Tracz, G.; Marshall, W.J.; Parsons, J.L.

    2000-01-01

    Over the past several decades, nuclear science has relied on experimental research to verify and validate information about shielding nuclear radiation for a variety of applications. These benchmarks are compared with results from computer code models and are useful for the development of more accurate cross-section libraries, computer code development of radiation transport modeling, and building accurate tests for miniature shielding mockups of new nuclear facilities. When documenting measurements, one must describe many parts of the experimental results to allow a complete computational analysis. Both old and new benchmark experiments, by any definition, must provide a sound basis for modeling more complex geometries required for quality assurance and cost savings in nuclear project development. Benchmarks may involve one or many materials and thicknesses, types of sources, and measurement techniques. In this paper the benchmark experiments of varying complexity are chosen to study the transport properties of some popular materials and thicknesses. These were analyzed using three-dimensional (3-D) models and continuous energy libraries of MCNP4B2, a Monte Carlo code developed at Los Alamos National Laboratory, New Mexico. A shielding benchmark library provided the experimental data and allowed a wide range of choices for source, geometry, and measurement data. The experimental data had often been used in previous analyses by reputable groups such as the Cross Section Evaluation Working Group (CSEWG) and the Organization for Economic Cooperation and Development/Nuclear Energy Agency Nuclear Science Committee (OECD/NEANSC)

  2. Radiation Shielding Information Center: a source of computer codes and data for fusion neutronics studies

    International Nuclear Information System (INIS)

    McGill, B.L.; Roussin, R.W.; Trubey, D.K.; Maskewitz, B.F.

    1980-01-01

    The Radiation Shielding Information Center (RSIC), established in 1962 to collect, package, analyze, and disseminate information, computer codes, and data in the area of radiation transport related to fission, is now being utilized to support fusion neutronics technology. The major activities include: (1) answering technical inquiries on radiation transport problems, (2) collecting, packaging, testing, and disseminating computing technology and data libraries, and (3) reviewing literature and operating a computer-based information retrieval system containing material pertinent to radiation transport analysis. The computer codes emphasize methods for solving the Boltzmann equation such as the discrete ordinates and Monte Carlo techniques, both of which are widely used in fusion neutronics. The data packages include multigroup coupled neutron-gamma-ray cross sections and kerma coefficients, other nuclear data, and radiation transport benchmark problem results

  3. Abstracts of digital computer code packages assembled by the Radiation Shielding Information Center

    Energy Technology Data Exchange (ETDEWEB)

    Carter, B.J.; Maskewitz, B.F.

    1985-04-01

    This publication, ORNL/RSIC-13, Volumes I to III Revised, has resulted from an internal audit of the first 168 packages of computing technology in the Computer Codes Collection (CCC) of the Radiation Shielding Information Center (RSIC). It replaces the earlier three documents published as single volumes between 1966 to 1972. A significant number of the early code packages were considered to be obsolete and were removed from the collection in the audit process and the CCC numbers were not reassigned. Others not currently being used by the nuclear R and D community were retained in the collection to preserve technology not replaced by newer methods, or were considered of potential value for reference purposes. Much of the early technology, however, has improved through developer/RSIC/user interaction and continues at the forefront of the advancing state-of-the-art.

  4. Abstracts of digital computer code packages assembled by the Radiation Shielding Information Center

    International Nuclear Information System (INIS)

    Carter, B.J.; Maskewitz, B.F.

    1985-04-01

    This publication, ORNL/RSIC-13, Volumes I to III Revised, has resulted from an internal audit of the first 168 packages of computing technology in the Computer Codes Collection (CCC) of the Radiation Shielding Information Center (RSIC). It replaces the earlier three documents published as single volumes between 1966 to 1972. A significant number of the early code packages were considered to be obsolete and were removed from the collection in the audit process and the CCC numbers were not reassigned. Others not currently being used by the nuclear R and D community were retained in the collection to preserve technology not replaced by newer methods, or were considered of potential value for reference purposes. Much of the early technology, however, has improved through developer/RSIC/user interaction and continues at the forefront of the advancing state-of-the-art

  5. Radiation transport and shielding information, computer codes, and nuclear data for use in CTR neutronics research and development

    International Nuclear Information System (INIS)

    Santoro, R.T.; Maskewitz, B.F.; Roussin, R.W.; Trubey, D.K.

    1976-01-01

    The activities of the Radiation Shielding Information Center (RSIC) of the Oak Ridge National Laboratory are being utilized in support of fusion reactor technology. The major activities of RSIC include the operation of a computer-based information storage and retrieval system, the collection, packaging, and distribution of large computer codes, and the compilation and dissemination of processed and evaluated data libraries, with particular emphasis on neutron and gamma-ray cross-section data. The Center has acquired thirteen years of experience in serving fission reactor, weapons, and accelerator shielding research communities, and the extension of its technical base to fusion reactor research represents a logical progression. RSIC is currently working with fusion reactor researchers and contractors in computer code development to provide tested radiation transport and shielding codes and data library packages. Of significant interest to the CTR community are the 100 energy group neutron and 21 energy group gamma-ray coupled cross-section data package (DLC-37) for neutronics studies, a comprehensive 171 energy group neutron and 36 energy group gamma-ray coupled cross-section data base with retrieval programs, including resonance self-shielding, that are tailored to CTR application, and a data base for the generation of energy-dependent atomic displacement and gas production cross sections and heavy-particle-recoil spectra for estimating radiation damage to CTR structural components

  6. Computed tomography shielding methods: a literature review.

    Science.gov (United States)

    Curtis, Jessica Ryann

    2010-01-01

    To investigate available shielding methods in an effort to further awareness and understanding of existing preventive measures related to patient exposure in computed tomography (CT) scanning. Searches were conducted to locate literature discussing the effectiveness of commercially available shields. Literature containing information regarding breast, gonad, eye and thyroid shielding was identified. Because of rapidly advancing technology, the selection of articles was limited to those published within the past 5 years. The selected studies were examined using the following topics as guidelines: the effectiveness of the shield (percentage of dose reduction), the shield's effect on image quality, arguments for or against its use (including practicality) and overall recommendation for its use in clinical practice. Only a limited number of studies have been performed on the use of shields for the eyes, thyroid and gonads, but the evidence shows an overall benefit to their use. Breast shielding has been the most studied shielding method, with consistent agreement throughout the literature on its effectiveness at reducing radiation dose. The effect of shielding on image quality was not remarkable in a majority of studies. Although it is noted that more studies need to be conducted regarding the impact on image quality, the currently published literature stresses the importance of shielding in reducing dose. Commercially available shields for the breast, thyroid, eyes and gonads should be implemented in clinical practice. Further research is needed to ascertain the prevalence of shielding in the clinical setting.

  7. Radiation transport and shielding information, computer codes, and nuclear data for use in CTR neutronics research and development

    International Nuclear Information System (INIS)

    Santoro, R.T.; Maskewitz, B.F.; Roussin, R.W.; Trubey, D.K.

    1976-01-01

    The activities of the Radiation Shielding Information Center (RSIC) of the Oak Ridge National Laboratory are being utilized in support of fusion reactor technology. The major activities of RSIC include the operation of a computer-based information storage and retrieval system, the collection, packaging, and distribution of large computer codes, and the compilation and dissemination of processed and evaluated data libraries, with particular emphasis on neutron and gamma-ray cross-section data. The Center has acquired thirteen years of experience in serving fission reactor, weapons, and accelerator shielding research communities, and the extension of its technical base to fusion reactor research represents a logical progression. RSIC is currently working with fusion reactor researchers and contractors in computer code development to provide tested radiation transport and shielding codes and data library packages. Of significant interest to the CTR community are the 100 energy group neutron and 21 energy group gamma-ray coupled cross-section data package (DLC-37) for neutronics studies, a comprehensive 171 energy group neutron and 36 energy group gamma-ray coupled cross-section data base with retrieval programs, including resonance self-shielding, that are tailored to CTR application, and a data base for the generation of energy-dependent atomic displacement and gas production cross sections and heavy-particle-recoil spectra for estimating radiation damage to CTR structural components. Since 1964, the Center has been involved in the international exchange of information, encouraged and supported by both government and interagency agreements; and to achieve an equally viable and successful program in fusion research, the reciprocal exchange of CTR data and computing technology is encouraged and welcomed

  8. Abstracts of digital computer code packages. Assembled by the Radiation Shielding Information Center

    International Nuclear Information System (INIS)

    McGill, B.; Maskewitz, B.F.; Anthony, C.M.; Comolander, H.E.; Hendrickson, H.R.

    1976-01-01

    The term ''code package'' is used to describe a miscellaneous grouping of materials which, when interpreted in connection with a digital computer, enables the scientist--user to solve technical problems in the area for which the material was designed. In general, a ''code package'' consists of written material--reports, instructions, flow charts, listings of data, and other useful material and IBM card decks (or, more often, a reel of magnetic tape) on which the source decks, sample problem input (including libraries of data) and the BCD/EBCDIC output listing from the sample problem are written. In addition to the main code, and any available auxiliary routines are also included. The abstract format was chosen to give to a potential code user several criteria for deciding whether or not he wishes to request the code package

  9. Abstracts of digital computer code packages. Assembled by the Radiation Shielding Information Center. [Radiation transport codes

    Energy Technology Data Exchange (ETDEWEB)

    McGill, B.; Maskewitz, B.F.; Anthony, C.M.; Comolander, H.E.; Hendrickson, H.R.

    1976-01-01

    The term ''code package'' is used to describe a miscellaneous grouping of materials which, when interpreted in connection with a digital computer, enables the scientist--user to solve technical problems in the area for which the material was designed. In general, a ''code package'' consists of written material--reports, instructions, flow charts, listings of data, and other useful material and IBM card decks (or, more often, a reel of magnetic tape) on which the source decks, sample problem input (including libraries of data) and the BCD/EBCDIC output listing from the sample problem are written. In addition to the main code, and any available auxiliary routines are also included. The abstract format was chosen to give to a potential code user several criteria for deciding whether or not he wishes to request the code package. (RWR)

  10. Symbolic math for computation of radiation shielding

    International Nuclear Information System (INIS)

    Suman, Vitisha; Datta, D.; Sarkar, P.K.; Kushwaha, H.S.

    2010-01-01

    Radiation transport calculations for shielding studies in the field of accelerator technology often involve intensive numerical computations. Traditionally, radiation transport equation is solved using finite difference scheme or advanced finite element method with respect to specific initial and boundary conditions suitable for the geometry of the problem. All these computations need CPU intensive computer codes for accurate calculation of scalar and angular fluxes. Computation using symbols of the analytical expression representing the transport equation as objects is an enhanced numerical technique in which the computation is completely algorithm and data oriented. Algorithm on the basis of symbolic math architecture is developed using Symbolic math toolbox of MATLAB software. Present paper describes the symbolic math algorithm and its application as a case study in which shielding calculation of rectangular slab geometry is studied for a line source of specific activity. Study of application of symbolic math in this domain evolves a new paradigm compared to the existing computer code such as DORT. (author)

  11. Computer control of shielded cell operations

    International Nuclear Information System (INIS)

    Jeffords, W.R. III.

    1987-01-01

    This paper describes in detail a computer system to remotely control shielded cell operations. System hardware, software, and design criteria are discussed. We have designed a computer-controlled buret that provides a tenfold improvement over the buret currently in service. A computer also automatically controls cell analyses, calibrations, and maintenance. This system improves conditions for the operators by providing a safer, more efficient working environment and is expandable for future growth and development

  12. Radiation shielding properties of barite coated fabric by computer programme

    Energy Technology Data Exchange (ETDEWEB)

    Akarslan, F.; Molla, T. [Suleyman Demirel University, Engineering Fac. Textile Dep., Isparta (Turkey); Üncü, I. S. [Suleyman Demirel University, Technological Fac. Electrical-Electronic Eng. Dep., Isparta (Turkey); Kılıncarslan, S., E-mail: seref@tef.sdu.edu.tr [Suleyman Demirel University, Engineering Fac. Civil Eng. Dep., Isparta (Turkey); Akkurt, I. [Suleyman Demirel University, Art and Science Fac., Physics Dep., Isparta (Turkey)

    2015-03-30

    With the development of technology radiation started to be used in variety of different fields. As the radiation is hazardous for human health, it is important to keep radiation dose as low as possible. This is done mainly using shielding materials. Barite is one of the important materials in this purpose. As the barite is not used directly it can be used in some other materials such as fabric. For this purposes barite has been coated on fabric in order to improve radiation shielding properties of fabric. Determination of radiation shielding properties of coated fabric has been done by using computer program written C# language. With this program the images obtained from digital Rontgen films is used to determine radiation shielding properties in terms of image processing numerical values. Those values define radiation shielding and in this way the coated barite effect on radiation shielding properties of fabric has been obtained.

  13. Shielding Calculations for Positron Emission Tomography - Computed Tomography Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Baasandorj, Khashbayar [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Yang, Jeongseon [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-10-15

    Integrated PET-CT has been shown to be more accurate for lesion localization and characterization than PET or CT alone, and the results obtained from PET and CT separately and interpreted side by side or following software based fusion of the PET and CT datasets. At the same time, PET-CT scans can result in high patient and staff doses; therefore, careful site planning and shielding of this imaging modality have become challenging issues in the field. In Mongolia, the introduction of PET-CT facilities is currently being considered in many hospitals. Thus, additional regulatory legislation for nuclear and radiation applications is necessary, for example, in regulating licensee processes and ensuring radiation safety during the operations. This paper aims to determine appropriate PET-CT shielding designs using numerical formulas and computer code. Since presently there are no PET-CT facilities in Mongolia, contact was made with radiological staff at the Nuclear Medicine Center of the National Cancer Center of Mongolia (NCCM) to get information about facilities where the introduction of PET-CT is being considered. Well-designed facilities do not require additional shielding, which should help cut down overall costs related to PET-CT installation. According to the results of this study, building barrier thicknesses of the NCCM building is not sufficient to keep radiation dose within the limits.

  14. A conceptual gamma shield design using the DRP model computation

    Energy Technology Data Exchange (ETDEWEB)

    Ahmad, E E [Reactor Department, Nuclear Research Center, Atomic Energy Authority, Cairo (Egypt); Rahman, F A [National Center of Nuclear Safety and Radiation Control, Atomic Energy Authority, Cairo (Egypt)

    1997-12-31

    The purpose of this investigation is to assess basic areas of concern in the development of reactor shielding conceptual design calculations. A spherical shield model composed of low carbon steel and lead have been constructed to surround a Co-60 gamma point source. two alternative configurations have been considered in the model computation. The numerical calculations have been performed using both the ANISN code and DRP model computation together with the DLC 75-Bugle 80 data library. A resume of results for deep penetration in different shield materials with different packing densities is presented and analysed. The results showed that the gamma fluxes attenuation is increased with increasing distribution the packing density of the shield material which reflects its importance of considering it as a safety parameter in shielding design. 3 figs.

  15. Systems for neutronic, thermohydraulic and shielding calculation in personal computers

    International Nuclear Information System (INIS)

    Villarino, E.A.; Abbate, P.; Lovotti, O.; Santini, M.

    1990-01-01

    The MTR-PC (Materials Testing Reactors-Personal Computers) system has been developed by the Nuclear Engineering Division of INVAP S.E. with the aim of providing working conditions integrated with personal computers for design and neutronic, thermohydraulic and shielding analysis for reactors employing plate type fuel. (Author) [es

  16. Shieldings for X-ray radiotherapy facilities calculated by computer

    International Nuclear Information System (INIS)

    Pedrosa, Paulo S.; Farias, Marcos S.; Gavazza, Sergio

    2005-01-01

    This work presents a methodology for calculation of X-ray shielding in facilities of radiotherapy with help of computer. Even today, in Brazil, the calculation of shielding for X-ray radiotherapy is done based on NCRP-49 recommendation establishing a methodology for calculating required to the elaboration of a project of shielding. With regard to high energies, where is necessary the construction of a labyrinth, the NCRP-49 is not very clear, so that in this field, studies were made resulting in an article that proposes a solution to the problem. It was developed a friendly program in Delphi programming language that, through the manual data entry of a basic design of architecture and some parameters, interprets the geometry and calculates the shields of the walls, ceiling and floor of on X-ray radiation therapy facility. As the final product, this program provides a graphical screen on the computer with all the input data and the calculation of shieldings and the calculation memory. The program can be applied in practical implementation of shielding projects for radiotherapy facilities and can be used in a didactic way compared to NCRP-49.

  17. Computational methods for high-energy source shielding

    International Nuclear Information System (INIS)

    Armstrong, T.W.; Cloth, P.; Filges, D.

    1983-01-01

    The computational methods for high-energy radiation transport related to shielding of the SNQ-spallation source are outlined. The basic approach is to couple radiation-transport computer codes which use Monte Carlo methods and discrete ordinates methods. A code system is suggested that incorporates state-of-the-art radiation-transport techniques. The stepwise verification of that system is briefly summarized. The complexity of the resulting code system suggests a more straightforward code specially tailored for thick shield calculations. A short guide line to future development of such a Monte Carlo code is given

  18. Comparison of different methods for shielding design in computed tomography

    International Nuclear Information System (INIS)

    Ciraj-Bjelac, O.; Arandjic, D.; Kosutic, D.

    2011-01-01

    The purpose of this work is to compare different methods for shielding calculation in computed tomography (CT). The BIR-IPEM (British Inst. of Radiology and Inst. of Physics in Engineering in Medicine) and NCRP (National Council on Radiation Protection) method were used for shielding thickness calculation. Scattered dose levels and calculated barrier thickness were also compared with those obtained by scatter dose measurements in the vicinity of a dedicated CT unit. Minimal requirement for protective barriers based on BIR-IPEM method ranged between 1.1 and 1.4 mm of lead demonstrating underestimation of up to 20 % and overestimation of up to 30 % when compared with thicknesses based on measured dose levels. For NCRP method, calculated thicknesses were 33 % higher (27-42 %). BIR-IPEM methodology-based results were comparable with values based on scattered dose measurements, while results obtained using NCRP methodology demonstrated an overestimation of the minimal required barrier thickness. (authors)

  19. Computer code for shielding calculations of x-rays rooms

    International Nuclear Information System (INIS)

    Affonso, R.R.W.; Borges, D. da S.; Lava, D.D.; Moreira, M. de L.; Guimarães, A.C.F.

    2015-01-01

    The building an effective barrier against ionizing radiation present in radiographic rooms requires consideration of many variables. The methodology used for thickness specification of primary and secondary, barrier of a traditional radiographic room, considers the following factors: Use Factor, Occupational Factor, distance between the source and the wall, Workload, Kerma in the air and distance between the patient and the source. With these data it was possible to develop a computer code, which aims to identify and use variables in functions obtained through graphics regressions provided by NCRP-147 (Structural Shielding Design for Medical X-Ray Imaging Facilities) report, for shielding calculation of room walls, and the walls of the dark room and adjacent areas. With the implemented methodology, it was made a code validation by comparison of results with a study case provided by the report. The obtained values for thickness comprise different materials such as concrete, lead and glass. After validation it was made a case study of an arbitrary radiographic room.The development of the code resulted in a user-friendly tool for planning radiographic rooms to comply with the limits established by CNEN-NN-3:01 published in september/2011. (authors)

  20. Computer information systems framework

    International Nuclear Information System (INIS)

    Shahabuddin, S.

    1989-01-01

    Management information systems (MIS) is a commonly used term in computer profession. The new information technology has caused management to expect more from computer. The process of supplying information follows a well defined procedure. MIS should be capable for providing usable information to the various areas and levels of organization. MIS is different from data processing. MIS and business hierarchy provides a good framework for many organization which are using computers. (A.B.)

  1. Bibliography, subject index, and author index of the literature examined by the radiation shielding information center. Volume 6. Reactor and weapons radiation shielding

    International Nuclear Information System (INIS)

    1980-05-01

    An indexed bibliography is presented of literature selected by the Radiation Shielding Information Center since the previous volume was published in 1978 in the area of radiation transport and shielding against radiation from nuclear reactors, x-ray machines, radioisotopes, nuclear weapons (including fallout), and low energy accelerators (e.g., neutron generators). The bibliography was typeset from data processed by computer from magnetic tape files. In addition to lists of literature titles by subject categories (accessions 4951-6200), an author index is given

  2. Development of Computer Program for Analysis of Irregular Non Homogenous Radiation Shielding

    International Nuclear Information System (INIS)

    Bang Rozali; Nina Kusumah; Hendro Tjahjono; Darlis

    2003-01-01

    A computer program for radiation shielding analysis has been developed to obtain radiation attenuation calculation in non-homogenous radiation shielding and irregular geometry. By determining radiation source strength, geometrical shape of radiation source, location, dimension and geometrical shape of radiation shielding, radiation level of a point at certain position from radiation source can be calculated. By using a computer program, calculation result of radiation distribution analysis can be obtained for some analytical points simultaneously. (author)

  3. Computers and Information Flow.

    Science.gov (United States)

    Patrick, R. L.

    This paper is designed to fill the need for an easily understood introduction to the computing and data processing field for the layman who has, or can expect to have, some contact with it. Information provided includes the unique terminology and jargon of the field, the various types of computers and the scope of computational capabilities, and…

  4. Summary of Prometheus Radiation Shielding Nuclear Design Analyses , for information

    International Nuclear Information System (INIS)

    J. Stephens

    2006-01-01

    This report transmits a summary of radiation shielding nuclear design studies performed to support the Prometheus project. Together, the enclosures and references associated with this document describe NRPCT (KAPL and Bettis) shielding nuclear design analyses done for the project

  5. Computer and information science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 15th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2016) which was held on June 26– 29 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 12 of the conference’s most promising...

  6. Survey of radiation protection, radiation transport, and shielding information needs of the nuclear power industry. Final report

    International Nuclear Information System (INIS)

    Maskewitz, B.F.; Trubey, D.K.; Roussin, R.W.; McGill, B.L.

    1976-04-01

    The Radiation Shielding Information Center (RSIC) is engaged in a program to seek out, organize, and disseminate information in the area of radiation transport, shielding, and radiation protection. This information consists of published literature, nuclear data, and computer codes and advanced analytical techniques required by ERDA, its contractors, and the nuclear power industry to improve radiation analysis and computing capability. Information generated in this effort becomes a part of the RSIC collection and/or data base. The purpose of this report on project 219-1 is to document the results of the survey of information and computer code needs of the nuclear power industry in the area of radiation analysis and protection

  7. Survey of radiation protection, radiation transport, and shielding information needs of the nuclear power industry. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Maskewitz, B.F.; Trubey, D.K.; Roussin, R.W.; McGill, B.L.

    1976-04-01

    The Radiation Shielding Information Center (RSIC) is engaged in a program to seek out, organize, and disseminate information in the area of radiation transport, shielding, and radiation protection. This information consists of published literature, nuclear data, and computer codes and advanced analytical techniques required by ERDA, its contractors, and the nuclear power industry to improve radiation analysis and computing capability. Information generated in this effort becomes a part of the RSIC collection and/or data base. The purpose of this report on project 219-1 is to document the results of the survey of information and computer code needs of the nuclear power industry in the area of radiation analysis and protection.

  8. Implementation and display of Computer Aided Design (CAD) models in Monte Carlo radiation transport and shielding applications

    International Nuclear Information System (INIS)

    Burns, T.J.

    1994-01-01

    An Xwindow application capable of importing geometric information directly from two Computer Aided Design (CAD) based formats for use in radiation transport and shielding analyses is being developed at ORNL. The application permits the user to graphically view the geometric models imported from the two formats for verification and debugging. Previous models, specifically formatted for the radiation transport and shielding codes can also be imported. Required extensions to the existing combinatorial geometry analysis routines are discussed. Examples illustrating the various options and features which will be implemented in the application are presented. The use of the application as a visualization tool for the output of the radiation transport codes is also discussed

  9. Study and application of Dot 3.5 computer code in radiation shielding problems

    International Nuclear Information System (INIS)

    Otto, A.C.; Mendonca, A.G.; Maiorino, J.R.

    1983-01-01

    The application of nuclear transportation code S sub(N), Dot 3.5, to radiation shielding problems is revised. Aiming to study the better available option (convergence scheme, calculation mode), of DOT 3.5 computer code to be applied in radiation shielding problems, a standard model from 'Argonne Code Center' was selected and a combination of several calculation options to evaluate the accuracy of the results and the computational time was used, for then to select the more efficient option. To illustrate the versatility and efficacy in the application of the code for tipical shielding problems, the streaming neutrons calculation along a sodium coolant channel is ilustrated. (E.G.) [pt

  10. Bibliography, subject index, and author index of the literature examined by the Radiation Shielding Information Center. Volume 7

    Energy Technology Data Exchange (ETDEWEB)

    Trubey, D.K.; Roussin, R.W.; Gustin, A.B.

    1983-08-01

    An indexed bibliography of open literature selected by the Radiation Shielding Information Center since the previous volume was published in 1980 is presented in the area of radiation transport and shielding against radiation from nuclear reactors (fission and fusion), x-ray machines, radioisotopes, nuclear weapons (including fallout, and low energy accelerators (e.g., neutron generators). The bibliography was typeset from computer files constituting the RSIC Storage and Retrieval Information System. In addition to lists of literature titles by subject categories (accessions 6201-10156), an author index is given. Most of the literature selected for Volume VII was published in the years 1977 to 1981.

  11. Bibliography, subject index, and author index of the literature examined by the Radiation Shielding Information Center. Volume 7

    International Nuclear Information System (INIS)

    Trubey, D.K.; Roussin, R.W.; Gustin, A.B.

    1983-08-01

    An indexed bibliography of open literature selected by the Radiation Shielding Information Center since the previous volume was published in 1980 is presented in the area of radiation transport and shielding against radiation from nuclear reactors (fission and fusion), x-ray machines, radioisotopes, nuclear weapons (including fallout, and low energy accelerators (e.g., neutron generators). The bibliography was typeset from computer files constituting the RSIC Storage and Retrieval Information System. In addition to lists of literature titles by subject categories (accessions 6201-10156), an author index is given. Most of the literature selected for Volume VII was published in the years 1977 to 1981

  12. Computer/Information Science

    Science.gov (United States)

    Birman, Ken; Roughgarden, Tim; Seltzer, Margo; Spohrer, Jim; Stolterman, Erik; Kearsley, Greg; Koszalka, Tiffany; de Jong, Ton

    2013-01-01

    Scholars representing the field of computer/information science were asked to identify what they considered to be the most exciting and imaginative work currently being done in their field, as well as how that work might change our understanding. The scholars included Ken Birman, Jennifer Rexford, Tim Roughgarden, Margo Seltzer, Jim Spohrer, and…

  13. Shielding calculations using computer techniques; Calculo de blindajes mediante tecnicas de computacion

    Energy Technology Data Exchange (ETDEWEB)

    Gonzalez Portilla, M. I.; Marquez, J.

    2011-07-01

    Radiological protection aims to limit the ionizing radiation received by people and equipment, which in numerous occasions requires of protection shields. Although, for certain configurations, there are analytical formulas, to characterize these shields, the design setup may be very intensive in numerical calculations, therefore the most efficient from to design the shields is by means of computer programs to calculate dose and dose rates. In the present article we review the codes most frequently used to perform these calculations, and the techniques used by such codes. (Author) 13 refs.

  14. Characterization of a lead breast shielding for dose reduction in computed tomography

    Energy Technology Data Exchange (ETDEWEB)

    Correia, Paula Duarte; Brochi, Marco Aurelio Corte; Azevedo-Marques, Paulo Mazzoncini de, E-mail: pauladuarte@usp.br [Universidade de Sao Paulo (FM/RSP), Ribeirao Preto, SP (Brazil). Faculdade de Medicina; Granzotti, Cristiano Roberto Fabri; Santos, Yago da Silva [Universidade de Sao Paulo (FFCLRP/RSP), Ribeirao Preto, SP (Brazil). Faculdade de Filosofia, Ciencias e Letras

    2014-07-15

    Objective: several studies have been published regarding the use of bismuth shielding to protect the breast in computed tomography (CT) scans and, up to the writing of this article, only one publication about barium shielding was found. The present study was aimed at characterizing, for the first time, a lead breast shielding. Materials and methods: the percentage dose reduction and the influence of the shielding on quantitative imaging parameters were evaluated. Dose measurements were made on a CT equipment with the aid of specific phantoms and radiation detectors. A processing software assisted in the qualitative analysis evaluating variations in average CT number and noise on images. Results: the authors observed a reduction in entrance dose by 30% and in CTDIvol by 17%. In all measurements, in agreement with studies in the literature, the utilization of cotton fiber as spacer object reduced significantly the presence of artifacts on the images. All the measurements demonstrated increase in the average CT number and noise on the images with the presence of the shielding. Conclusion: as expected, the data observed with the use of lead shielding were of the same order as those found in the literature about bismuth shielding. (author)

  15. Influence of lead apron shielding on absorbed doses from cone-beam computed tomography.

    Science.gov (United States)

    Rottke, Dennis; Andersson, Jonas; Ejima, Ken-Ichiro; Sawada, Kunihiko; Schulze, Dirk

    2017-06-01

    The aim of the present work was to investigate absorbed and to calculate effective doses (EDs) in cone-beam computed tomography (CBCT). The study was conducted using examination protocols with and without lead apron shielding. A full-body male RANDO® phantom was loaded with 110 GR200A thermoluminescence dosemeter chips at 55 different sites and set up in two different CBCT systems (CS 9500®, ProMax® 3D). Two different protocols were performed: the phantom was set up (1) with and (2) without a lead apron. No statistically significant differences in organ and absorbed doses from regions outside the primary beam could be found when comparing results from exposures with and without lead apron shielding. Consequently, calculating the ED showed no significant differences between the examination protocols with and without lead apron shielding. For the ProMax® 3D with shielding, the ED was 149 µSv, and for the examination protocol without shielding 148 µSv (SD = 0.31 µSv). For the CS 9500®, the ED was 88 and 86 µSv (SD = 0.95 µSv), respectively, with and without lead apron shielding. The results revealed no statistically significant differences in the absorbed doses between examination with and without lead apron shielding, especially in organs outside the primary beam. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  16. Influence of lead apron shielding on absorbed doses from cone-beam computed tomography

    International Nuclear Information System (INIS)

    Rottke, Dennis; Andersson, Jonas; Ejima, Ken-Ichiro; Sawada, Kunihiko; Schulze, Dirk

    2017-01-01

    The aim of the present work was to investigate absorbed and to calculate effective doses (EDs) in cone-beam computed tomography (CBCT). The study was conducted using examination protocols with and without lead apron shielding. A full-body male RANDO"R phantom was loaded with 110 GR200A thermoluminescence dosemeter chips at 55 different sites and set up in two different CBCT systems (CS 9500"R, ProMax"R 3D). Two different protocols were performed: the phantom was set up (1) with and (2) without a lead apron. No statistically significant differences in organ and absorbed doses from regions outside the primary beam could be found when comparing results from exposures with and without lead apron shielding. Consequently, calculating the ED showed no significant differences between the examination protocols with and without lead apron shielding. For the ProMax"R 3D with shielding, the ED was 149 μSv, and for the examination protocol without shielding 148 μSv (SD = 0.31 μSv). For the CS 9500"R, the ED was 88 and 86 μSv (SD = 0.95 μSv), respectively, with and without lead apron shielding. The results revealed no statistically significant differences in the absorbed doses between examination with and without lead apron shielding, especially in organs outside the primary beam. (authors)

  17. Soft computing in computer and information science

    CERN Document Server

    Fray, Imed; Pejaś, Jerzy

    2015-01-01

    This book presents a carefully selected and reviewed collection of papers presented during the 19th Advanced Computer Systems conference ACS-2014. The Advanced Computer Systems conference concentrated from its beginning on methods and algorithms of artificial intelligence. Further future brought new areas of interest concerning technical informatics related to soft computing and some more technological aspects of computer science such as multimedia and computer graphics, software engineering, web systems, information security and safety or project management. These topics are represented in the present book under the categories Artificial Intelligence, Design of Information and Multimedia Systems, Information Technology Security and Software Technologies.

  18. The computer code system for reactor radiation shielding in design of nuclear power plant

    International Nuclear Information System (INIS)

    Li Chunhuai; Fu Shouxin; Liu Guilian

    1995-01-01

    The computer code system used in reactor radiation shielding design of nuclear power plant includes the source term codes, discrete ordinate transport codes, Monte Carlo and Albedo Monte Carlo codes, kernel integration codes, optimization code, temperature field code, skyshine code, coupling calculation codes and some processing codes for data libraries. This computer code system has more satisfactory variety of codes and complete sets of data library. It is widely used in reactor radiation shielding design and safety analysis of nuclear power plant and other nuclear facilities

  19. Understanding computer and information technology

    International Nuclear Information System (INIS)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-01

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  20. Computing Moment-Based Probability Tables for Self-Shielding Calculations in Lattice Codes

    International Nuclear Information System (INIS)

    Hebert, Alain; Coste, Mireille

    2002-01-01

    As part of the self-shielding model used in the APOLLO2 lattice code, probability tables are required to compute self-shielded cross sections for coarse energy groups (typically with 99 or 172 groups). This paper describes the replacement of the multiband tables (typically with 51 subgroups) with moment-based tables in release 2.5 of APOLLO2. An improved Ribon method is proposed to compute moment-based probability tables, allowing important savings in CPU resources while maintaining the accuracy of the self-shielding algorithm. Finally, a validation is presented where the absorption rates obtained with each of these techniques are compared with exact values obtained using a fine-group elastic slowing-down calculation in the resolved energy domain. Other results, relative to the Rowland's benchmark and to three assembly production cases, are also presented

  1. Development of Point Kernel Shielding Analysis Computer Program Implementing Recent Nuclear Data and Graphic User Interfaces

    International Nuclear Information System (INIS)

    Kang, Sang Ho; Lee, Seung Gi; Chung, Chan Young; Lee, Choon Sik; Lee, Jai Ki

    2001-01-01

    In order to comply with revised national regulationson radiological protection and to implement recent nuclear data and dose conversion factors, KOPEC developed a new point kernel gamma and beta ray shielding analysis computer program. This new code, named VisualShield, adopted mass attenuation coefficient and buildup factors from recent ANSI/ANS standards and flux-to-dose conversion factors from the International Commission on Radiological Protection (ICRP) Publication 74 for estimation of effective/equivalent dose recommended in ICRP 60. VisualShield utilizes graphical user interfaces and 3-D visualization of the geometric configuration for preparing input data sets and analyzing results, which leads users to error free processing with visual effects. Code validation and data analysis were performed by comparing the results of various calculations to the data outputs of previous programs such as MCNP 4B, ISOSHLD-II, QAD-CGGP, etc

  2. CREST : a computer program for the calculation of composition dependent self-shielded cross-sections

    International Nuclear Information System (INIS)

    Kapil, S.K.

    1977-01-01

    A computer program CREST for the calculation of the composition and temperature dependent self-shielded cross-sections using the shielding factor approach has been described. The code includes the editing and formation of the data library, calculation of the effective shielding factors and cross-sections, a fundamental mode calculation to generate the neutron spectrum for the system which is further used to calculate the effective elastic removal cross-sections. Studies to explore the sensitivity of reactor parameters to changes in group cross-sections can also be carried out by using the facility available in the code to temporarily change the desired constants. The final self-shielded and transport corrected group cross-sections can be dumped on cards or magnetic tape in a suitable form for their direct use in a transport or diffusion theory code for detailed reactor calculations. The program is written in FORTRAN and can be accommodated in a computer with 32 K work memory. The input preparation details, sample problem and the listing of the program are given. (author)

  3. Efficacy of Lower-Body Shielding in Computed Tomography Fluoroscopy-Guided Interventions

    International Nuclear Information System (INIS)

    Mahnken, Andreas H.; Sedlmair, Martin; Ritter, Christine; Banckwitz, Rosemarie; Flohr, Thomas

    2012-01-01

    Purpose: Computed tomography (CT) fluoroscopy-guided interventions pose relevant radiation exposure to the interventionalist. The goal of this study was to analyze the efficacy of lower-body shielding as a simple structural method for decreasing radiation dose to the interventionalist without limiting access to the patient. Material and Methods: All examinations were performed with a 128-slice dual source CT scanner (12 × 1.2-mm collimation; 120 kV; and 20, 40, 60, and 80 mAs) and an Alderson-Rando phantom. Scatter radiation was measured with an ionization chamber and a digital dosimeter at standardized positions and heights with and without a lower-body lead shield (0.5-mm lead equivalent; Kenex, Harlow, UK). Dose decreases were computed for the different points of measurement. Results: On average, lower-body shielding decreased scatter radiation by 38.2% within a 150-cm radius around the shielding. This decrease is most significant close to the gantry opening and at low heights of 50 and 100 cm above the floor with a maximum decrease of scatter radiation of 95.9% close to the scanner’s isocentre. With increasing distance to the gantry opening, the effect decreased. There is almost no dose decrease effect at ≥150 above the floor. Scatter radiation and its decrease were linearly correlated with the tube current-time product (r 2 = 0.99), whereas percent scatter radiation decrease was independent of the tube current-time product. Conclusion: Lower-body shielding is an effective way to decrease radiation exposure to the interventionalist and should routinely be used in CT fluoroscopy-guided interventions.

  4. Effectiveness of Bismuth Shield to Reduce Eye Lens Radiation Dose Using the Photoluminescence Dosimetry in Computed Tomography

    International Nuclear Information System (INIS)

    Jung, Mi Young; Kweon, Dae Cheol; Kwon, Soo Il

    2009-01-01

    The purpose of our study was to determine the eye radiation dose when performing routine multi-detector computed tomography (MDCT). We also evaluated dose reduction and the effect on image quality of using a bismuth eye shield when performing head MDCT. Examinations were performed with a 64MDCT scanner. To compare the shielded/unshielded lens dose, the examination was performed with and without bismuth shielding in anthropomorphic phantom. To determine the average lens radiation dose, we imaged an anthropomorphic phantom into which calibrated photoluminescence glass dosimeter (PLD) were placed to measure the dose to lens. The phantom was imaged using the same protocol. Radiation doses to the lens with and without the lens shielding were measured and compared using the Student t test. In the qualitative evaluation of the MDCT scans, all were considered to be of diagnostic quality. We did not see any differences in quality between the shielded and unshielded brain. The mean radiation doses to the eye with the shield and to those without the shield were 21.54 versus 10.46 mGy, respectively. The lens shield enabled a 51.3% decrease in radiation dose to the lens. Bismuth in-plane shielding for routine eye and head MDCT decreased radiation dose to the lens without qualitative changes in image quality. The other radiosensitive superficial organs specifically must be protected with shielding.

  5. Monteray Mark-I: Computer program (PC-version) for shielding calculation with Monte Carlo method

    International Nuclear Information System (INIS)

    Pudjijanto, M.S.; Akhmad, Y.R.

    1998-01-01

    A computer program for gamma ray shielding calculation using Monte Carlo method has been developed. The program is written in WATFOR77 language. The MONTERAY MARH-1 is originally developed by James Wood. The program was modified by the authors that the modified version is easily executed. Applying Monte Carlo method the program observe photon gamma transport in an infinity planar shielding with various thick. A photon gamma is observed till escape from the shielding or when its energy less than the cut off energy. Pair production process is treated as pure absorption process that annihilation photons generated in the process are neglected in the calculation. The out put data calculated by the program are total albedo, build-up factor, and photon spectra. The calculation result for build-up factor of a slab lead and water media with 6 MeV parallel beam gamma source shows that they are in agreement with published data. Hence the program is adequate as a shielding design tool for observing gamma radiation transport in various media

  6. Information processing, computation, and cognition.

    Science.gov (United States)

    Piccinini, Gualtiero; Scarantino, Andrea

    2011-01-01

    Computation and information processing are among the most fundamental notions in cognitive science. They are also among the most imprecisely discussed. Many cognitive scientists take it for granted that cognition involves computation, information processing, or both - although others disagree vehemently. Yet different cognitive scientists use 'computation' and 'information processing' to mean different things, sometimes without realizing that they do. In addition, computation and information processing are surrounded by several myths; first and foremost, that they are the same thing. In this paper, we address this unsatisfactory state of affairs by presenting a general and theory-neutral account of computation and information processing. We also apply our framework by analyzing the relations between computation and information processing on one hand and classicism, connectionism, and computational neuroscience on the other. We defend the relevance to cognitive science of both computation, at least in a generic sense, and information processing, in three important senses of the term. Our account advances several foundational debates in cognitive science by untangling some of their conceptual knots in a theory-neutral way. By leveling the playing field, we pave the way for the future resolution of the debates' empirical aspects.

  7. Three-dimensional coupled Monte Carlo-discrete ordinates computational scheme for shielding calculations of large and complex nuclear facilities

    International Nuclear Information System (INIS)

    Chen, Y.; Fischer, U.

    2005-01-01

    Shielding calculations of advanced nuclear facilities such as accelerator based neutron sources or fusion devices of the tokamak type are complicated due to their complex geometries and their large dimensions, including bulk shields of several meters thickness. While the complexity of the geometry in the shielding calculation can be hardly handled by the discrete ordinates method, the deep penetration of radiation through bulk shields is a severe challenge for the Monte Carlo particle transport technique. This work proposes a dedicated computational scheme for coupled Monte Carlo-Discrete Ordinates transport calculations to handle this kind of shielding problems. The Monte Carlo technique is used to simulate the particle generation and transport in the target region with both complex geometry and reaction physics, and the discrete ordinates method is used to treat the deep penetration problem in the bulk shield. The coupling scheme has been implemented in a program system by loosely integrating the Monte Carlo transport code MCNP, the three-dimensional discrete ordinates code TORT and a newly developed coupling interface program for mapping process. Test calculations were performed with comparison to MCNP solutions. Satisfactory agreements were obtained between these two approaches. The program system has been chosen to treat the complicated shielding problem of the accelerator-based IFMIF neutron source. The successful application demonstrates that coupling scheme with the program system is a useful computational tool for the shielding analysis of complex and large nuclear facilities. (authors)

  8. Activities of the Radiation Shielding Information Center and a report on codes/data for high energy radiation transport

    International Nuclear Information System (INIS)

    Roussin, R.W.

    1993-01-01

    From the very early days in its history Radiation Shielding Information Center (RSIC) has been involved with high energy radiation transport. The National Aeronautics and Space Administration was an early sponsor of RSIC until the completion of the Apollo Moon Exploration Program. In addition, the intranuclear cascade work of Bertini at Oak Ridge National Laboratory provided valuable resources which were made available through RSIC. Over the years, RSIC has had interactions with many of the developers of high energy radiation transport computing technology and data libraries and has been able to collect and disseminate this technology. The current status of this technology will be reviewed and prospects for new advancements will be examined

  9. Radiation Shielding Materials Containing Hydrogen, Boron, and Nitrogen: Systematic Computational and Experimental Study. Phase I

    Science.gov (United States)

    Thibeault, Sheila A.; Fay, Catharine C.; Lowther, Sharon E.; Earle, Kevin D.; Sauti, Godfrey; Kang, Jin Ho; Park, Cheol; McMullen, Amelia M.

    2012-01-01

    The key objectives of this study are to investigate, both computationally and experimentally, which forms, compositions, and layerings of hydrogen, boron, and nitrogen containing materials will offer the greatest shielding in the most structurally robust combination against galactic cosmic radiation (GCR), secondary neutrons, and solar energetic particles (SEP). The objectives and expected significance of this research are to develop a space radiation shielding materials system that has high efficacy for shielding radiation and that also has high strength for load bearing primary structures. Such a materials system does not yet exist. The boron nitride nanotube (BNNT) can theoretically be processed into structural BNNT and used for load bearing structures. Furthermore, the BNNT can be incorporated into high hydrogen polymers and the combination used as matrix reinforcement for structural composites. BNNT's molecular structure is attractive for hydrogen storage and hydrogenation. There are two methods or techniques for introducing hydrogen into BNNT: (1) hydrogen storage in BNNT, and (2) hydrogenation of BNNT (hydrogenated BNNT). In the hydrogen storage method, nanotubes are favored to store hydrogen over particles and sheets because they have much larger surface areas and higher hydrogen binding energy. The carbon nanotube (CNT) and BNNT have been studied as potentially outstanding hydrogen storage materials since 1997. Our study of hydrogen storage in BNNT - as a function of temperature, pressure, and hydrogen gas concentration - will be performed with a hydrogen storage chamber equipped with a hydrogen generator. The second method of introducing hydrogen into BNNT is hydrogenation of BNNT, where hydrogen is covalently bonded onto boron, nitrogen, or both. Hydrogenation of BN and BNNT has been studied theoretically. Hyper-hydrogenated BNNT has been theoretically predicted with hydrogen coverage up to 100% of the individual atoms. This is a higher hydrogen content

  10. JANE, A new information retrieval system for the Radiation Shielding Information Center

    International Nuclear Information System (INIS)

    Trubey, D.K.

    1991-05-01

    A new information storage and retrieval system has been developed for the Radiation Shielding Information Center (RSIC) at Oak Ridge National Laboratory to replace mainframe systems that have become obsolete. The database contains citations and abstracts of literature which were selected by RSIC analysts and indexed with terms from a controlled vocabulary. The database, begun in 1963, has been maintained continuously since that time. The new system, called JANE, incorporates automatic indexing techniques and on-line retrieval using the RSIC Data General Eclipse MV/4000 minicomputer, Automatic indexing and retrieval techniques based on fuzzy-set theory allow the presentation of results in order of Retrieval Status Value. The fuzzy-set membership function depends on term frequency in the titles and abstracts and on Term Discrimination Values which indicate the resolving power of the individual terms. These values are determined by the Cover Coefficient method. The use of a commercial database base to store and retrieve the indexing information permits rapid retrieval of the stored documents. Comparisons of the new and presently-used systems for actual searches of the literature indicate that it is practical to replace the mainframe systems with a minicomputer system similar to the present version of JANE. 18 refs., 10 figs

  11. Status of multigroup sensitivity profiles and covariance matrices available from the radiation shielding information center

    International Nuclear Information System (INIS)

    Roussin, R.W.; Drischler, J.D.; Marable, J.H.

    1980-01-01

    In recent years multigroup sensitivity profiles and covariance matrices have been added to the Radiation Shielding Information Center's Data Library Collection (DLC). Sensitivity profiles are available in a single package. DLC-45/SENPRO, and covariance matrices are found in two packages, DLC-44/COVERX and DLC-77/COVERV. The contents of these packages are described and their availability is discussed

  12. Computers in technical information transfer

    Energy Technology Data Exchange (ETDEWEB)

    Price, C.E.

    1978-01-01

    The use of computers in transferring scientific and technical information from its creation to its use is surveyed. The traditional publication and distribution processes for S and T literature in past years have been the vehicle for transfer, but computers have altered the process in phenomenal ways. Computers are used in literature publication through text editing and photocomposition applications. Abstracting and indexing services use computers for preparing their products, but the machine-readable document descriptions created for this purpose are input to a rapidly growing computerized information retrieval service industry. Computer use is making many traditional processes passe, and may eventually lead to a largely ''paperless'' information utility.

  13. Development of a computer code for shielding calculation in X-ray facilities

    International Nuclear Information System (INIS)

    Borges, Diogo da S.; Lava, Deise D.; Affonso, Renato R.W.; Moreira, Maria de L.; Guimaraes, Antonio C.F.

    2014-01-01

    The construction of an effective barrier against the interaction of ionizing radiation present in X-ray rooms requires consideration of many variables. The methodology used for specifying the thickness of primary and secondary shielding of an traditional X-ray room considers the following factors: factor of use, occupational factor, distance between the source and the wall, workload, Kerma in the air and distance between the patient and the receptor. With these data it was possible the development of a computer program in order to identify and use variables in functions obtained through graphics regressions offered by NCRP Report-147 (Structural Shielding Design for Medical X-Ray Imaging Facilities) for the calculation of shielding of the room walls as well as the wall of the darkroom and adjacent areas. With the built methodology, a program validation is done through comparing results with a base case provided by that report. The thickness of the obtained values comprise various materials such as steel, wood and concrete. After validation is made an application in a real case of radiographic room. His visual construction is done with the help of software used in modeling of indoor and outdoor. The construction of barriers for calculating program resulted in a user-friendly tool for planning radiographic rooms to comply with the limits established by CNEN-NN-3:01 published in September / 2011

  14. Development of a computational code for calculations of shielding in dental facilities

    International Nuclear Information System (INIS)

    Lava, Deise D.; Borges, Diogo da S.; Affonso, Renato R.W.; Guimaraes, Antonio C.F.; Moreira, Maria de L.

    2014-01-01

    This paper is prepared in order to address calculations of shielding to minimize the interaction of patients with ionizing radiation and / or personnel. The work includes the use of protection report Radiation in Dental Medicine (NCRP-145 or Radiation Protection in Dentistry), which establishes calculations and standards to be adopted to ensure safety to those who may be exposed to ionizing radiation in dental facilities, according to the dose limits established by CNEN-NN-3.1 standard published in September / 2011. The methodology comprises the use of computer language for processing data provided by that report, and a commercial application used for creating residential projects and decoration. The FORTRAN language was adopted as a method for application to a real case. The result is a programming capable of returning data related to the thickness of material, such as steel, lead, wood, glass, plaster, acrylic, acrylic and leaded glass, which can be used for effective shielding against single or continuous pulse beams. Several variables are used to calculate the thickness of the shield, as: number of films used in the week, film load, use factor, occupational factor, distance between the wall and the source, transmission factor, workload, area definition, beam intensity, intraoral and panoramic exam. Before the application of the methodology is made a validation of results with examples provided by NCRP-145. The calculations redone from the examples provide answers consistent with the report

  15. A comparison of shielding calculation methods for multi-slice computed tomography (CT) systems

    International Nuclear Information System (INIS)

    Cole, J A; Platten, D J

    2008-01-01

    Currently in the UK, shielding calculations for computed tomography (CT) systems are based on the BIR-IPEM (British Institute of Radiology and Institute of Physics in Engineering in Medicine) working group publication from 2000. Concerns have been raised internationally regarding the accuracy of the dose plots on which this method depends and the effect that new scanner technologies may have. Additionally, more recent shielding methods have been proposed by the NCRP (National Council on Radiation Protection) from the USA. Thermoluminescent detectors (TLDs) were placed in three CT scanner rooms at different positions for several weeks before being processed. Patient workload and dose data (DLP: the dose length product and mAs: the tube current-time product) were collected for this period. Individual dose data were available for more than 95% of patients scanned and the remainder were estimated. The patient workload data were used to calculate expected scatter radiation for each TLD location by both the NCRP and BIR-IPEM methods. The results were then compared to the measured scattered radiation. Calculated scattered air kerma and the minimum required lead shielding were found to be frequently overestimated compared to the measured air kerma, on average almost five times the measured scattered air kerma.

  16. ParShield: A computer program for calculating attenuation parameters of the gamma rays and the fast neutrons

    International Nuclear Information System (INIS)

    Elmahroug, Y.; Tellili, B.; Souga, C.; Manai, K.

    2015-01-01

    Highlights: • Description of the theoretical method used by the ParShield program. • Description of the ParShield program. • Test and validation the ParShield program. - Abstract: This study aims to present a new computer program called ParShield which determines the neutron and gamma-ray shielding parameters. This program can calculate the total mass attenuation coefficients (μ t ), the effective atomic numbers (Z eff ) and the effective electron densities (N eff ) for gamma rays and it can also calculate the effective removal cross-sections (Σ R ) for fast neutrons for mixtures and compounds. The results obtained for the gamma rays by using ParShield were compared with the results calculated by the WinXcom program and the measured results. The obtained values of (Σ R ) were tested by comparing them with the measured results,the manually calculated results and with the results obtained by using MERCSFN program and an excellent agreement was found between them. The ParShield program can be used as a fast and effective tool to choose and compare the shielding materials, especially for the determination of (Z eff ) and (N eff ), there is no other programs in the literature which can calculate

  17. Utilizing of computational tools on the modelling of a simplified problem of neutron shielding

    Energy Technology Data Exchange (ETDEWEB)

    Lessa, Fabio da Silva Rangel; Platt, Gustavo Mendes; Alves Filho, Hermes [Universidade do Estado do Rio de Janeiro (UERJ), Nova Friburgo, RJ (Brazil). Inst. Politecnico]. E-mails: fsrlessa@gmail.com; gmplatt@iprj.uerj.br; halves@iprj.uerj.br

    2007-07-01

    In the current technology level, the investigation of several problems is studied through computational simulations whose results are in general satisfactory and much less expensive than the conventional forms of investigation (e.g., destructive tests, laboratory measures, etc.). Almost all of the modern scientific studies are executed using computational tools, as computers of superior capacity and their systems applications to make complex calculations, algorithmic iterations, etc. Besides the considerable economy in time and in space that the Computational Modelling provides, there is a financial economy to the scientists. The Computational Modelling is a modern methodology of investigation that asks for the theoretical study of the identified phenomena in the problem, a coherent mathematical representation of such phenomena, the generation of a numeric algorithmic system comprehensible for the computer, and finally the analysis of the acquired solution, or still getting use of pre-existent systems that facilitate the visualization of these results (editors of Cartesian graphs, for instance). In this work, was being intended to use many computational tools, implementation of numeric methods and a deterministic model in the study and analysis of a well known and simplified problem of nuclear engineering (the neutron transport), simulating a theoretical problem of neutron shielding with physical-material hypothetical parameters, of neutron flow in each space junction, programmed with Scilab version 4.0. (author)

  18. Utilizing of computational tools on the modelling of a simplified problem of neutron shielding

    International Nuclear Information System (INIS)

    Lessa, Fabio da Silva Rangel; Platt, Gustavo Mendes; Alves Filho, Hermes

    2007-01-01

    In the current technology level, the investigation of several problems is studied through computational simulations whose results are in general satisfactory and much less expensive than the conventional forms of investigation (e.g., destructive tests, laboratory measures, etc.). Almost all of the modern scientific studies are executed using computational tools, as computers of superior capacity and their systems applications to make complex calculations, algorithmic iterations, etc. Besides the considerable economy in time and in space that the Computational Modelling provides, there is a financial economy to the scientists. The Computational Modelling is a modern methodology of investigation that asks for the theoretical study of the identified phenomena in the problem, a coherent mathematical representation of such phenomena, the generation of a numeric algorithmic system comprehensible for the computer, and finally the analysis of the acquired solution, or still getting use of pre-existent systems that facilitate the visualization of these results (editors of Cartesian graphs, for instance). In this work, was being intended to use many computational tools, implementation of numeric methods and a deterministic model in the study and analysis of a well known and simplified problem of nuclear engineering (the neutron transport), simulating a theoretical problem of neutron shielding with physical-material hypothetical parameters, of neutron flow in each space junction, programmed with Scilab version 4.0. (author)

  19. Development of point Kernel radiation shielding analysis computer program implementing recent nuclear data and graphic user interfaces

    International Nuclear Information System (INIS)

    Kang, S.; Lee, S.; Chung, C.

    2002-01-01

    There is an increasing demand for safe and efficient use of radiation and radioactive work activity along with shielding analysis as a result the number of nuclear and conventional facilities using radiation or radioisotope rises. Most Korean industries and research institutes including Korea Power Engineering Company (KOPEC) have been using foreign computer programs for radiation shielding analysis. Korean nuclear regulations have introduced new laws regarding the dose limits and radiological guides as prescribed in the ICRP 60. Thus, the radiation facilities should be designed and operated to comply with these new regulations. In addition, the previous point kernel shielding computer code utilizes antiquated nuclear data (mass attenuation coefficient, buildup factor, etc) which were developed in 1950∼1960. Subsequently, the various nuclear data such mass attenuation coefficient, buildup factor, etc. have been updated during the past few decades. KOPEC's strategic directive is to become a self-sufficient and independent nuclear design technology company, thus KOPEC decided to develop a new radiation shielding computer program that included the latest regulatory requirements and updated nuclear data. This new code was designed by KOPEC with developmental cooperation with Hanyang University, Department of Nuclear Engineering. VisualShield is designed with a graphical user interface to allow even users unfamiliar to radiation shielding theory to proficiently prepare input data sets and analyzing output results

  20. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  1. Bibliography, subject index, and author index of the literature examined by the Radiation Shielding Information Center (Reactor and Weapons Radiation Shielding). [1973--1976

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    An indexed bibliography is presented of literature selected by the Radiation Shielding Information Center since the previous volume was published in 1974 in the area of radiation transport and shielding against radiation from nuclear reactors, x-ray machines, radioisotopes, nuclear weapons (including fallout), and low-energy accelerators (e.g., neutron generators). In addition to lists of literature titles by subject categories (accessions 3501-4950), author and keyword indexes are given. Most of the literature selected for Vol. V was published in the years 1973 to 1976.

  2. Bibliography, subject index, and author index of the literature examined by the Radiation Shielding Information Center (Reactor and Weapons Radiation Shielding)

    International Nuclear Information System (INIS)

    1978-01-01

    An indexed bibliography is presented of literature selected by the Radiation Shielding Information Center since the previous volume was published in 1974 in the area of radiation transport and shielding against radiation from nuclear reactors, x-ray machines, radioisotopes, nuclear weapons (including fallout), and low-energy accelerators (e.g., neutron generators). In addition to lists of literature titles by subject categories (accessions 3501-4950), author and keyword indexes are given. Most of the literature selected for Vol. V was published in the years 1973 to 1976

  3. A new practical model of testes shield: the effectiveness during abdominopelvic computed tomography.

    Science.gov (United States)

    Sancaktutar, Ahmet Ali; Bozkurt, Yaşar; Önder, Hakan; Söylemez, Haluk; Atar, Murat; Penbegül, Necmettin; Ziypak, Tevfik; Tekbaş, Güven; Tepeler, Abdülkadir

    2012-01-01

    The goal of our prospective study was to measure the effect of a new standard model male gonad shield on the testicular radiation exposure during routine abdominopelvic computed tomography (CT). Two hundred male patients who underwent upper abdominal and pelvic CT examinations were included in our study. To prepare the testes shield (TS), 2 No. 8 fluoroscopy radiation-protection gloves made of bismuth (0.35 mm lead equivalent) were used. These gloves were invaginated into one another and their fingers were turned inside out. Scrotums of all patients were pushed into these lead-containing gloves. Upper abdominal CT (n = 6), pelvic CT (n = 9), and abdominopelvic scanning (n = 185) were performed. Immediately after the CT examinations and at postprocedural day 1, the scrotal examinations were repeated. None of the patients exhibited scrotal laceration, edema, eruption, erythema, tenderness, or pain. During the CT examinations, 22 patients (11%) felt unrest because of their exposed genital regions, without any adverse effect on the procedure. Dosimetric measurements of radioactivity inside the TS (dosimeter I) and outside it (dosimeter II) were 6.8 and 69.00 mSv, respectively. Accordingly, the TS we used in our study reduced the radiation exposure of the testes by 90.2% (10.1 times). We think that the use of this radioprotective TS during radiological diagnostic and therapeutic procedures is an appropriate approach from both a medical and legal perspective. Therefore, we recommend this userfriendly, practical, low-cost, and effective TS for all radiologic procedures.

  4. Radiation Shielding Materials Containing Hydrogen, Boron, and Nitrogen: Systematic Computational and Experimental Study

    Data.gov (United States)

    National Aeronautics and Space Administration — The objectives of the proposed research are to develop a space radiation shielding material system that has high efficacy for shielding radiation and also has high...

  5. Computer and information security handbook

    CERN Document Server

    Vacca, John R

    2012-01-01

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed

  6. A phantom-based evaluation of three commercially available patient organ shields for computed tomography X-ray examinations in diagnostic radiology

    International Nuclear Information System (INIS)

    Huggett, J.; Mukonoweshuro, W.; Loader, R.

    2013-01-01

    Three commercially available in-plane patient organ shields (barium eye, bismuth eye and bismuth breast) for computed tomography (CT) examinations were evaluated to determine their effectiveness for dose reduction. Absorbed doses were measured using metal oxide semiconductor field effect transistor dosemeters fastened to a Kyoto CT Torso phantom. Resultant images were visually compared with those minus shielding by an experienced radiologist. Approximate dose reductions of 21, 38 and 50 % were achieved by the barium eye, bismuth eye and bismuth breast shields, respectively, at a cost of increased image noise and streak artefacts. Shielded images produced varied levels of image artefact, particularly those resulting from the eye shields. Measured dose reductions were not consistent with the potential dose savings stated by the manufacturers of the shields. When evaluating the breast shield, similar dose reduction was achieved without shield-induced artefact by simply reducing the X-ray tube current. (authors)

  7. Calculating additional shielding requirements in diagnostics X-ray departments by computer

    International Nuclear Information System (INIS)

    Rahimi, A.

    2004-01-01

    This report provides an extension of an existing method for the calculation of the barrier thickness required to reduce the three types of radiation exposure emitted from the source, the primary, secondary and leakage radiation, to a specified weekly design limit (MPD). Since each of these three types of radiation are of different beam quality, having different shielding requirements, NCRP 49 has provided means to calculate the necessary protective barrier thickness for each type of radiation individually. Additionally, barrier requirements specified using the techniques stated at NCRP 49, show enormous variations among users. Part of the variations is due to different assumptions made regarding the use of the examined room and the characteristics of adjoining space. Many of the differences result from the difficulty of accurately relating information from the calculations to graphs and tables involved in the calculation process specified by this report. Moreover, the latest technological developments such as mammography are not addressed and attenuation data for three-phase generators, that are most widely used today, is not provided. The design of shielding barriers in diagnostic X-ray departments generally follow the ALARA principle. That means that, in practice, the exposure levels are kept 'as low as reasonably achievable', taking into account economical and technical factors. Additionally, the calculation of barrier requirements includes many uncertainties (e.g. the workload, the actual kVp used etc.). (author)

  8. Shielding benchmark problems

    International Nuclear Information System (INIS)

    Tanaka, Shun-ichi; Sasamoto, Nobuo; Oka, Yoshiaki; Kawai, Masayoshi; Nakazawa, Masaharu.

    1978-09-01

    Shielding benchmark problems were prepared by the Working Group of Assessment of Shielding Experiments in the Research Comittee on Shielding Design of the Atomic Energy Society of Japan, and compiled by the Shielding Laboratory of Japan Atomic Energy Research Institute. Twenty-one kinds of shielding benchmark problems are presented for evaluating the calculational algorithm and the accuracy of computer codes based on the discrete ordinates method and the Monte Carlo method and for evaluating the nuclear data used in the codes. (author)

  9. A new shielding calculation method for X-ray computed tomography regarding scattered radiation.

    Science.gov (United States)

    Watanabe, Hiroshi; Noto, Kimiya; Shohji, Tomokazu; Ogawa, Yasuyoshi; Fujibuchi, Toshioh; Yamaguchi, Ichiro; Hiraki, Hitoshi; Kida, Tetsuo; Sasanuma, Kazutoshi; Katsunuma, Yasushi; Nakano, Takurou; Horitsugi, Genki; Hosono, Makoto

    2017-06-01

    The goal of this study is to develop a more appropriate shielding calculation method for computed tomography (CT) in comparison with the Japanese conventional (JC) method and the National Council on Radiation Protection and Measurements (NCRP)-dose length product (DLP) method. Scattered dose distributions were measured in a CT room with 18 scanners (16 scanners in the case of the JC method) for one week during routine clinical use. The radiation doses were calculated for the same period using the JC and NCRP-DLP methods. The mean (NCRP-DLP-calculated dose)/(measured dose) ratios in each direction ranged from 1.7 ± 0.6 to 55 ± 24 (mean ± standard deviation). The NCRP-DLP method underestimated the dose at 3.4% in fewer shielding directions without the gantry and a subject, and the minimum (NCRP-DLP-calculated dose)/(measured dose) ratio was 0.6. The reduction factors were 0.036 ± 0.014 and 0.24 ± 0.061 for the gantry and couch directions, respectively. The (JC-calculated dose)/(measured dose) ratios ranged from 11 ± 8.7 to 404 ± 340. The air kerma scatter factor κ is expected to be twice as high as that calculated with the NCRP-DLP method and the reduction factors are expected to be 0.1 and 0.4 for the gantry and couch directions, respectively. We, therefore, propose a more appropriate method, the Japanese-DLP method, which resolves the issues of possible underestimation of the scattered radiation and overestimation of the reduction factors in the gantry and couch directions.

  10. RSIC [Radiation Shielding Information Center] after 25 years: Challenges and opportunities

    International Nuclear Information System (INIS)

    Roussin, R.W.; Maskewitz, B.F.; Trubey, D.K.

    1988-01-01

    The Radiation Shielding Information Center (RSIC) observed its 25th year in operation in 1987. During that time numerous changes have occurred in the government programs that sponsor RSIC and in the radiation transport community which it serves. The continued need for RSIC is evident from the steady volume of requests and interactions with the user community. It is a continual challenge to adjust and adapt our operation to respond to the demands placed on RSIC by sponsors and users. Cooperation between sponsors, users, and the RSIC staff is the key to keeping RSIC as the focus of activities in the international radiation transport community. 7 refs

  11. Multi-objective optimization of a compact pressurized water nuclear reactor computational model for biological shielding design using innovative materials

    Energy Technology Data Exchange (ETDEWEB)

    Tunes, M.A., E-mail: matheus.tunes@usp.br [Department of Metallurgical and Materials Engineering, Escola Politécnica da Universidade de São Paulo, Av. Prof. Mello Moraes, 2463 – CEP 05508 – 030 São Paulo (Brazil); Oliveira, C.R.E. de, E-mail: cassiano@unm.edu [Department of Nuclear Engineering, The University of New Mexico, Farris Engineering Center, 221, Albuquerque, NM 87131-1070 (United States); Schön, C.G., E-mail: schoen@usp.br [Department of Metallurgical and Materials Engineering, Escola Politécnica da Universidade de São Paulo, Av. Prof. Mello Moraes, 2463 – CEP 05508 – 030 São Paulo (Brazil)

    2017-03-15

    Highlights: • Use of two n-γ transport codes leads to optimized model of compact nuclear reactor. • It was possible to safely reduce both weight and volume of the biological shielding. • Best configuration obtained by using new composites for both γ and n attenuation. - Abstract: The aim of the present work is to develop a computational model of a compact pressurized water nuclear reactor (PWR) to investigate the use of innovative materials to enhance the biological shielding effectiveness. Two radiation transport codes were used: the first one – MCNP – for the PWR design and the GEM/EVENT to simulate (in a 1D slab) the behavior of several materials and shielding thickness on gamma and neutron radiation. Additionally MATLAB Optimization Toolbox was used to provide new geometric configurations of the slab aiming at reducing the volume and weight of the walls by means of a cost/objective function. It is demonstrated in the reactor model that the dose rate outside biological shielding has been reduced by one order of magnitude for the optimized model compared with the initial configuration. Volume and weight of the shielding walls were also reduced. The results indicated that one-dimensional deterministic code to reach an optimized geometry and test materials, combined with a three-dimensional model of a compact nuclear reactor in a stochastic code, is a fast and efficient procedure to test shielding performance and optimization before the experimental assessment. A major outcome of this research is that composite materials (ECOMASS 2150TU96) may replace (with advantages) traditional shielding materials without jeopardizing the nuclear power plant safety assurance.

  12. Computational models for electromagnetic transients in ITER vacuum vessel, cryostat and thermal shield

    International Nuclear Information System (INIS)

    Alekseev, A.; Arslanova, D.; Belov, A.; Belyakov, V.; Gapionok, E.; Gornikel, I.; Gribov, Y.; Ioki, K.; Kukhtin, V.; Lamzin, E.; Sugihara, M.; Sychevsky, S.; Terasawa, A.; Utin, Y.

    2013-01-01

    A set of detailed computational models are reviewed that covers integrally the system “vacuum vessel (VV), cryostat, and thermal shields (TS)” to study transient electromagnetics (EMs) in the ITER machine. The models have been developed in the course of activities requested and supervised by the ITER Organization. EM analysis is enabled for all ITER operational scenarios. The input data are derived from results of DINA code simulations. The external EM fields are modeled accurate to the input data description. The known magnetic shell approach can be effectively applied to simulate thin-walled structures of the ITER machine. Using an integral–differential formulation, a single unknown is determined within the shells in terms of the vector electric potential taken only at the nodes of a finite-element (FE) mesh of the conducting structures. As a result, the FE mesh encompasses only the system “VV + Cryostat + TS”. The 3D model requires much higher computational resources as compared to a shell model based on the equivalent approximation. The shell models have been developed for all principal conducting structures in the system “VV + Cryostat + TS” including regular ports and neutral beam ports. The structures are described in details in accordance with the latest design. The models have also been applied for simulations of EM transients in components of diagnostic systems and cryopumps and estimation of the 3D effects of the ITER structures on the plasma performance. The developed models have been elaborated and applied for the last 15 years to support the ITER design activities. The finalization of the ITER VV design enables this set of models to be considered ready to use in plasma-physics computations and the development of ITER simulators

  13. Dynamics of Information as Natural Computation

    Directory of Open Access Journals (Sweden)

    Gordana Dodig Crnkovic

    2011-08-01

    Full Text Available Processes considered rendering information dynamics have been studied, among others in: questions and answers, observations, communication, learning, belief revision, logical inference, game-theoretic interactions and computation. This article will put the computational approaches into a broader context of natural computation, where information dynamics is not only found in human communication and computational machinery but also in the entire nature. Information is understood as representing the world (reality as an informational web for a cognizing agent, while information dynamics (information processing, computation realizes physical laws through which all the changes of informational structures unfold. Computation as it appears in the natural world is more general than the human process of calculation modeled by the Turing machine. Natural computing is epitomized through the interactions of concurrent, in general asynchronous computational processes which are adequately represented by what Abramsky names “the second generation models of computation” [1] which we argue to be the most general representation of information dynamics.

  14. Radiation shielding lead shield

    International Nuclear Information System (INIS)

    Dei, Shoichi.

    1991-01-01

    The present invention concerns lead shields for radiation shielding. Shield boxes are disposed so as to surround a pipeline through which radioactive liquids, mists or like other objects are passed. Flanges are formed to each of the end edges of the shield boxes and the shield boxes are connected to each other by the flanges. Upon installation, empty shield boxes not charged with lead particles and iron plate shields are secured at first at the periphery of the pipeline. Then, lead particles are charged into the shield boxes. This attains a state as if lead plate corresponding to the depth of the box is disposed. Accordingly, operations for installation, dismantling and restoration can be conducted in an empty state with reduced weight to facilitate the operations. (I.S.)

  15. Radiation shielding activities at the OECD/Nuclear Energy Agency

    International Nuclear Information System (INIS)

    Sartori, Enrico; Vaz, Pedro

    2000-01-01

    The OECD Nuclear Energy Agency (NEA) has devoted considerable effort over the years to radiation shielding issues. The issues are addressed through international working groups. These activities are carried out in close co-ordination and co-operation with the Radiation Safety Information Computational Center (RSICC). The areas of work include: basic nuclear data activities in support of radiation shielding, computer codes, shipping cask shielding applications, reactor pressure vessel dosimetry, shielding experiments database. The method of work includes organising international code comparison exercises and benchmark studies. Training courses on radiation shielding computer codes are organised regularly including hands-on experience in modelling skills. The scope of the activity covers mainly reactor shields and spent fuel transportation packages, but also fusion neutronics and in particular shielding of accelerators and irradiation facilities. (author)

  16. The Radiation Safety Information Computational Center (RSICC): A Resource for Nuclear Science Applications

    International Nuclear Information System (INIS)

    Kirk, Bernadette Lugue

    2009-01-01

    The Radiation Safety Information Computational Center (RSICC) has been in existence since 1963. RSICC collects, organizes, evaluates and disseminates technical information (software and nuclear data) involving the transport of neutral and charged particle radiation, and shielding and protection from the radiation associated with: nuclear weapons and materials, fission and fusion reactors, outer space, accelerators, medical facilities, and nuclear waste management. RSICC serves over 12,000 scientists and engineers from about 100 countries. An important activity of RSICC is its participation in international efforts on computational and experimental benchmarks. An example is the Shielding Integral Benchmarks Archival Database (SINBAD), which includes shielding benchmarks for fission, fusion and accelerators. RSICC is funded by the United States Department of Energy, Department of Homeland Security and Nuclear Regulatory Commission.

  17. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  18. Recent trends in radiation shielding: a RSIC perspective

    International Nuclear Information System (INIS)

    Trubey, D.K.; Roussin, R.W.; Maskewitz, B.F.

    1979-01-01

    The subject of radiation transport and shielding in the nuclear power industry is reviewed, and advances in the state of the art are described. These fall into the areas of computational methods, nuclear cross sections, industry practices, and standards. Computer codes and data available from the Radiation Shielding Information Center (RSIC) representing recent advances are also described

  19. Assessment of the integrity of structural shielding of four computed tomography facilities in the greater Accra region of Ghana

    International Nuclear Information System (INIS)

    Nkansah, A.; Schandorf, C.; Boadu, M.; Fletcher, J. J.

    2013-01-01

    The structural shielding thicknesses of the walls of four computed tomography (CT) facilities in Ghana were re-evaluated to verify the shielding integrity using the new shielding design methods recommended by the National Council on Radiological Protection and Measurements (NCRP). The shielding thickness obtained ranged from 120 to 155 mm using default DLP values proposed by the European Commission and 110 to 168 mm using derived DLP values from the four CT manufacturers. These values are within the accepted standard concrete wall thickness ranging from 102 to 152 mm prescribed by the NCRP. The ultrasonic pulse testing of all walls indicated that these are of good quality and free of voids since pulse velocities estimated were within the range of 3.496±0.005 km s -1 . An average dose equivalent rate estimated for supervised areas is 3.4±0.27 μSv week -1 and that for the controlled area is 18.0±0.15 μSv week -1 , which are within acceptable values. (authors)

  20. Design of emergency shield

    International Nuclear Information System (INIS)

    Soliman, S.E.

    1993-01-01

    Manufacturing of an emergency movable shield in the hot laboratories center is urgently needed for the safety of personnel in case of accidents or spilling of radioactive materials. In this report, a full design for an emergency shield is presented and the corresponding dose rates behind the shield for different activities (from 1 mCi to 5 Ci) was calculated by using micro shield computer code. 4 figs., 1 tab

  1. Traffic information computing platform for big data

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Zongtao, E-mail: ztduan@chd.edu.cn; Li, Ying, E-mail: ztduan@chd.edu.cn; Zheng, Xibin, E-mail: ztduan@chd.edu.cn; Liu, Yan, E-mail: ztduan@chd.edu.cn; Dai, Jiting, E-mail: ztduan@chd.edu.cn; Kang, Jun, E-mail: ztduan@chd.edu.cn [Chang' an University School of Information Engineering, Xi' an, China and Shaanxi Engineering and Technical Research Center for Road and Traffic Detection, Xi' an (China)

    2014-10-06

    Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users.

  2. Traffic information computing platform for big data

    International Nuclear Information System (INIS)

    Duan, Zongtao; Li, Ying; Zheng, Xibin; Liu, Yan; Dai, Jiting; Kang, Jun

    2014-01-01

    Big data environment create data conditions for improving the quality of traffic information service. The target of this article is to construct a traffic information computing platform for big data environment. Through in-depth analysis the connotation and technology characteristics of big data and traffic information service, a distributed traffic atomic information computing platform architecture is proposed. Under the big data environment, this type of traffic atomic information computing architecture helps to guarantee the traffic safety and efficient operation, more intelligent and personalized traffic information service can be used for the traffic information users

  3. Modelling and computer simulation for the manufacture by powder HIPing of Blanket Shield components for ITER

    International Nuclear Information System (INIS)

    Gillia, O.; Bucci, Ph.; Vidotto, F.; Leibold, J.-M.; Boireau, B.; Boudot, C.; Cottin, A.; Lorenzetto, P.; Jacquinot, F.

    2006-01-01

    In components of blanket modules for ITER, intricate cooling networks are needed in order to evacuate all heat coming from the plasma. Hot Isostatic Pressing (HIPing) technology is a very convenient method to produce near net shape components with complex cooling network through massive stainless steel parts by bonding together tubes inserted in grooves machined in bulk stainless steel. Powder is often included in the process so as to release difficulties arising with gaps closure between tube and solid part or between several solid parts. In the mean time, it releases the machining precision needed on the parts to assemble before HIP. However, inserting powder in the assembly means densification, i.e. volume change of powder during the HIP cycle. This leads to global and local shape changes of HIPed parts. In order to control the deformations, modelling and computer simulation are used. This modelling and computer simulation work has been done in support to the fabrication of a shield prototype for the ITER blanket. Problems such as global bending of the whole part and deformations of tubes in their powder bed are addressed. It is important that the part does not bend too much. It is important as well to have circular tube shape after HIP, firstly in order to avoid their rupture during HIP but also because non destructive ultrasonic examination is needed to check the quality of the densification and bonding between tube and powder or solid parts; the insertions of a probe in the tubes requires a minimal circular tube shape. For simulation purposes, the behaviour of the different materials has to be modelled. Although the modelling of the massive stainless steel behaviour is not neglected, the most critical modelling is about power. For this study, a thorough investigation on the powder behaviour has been performed with some in-situ HIP dilatometry experiments and some interrupted HIP cycles on trial parts. These experiments have allowed the identification of a

  4. Evaluation of the computer code system RADHEAT-V4 by analysing benchmark problems on radiation shielding

    International Nuclear Information System (INIS)

    Sakamoto, Yukio; Naito, Yoshitaka

    1990-11-01

    A computer code system RADHEAT-V4 has been developed for safety evaluation on radiation shielding of nuclear fuel facilities. To evaluate the performance of the code system, 18 benchmark problem were selected and analysed. Evaluated radiations are neutron and gamma-ray. Benchmark problems consist of penetration, streaming and skyshine. The computed results show more accurate than those by the Sn codes ANISN and DOT3.5 or the Monte Carlo code MORSE. Big core memory and many times I/O are, however, required for RADHEAT-V4. (author)

  5. Philosophy, computing and information science

    CERN Document Server

    Hagengruber, Ruth

    2014-01-01

    Over the last four decades computers and the internet have become an intrinsic part of all our lives, but this speed of development has left related philosophical enquiry behind. Featuring the work of computer scientists and philosophers, these essays provide an overview of an exciting new area of philosophy that is still taking shape.

  6. Development of a computer code for determining the thickness of shielding used in cardiac angiography techniques

    International Nuclear Information System (INIS)

    Lava, Deise D.; Borges, Diogo da S.; Affonso, Renato R.W.; Moreira, Maria de L.; Guimaraes, Antonio C.F.

    2014-01-01

    The construction of an effective shielding against the interaction of ionizing radiation in X-ray rooms requires consideration of many variables. The methodology used for specification of a primary and secondary shielding thickness of a X-ray room considers the following factors: use factor, occupational factor, distance between the source and the wall, workload, Kerma in the air and distance between the patient and the receptor. The program built from this data, has the objective of identifying and using variables in functions obtained through linear regressions of graphics offered by NCRP Report-147 (Structural Shielding Design for Medical X-Ray Imaging Facilities) for the shielding calculation of the room walls as wall dark room and adjacent areas. With the methodology constructed a program validation is done by comparison of results with a base case provided by that report. The values of the thicknesses obtained comprise various materials such as steel, wood and concrete. Once validated an application is made in a real case of X-ray room. His visual construction is done with the help of software used in modeling of interiors and exteriors. The construction of shielding calculating program has the goal of being an easy tool for planning of X-ray rooms in order to meet the established limits by CNEN-NN-3:01 published in September 2011

  7. Design of a management information system for the Shielding Experimental Reactor ageing management

    International Nuclear Information System (INIS)

    He Jie; Xu Xianhong

    2010-01-01

    The problem of nuclear reactor ageing is a topic of increasing importance in nuclear safety recent years. Ageing management is usually implemented for reactors maintenance. In the practice, a large number of data and records need to be processed. However, there are few professional software applications that aid reactor ageing management, especially for research reactors. This paper introduces the design of a new web-based management information system (MIS), named the Shielding Experimental Reactor Ageing Management Information System (SERAMIS). It is an auxiliary means that helps to collect data, keep records, and retrieve information for a research reactor ageing management. The Java2 Enterprise Edition (J2EE) and network database techniques, such as three-tiered model, Model-View-Controller architecture, transaction-oriented operations, and JavaScript techniques, are used in the development of this system. The functionalities of the application cover periodic safety review (PSR), regulatory references, data inspection, and SSCs classification according to ageing management methodology. Data and examples are presented to demonstrate the functionalities. For future work, techniques of data mining will be employed to support decision-making.

  8. Design of a management information system for the Shielding Experimental Reactor ageing management

    Energy Technology Data Exchange (ETDEWEB)

    He Jie, E-mail: hejiejoe@163.co [Institute of Nuclear and New Energy Technology, Tsinghua University, Beijing 100084 (China); Xu Xianhong [Institute of Nuclear and New Energy Technology, Tsinghua University, Beijing 100084 (China)

    2010-01-15

    The problem of nuclear reactor ageing is a topic of increasing importance in nuclear safety recent years. Ageing management is usually implemented for reactors maintenance. In the practice, a large number of data and records need to be processed. However, there are few professional software applications that aid reactor ageing management, especially for research reactors. This paper introduces the design of a new web-based management information system (MIS), named the Shielding Experimental Reactor Ageing Management Information System (SERAMIS). It is an auxiliary means that helps to collect data, keep records, and retrieve information for a research reactor ageing management. The Java2 Enterprise Edition (J2EE) and network database techniques, such as three-tiered model, Model-View-Controller architecture, transaction-oriented operations, and JavaScript techniques, are used in the development of this system. The functionalities of the application cover periodic safety review (PSR), regulatory references, data inspection, and SSCs classification according to ageing management methodology. Data and examples are presented to demonstrate the functionalities. For future work, techniques of data mining will be employed to support decision-making.

  9. COMPUTATIONAL FLUID DYNAMICS INVESTIGATION ON THE USE OF HEAT SHIELDS FOR THERMAL MANAGEMENT IN A CAR UNDERHOOD

    Directory of Open Access Journals (Sweden)

    S.Y. Lam

    2012-12-01

    Full Text Available Temperature variations inside a car underhood are largely controlled by the heat originating from the engine block and the exhaust manifold. Excessive temperatures in the underhood can lead to the faster deterioration of engine components and may affect the thermal comfort level inside the passenger cabin. This paper presents computational fluid dynamics investigations to assess the performance of a heat shield in lowering the peak temperature of the engine components and firewall in the underhood region of a typical passenger car. The simulation used the finite volume method with the standard k-ε turbulence model and an isothermal model for the heat transfer calculations. The results show that the heat shield managed to reduce the peak temperature of the engine components and firewall by insulating the intense heat from the engine block and exhaust and regulating the airflow inside the underhood region.

  10. Sharing Elderly Healthcare information on Cloud Computing

    OpenAIRE

    Lu, Fangjie; Khan, Israr

    2012-01-01

    Context: Due to rapid increase in the population of elderly people, sharing healthcare information has become an essential requirement for the development of e-health system. By conducting a research in e-health and cloud computing we have explored the advantages and disadvantages of sharing healthcare information for elderly people through cloud computing. Objectives: The main purpose of this research is to investigate the suitability of cloud computing to share healthcare information. The s...

  11. Computer virus information update CIAC-2301

    Energy Technology Data Exchange (ETDEWEB)

    Orvis, W.J.

    1994-01-15

    While CIAC periodically issues bulletins about specific computer viruses, these bulletins do not cover all the computer viruses that affect desktop computers. The purpose of this document is to identify most of the known viruses for the MS-DOS and Macintosh platforms and give an overview of the effects of each virus. The authors also include information on some windows, Atari, and Amiga viruses. This document is revised periodically as new virus information becomes available. This document replaces all earlier versions of the CIAC Computer virus Information Update. The date on the front cover indicates date on which the information in this document was extracted from CIAC`s Virus database.

  12. Electromagnetically shielded building

    International Nuclear Information System (INIS)

    Takahashi, T.; Nakamura, M.; Yabana, Y.; Ishikawa, T.; Nagata, K.

    1992-01-01

    This invention relates to a building having an electromagnetic shield structure well-suited for application to an information network system utilizing electromagnetic waves, and more particularly to an electromagnetically shielded building for enhancing the electromagnetic shielding performance of an external wall. 6 figs

  13. Electromagnetically shielded building

    Energy Technology Data Exchange (ETDEWEB)

    Takahashi, T; Nakamura, M; Yabana, Y; Ishikawa, T; Nagata, K

    1992-04-21

    This invention relates to a building having an electromagnetic shield structure well-suited for application to an information network system utilizing electromagnetic waves, and more particularly to an electromagnetically shielded building for enhancing the electromagnetic shielding performance of an external wall. 6 figs.

  14. Federal High End Computing (HEC) Information Portal

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This portal provides information about opportunities to engage in U.S. Federal government high performance computing activities, including supercomputer use,...

  15. Acquisition of Computers That Process Corporate Information

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1999-01-01

    The Secretary of Defense announced the Corporate Information Management initiative on November 16, 1990, to establish a DoD-wide concept for managing computer, communications, and information management functions...

  16. Semiotics, Information Science, Documents and Computers.

    Science.gov (United States)

    Warner, Julian

    1990-01-01

    Discusses the relationship and value of semiotics to the established domains of information science. Highlights include documentation; computer operations; the language of computing; automata theory; linguistics; speech and writing; and the written language as a unifying principle for the document and the computer. (93 references) (LRW)

  17. Assessment of the structural shielding integrity of some selected computed tomography facilities in the Greater Accra Region of Ghana

    International Nuclear Information System (INIS)

    Nkansah, A.

    2010-01-01

    The structural shielding integrity was assessed for four of the CT facilities at Trust Hospital, Korle-Bu Teaching Hospital, the 37 Military Hospital and Medical Imaging Ghana Ltd. in the Greater Accra Region of Ghana. From the shielding calculations, the concrete wall thickness computed are 120, 145, 140 and 155mm, for Medical Imaging Ghana Ltd. 37 Military, Trust Hospital and Korle-Bu Teaching Hospital respectively using Default DLP values. The wall thickness using Derived DLP values are 110, 110, 120 and 168mm for Medical Imaging Ghana Ltd, 37 Military Hospital, Trust Hospital and Korle-Bu Teaching Hospital respectively. These values are within the accepted standard concrete thickness of 102- 152mm prescribed by the National Council of Radiological Protection and measurement. The ultrasonic pulse testing indicated that all the sandcrete walls are of good quality and free of voids since pulse velocities estimated were approximately equal to 3.45km/s. an average dose rate measurement for supervised areas is 3.4 μSv/wk and controlled areas is 18.0 μSv/wk. These dose rates were below the acceptable levels of 100 μSv per week for the occupationally exposed and 20 μSv per week for members of the public provided by the ICRU. The results mean that the structural shielding thickness are adequate to protect members of the public and occupationally exposed workers (au).

  18. New Information Dispersal Techniques for Trustworthy Computing

    Science.gov (United States)

    Parakh, Abhishek

    2011-01-01

    Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for many critical applications, such as cloud computing, in the information society. In the most general sense, this is achieved by dividing data…

  19. Shielding benchmark problems, (2)

    International Nuclear Information System (INIS)

    Tanaka, Shun-ichi; Sasamoto, Nobuo; Oka, Yoshiaki; Shin, Kazuo; Tada, Keiko.

    1980-02-01

    Shielding benchmark problems prepared by Working Group of Assessment of Shielding Experiments in the Research Committee on Shielding Design in the Atomic Energy Society of Japan were compiled by Shielding Laboratory in Japan Atomic Energy Research Institute. Fourteen shielding benchmark problems are presented newly in addition to twenty-one problems proposed already, for evaluating the calculational algorithm and accuracy of computer codes based on discrete ordinates method and Monte Carlo method and for evaluating the nuclear data used in codes. The present benchmark problems are principally for investigating the backscattering and the streaming of neutrons and gamma rays in two- and three-dimensional configurations. (author)

  20. The Radiation Safety Information Computational Center (RSICC): A Resource for Nuclear Science Applications

    Energy Technology Data Exchange (ETDEWEB)

    Kirk, Bernadette Lugue [ORNL

    2009-01-01

    The Radiation Safety Information Computational Center (RSICC) has been in existence since 1963. RSICC collects, organizes, evaluates and disseminates technical information (software and nuclear data) involving the transport of neutral and charged particle radiation, and shielding and protection from the radiation associated with: nuclear weapons and materials, fission and fusion reactors, outer space, accelerators, medical facilities, and nuclear waste management. RSICC serves over 12,000 scientists and engineers from about 100 countries.

  1. Journalists' Privilege to Withhold Information in Judicial and Other Proceedings: State Shield Statutes

    National Research Council Canada - National Science Library

    Cohen, Henry

    2007-01-01

    .... To date, 33 states and the District of Columbia have recognized a journalists' privilege through the enactment of press "shield laws," which protect the relationship between reporters, their source...

  2. Computer-Supported Information Systems.

    Science.gov (United States)

    Mayhew, William H.

    1983-01-01

    The planning and implementation of a computerized management information system at a fictional small college is described. Nine key points are made regarding department involvement, centralization, gradual program implementation, lowering costs, system documentation, and upper-level administrative support. (MSE)

  3. Quantitative assessment of selective in-plane shielding of tissues in computed tomography through evaluation of absorbed dose and image quality

    International Nuclear Information System (INIS)

    Geleijns, J.; Veldkamp, W.J.H.; Salvado Artells, M.; Lopez Tortosa, M.; Calzado Cantera, A.

    2006-01-01

    This study aimed at assessment of efficacy of selective in-plane shielding in adults by quantitative evaluation of the achieved dose reduction and image quality. Commercially available accessories for in-plane shielding of the eye lens, thyroid and breast, and an anthropomorphic phantom were used for the evaluation of absorbed dose and image quality. Organ dose and total energy imparted were assessed by means of a Monte Carlo technique taking into account tube voltage, tube current, and scanner type. Image quality was quantified as noise in soft tissue. Application of the lens shield reduced dose to the lens by 27% and to the brain by 1%. The thyroid shield reduced thyroid dose by 26%; the breast shield reduced dose to the breasts by 30% and to the lungs by 15%. Total energy imparted (unshielded/shielded) was 88/86 mJ for computed tomography (CT) brain, 64/60 mJ for CT cervical spine, and 289/260 mJ for CT chest scanning. An increase in image noise could be observed in the ranges were bismuth shielding was applied. The observed reduction of organ dose and total energy imparted could be achieved more efficiently by a reduction of tube current. The application of in-plane selective shielding is therefore discouraged. (orig.)

  4. Iterative Metallic Artifact Reduction for In-Plane Gonadal Shielding During Computed Tomographic Venography of Young Males.

    Science.gov (United States)

    Choi, Jin Woo; Lee, Sang Yub; Kim, Jong Hyo; Jin, Hyeongmin; Lee, Jaewon; Choi, Young Hun; Lee, Hyeon-Kyeong; Park, Jae Hyung

    The purpose of this study was to evaluate a gonadal shield (GS) and iterative metallic artifact reduction (IMAR) during computed tomography scans, regarding the image quality and radiation dose. A phantom was imaged with and without a GS. Prospectively enrolled, young male patients underwent lower extremity computed tomography venography (precontrast imaging without the GS and postcontrast imaging with the GS). Radiation dose was measured each time, and the GS-applied images were reconstructed by weighted filtered back projection and IMAR. In the phantom study, image artifacts were significantly reduced by using IMAR (P = 0.031), whereas the GS reduced the radiation dose by 61.3%. In the clinical study (n = 29), IMAR mitigated artifacts from the GS, thus 96.6% of the IMAR image sets were clinically usable. Gonadal shielding reduced the radiation dose to the testes by 69.0%. The GS in conjunction with IMAR significantly reduced the radiation dose to the testes while maintaining the image quality.

  5. Evaluation using Monte Carlo simulations, of the effect of a shielding, called external shielding, for fotoneutrons generated in linear accelerators, using the computational model of Varian accelerator 2300 C/D operating in eight rotation angles of the GA

    International Nuclear Information System (INIS)

    Silva, Hugo R.; Silva, Ademir X.; Rebello, Wilson F.; Silva, Maria G.

    2011-01-01

    This paper aims to present the results obtained by Monte Carlo simulation of the effect of shielding against neutrons, called External Shielding, to be placed on the heads of linear accelerators used in radiotherapy. For this, it was used the radiation transport code Monte Carlo N-Particle - MCNPX, in which were developed computational model of the head of the linear accelerator Varian 2300 C/D. The equipment was simulated within a bunker, operating at energies of 10, 15 and 18 MV, considering the rotation of the gantry at eight different angles ( 0 deg, 45 deg, 90 deg, 135 deg, 180 deg, 225 deg, 270 deg and 315 deg), in all cases, the equipment was modeled without and with the shielding positioned attached to the head of the accelerator on its bottom. In each of these settings, it was calculated the Ambient Dose Equivalent due to neutron H * (10)n on points situated in the region of the patient (region of interest for evaluation of undesirable neutron doses on the patient) and in the maze of radiotherapy room (region of interest for shielding the access door to the bunker). It was observed for all energies of equipment operation as well as for all angles of inclination of the gantry, a significant reduction in the values of H * (10) n when the equipment operated with the external shielding, both in the region of the patient as in the region of the maze. (author)

  6. Philosophy of computing and information technology

    OpenAIRE

    Brey, Philip A.E.; Soraker, Johnny; Meijers, A.

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions that cannot readily be approached within traditional philosophical frameworks. As such, computer technology is arguably the technology that has had the most profound impact on philosophy. Philosopher...

  7. Computational Intelligence in Information Systems Conference

    CERN Document Server

    Au, Thien-Wan; Omar, Saiful

    2017-01-01

    This book constitutes the Proceedings of the Computational Intelligence in Information Systems conference (CIIS 2016), held in Brunei, November 18–20, 2016. The CIIS conference provides a platform for researchers to exchange the latest ideas and to present new research advances in general areas related to computational intelligence and its applications. The 26 revised full papers presented in this book have been carefully selected from 62 submissions. They cover a wide range of topics and application areas in computational intelligence and informatics.

  8. Introduction to Quantum Information/Computing

    National Research Council Canada - National Science Library

    Costianes, Peter J

    2005-01-01

    Quantum Information Technology (QIT) is a relatively new area of research whose purpose is to take advantage of the quantum nature of matter and energy to design and build quantum computers which have the potential of improved...

  9. Philosophy of computing and information technology

    NARCIS (Netherlands)

    Brey, Philip A.E.; Soraker, Johnny; Meijers, A.

    2009-01-01

    Philosophy has been described as having taken a “computational turn,” referring to the ways in which computers and information technology throw new light upon traditional philosophical issues, provide new tools and concepts for philosophical reasoning, and pose theoretical and practical questions

  10. Accelerator shielding benchmark problems

    International Nuclear Information System (INIS)

    Hirayama, H.; Ban, S.; Nakamura, T.

    1993-01-01

    Accelerator shielding benchmark problems prepared by Working Group of Accelerator Shielding in the Research Committee on Radiation Behavior in the Atomic Energy Society of Japan were compiled by Radiation Safety Control Center of National Laboratory for High Energy Physics. Twenty-five accelerator shielding benchmark problems are presented for evaluating the calculational algorithm, the accuracy of computer codes and the nuclear data used in codes. (author)

  11. Computer Simulation in Information and Communication Engineering

    CERN Multimedia

    Anton Topurov

    2005-01-01

    CSICE'05 Sofia, Bulgaria 20th - 22nd October, 2005 On behalf of the International Scientific Committee, we would like to invite you all to Sofia, the capital city of Bulgaria, to the International Conference in Computer Simulation in Information and Communication Engineering CSICE'05. The Conference is aimed at facilitating the exchange of experience in the field of computer simulation gained not only in traditional fields (Communications, Electronics, Physics...) but also in the areas of biomedical engineering, environment, industrial design, etc. The objective of the Conference is to bring together lectures, researchers and practitioners from different countries, working in the fields of computer simulation in information engineering, in order to exchange information and bring new contribution to this important field of engineering design and education. The Conference will bring you the latest ideas and development of the tools for computer simulation directly from their inventors. Contribution describ...

  12. Extreme Physics and Informational/Computational Limits

    Energy Technology Data Exchange (ETDEWEB)

    Di Sia, Paolo, E-mail: paolo.disia@univr.it, E-mail: 10alla33@virgilio.it [Department of Computer Science, Faculty of Science, Verona University, Strada Le Grazie 15, I-37134 Verona (Italy) and Faculty of Computer Science, Free University of Bozen, Piazza Domenicani 3, I-39100 Bozen-Bolzano (Italy)

    2011-07-08

    A sector of the current theoretical physics, even called 'extreme physics', deals with topics concerning superstring theories, multiverse, quantum teleportation, negative energy, and more, that only few years ago were considered scientific imaginations or purely speculative physics. Present experimental lines of evidence and implications of cosmological observations seem on the contrary support such theories. These new physical developments lead to informational limits, as the quantity of information, that a physical system can record, and computational limits, resulting from considerations regarding black holes and space-time fluctuations. In this paper I consider important limits for information and computation resulting in particular from string theories and its foundations.

  13. Extreme Physics and Informational/Computational Limits

    International Nuclear Information System (INIS)

    Di Sia, Paolo

    2011-01-01

    A sector of the current theoretical physics, even called 'extreme physics', deals with topics concerning superstring theories, multiverse, quantum teleportation, negative energy, and more, that only few years ago were considered scientific imaginations or purely speculative physics. Present experimental lines of evidence and implications of cosmological observations seem on the contrary support such theories. These new physical developments lead to informational limits, as the quantity of information, that a physical system can record, and computational limits, resulting from considerations regarding black holes and space-time fluctuations. In this paper I consider important limits for information and computation resulting in particular from string theories and its foundations.

  14. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  15. Prevalence of Protective Shielding Utilization for Radiation Dose Reduction in Adult Patients Undergoing Body Scanning Using Computed Tomography.

    Science.gov (United States)

    Safiullah, Shoaib; Patel, Roshan; Uribe, Brittany; Spradling, Kyle; Lall, Chandana; Zhang, Lishi; Okhunov, Zhamshid; Clayman, Ralph V; Landman, Jaime

    2017-10-01

    Ionizing radiation is implicated in nearly 2% of malignancies in the United States; radiation shields prevent unnecessary radiation exposure during medical imaging. Contemporary radiation shield utilization for adult patients in the United States is poorly defined. Therefore, we evaluated the prevalence of protective shielding utilization in adult patients undergoing CT scans in United States' hospitals. An online survey was sent to established radiology departments randomly selected from the 2015 American Hospital Association Guide. Radiology departments conducting adult CT imaging were eligible; among 370 eligible departments, 215 departments accepted the study participation request. Questions focused on shielding practices during CT imaging of the eyes, thyroid, breasts, and gonads. Prevalence data were stratified per hospital location, size, and type. Main outcomes included overall protective shielding utilization, respondents' belief and knowledge regarding radiation safety, and organ-specific shielding prevalence. Sixty-seven of 215 (31%) hospitals completed the survey; 66 (99%) reported familiarity with the ALARA (as low as reasonably achievable) principle and 56 (84%) affirmed their belief that shielding is beneficial. Only 60% of hospitals employed shielding during CT imaging; among these institutions, shielding varied based on CT study: abdominopelvic CT (13, 33%), head CT (33, 83%), or chest CT (30, 75%). Among surveyed hospitals, 40% do not utilize CT shielding despite the majority acknowledging the ALARA principle and agreeing that shielding is a beneficial practice. Failure to address the low prevalence of protective shielding may lead to poor community health due to increased risk of radiation-related cancers.

  16. Shielding computations for solution transfer lines from Analytical Lab to process cells of Demonstration Fast Reactor Plant (DFRP)

    International Nuclear Information System (INIS)

    Baskar, S.; Jose, M.T.; Baskaran, R.; Venkatraman, B.

    2018-01-01

    The diluted virgin solutions (both aqueous and organic) and aqueous analytical waste generated from experimental analysis of process solutions, pertaining to Fast Breeder Test Reactor (FBTR) and Prototype Fast Breeder Reactor (PFBR), in glove boxes of active analytical Laboratory (AAL) are pumped back to the process cells through a pipe in pipe arrangement. There are 6 transfer lines (Length 15-32 m), 2 for each type of transfer. The transfer lines passes through the area inside the AAL and also the operating area. Hence it is required to compute the necessary radial shielding requirement around the lines to limit the dose rates in both the areas to the permissible values as per the regulatory requirement

  17. (CICT) Computing, Information, and Communications Technology Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The goal of the Computing, Information, and Communications Technology (CICT) program is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communications technologies. This viewgraph presentation includes diagrams of how the political guidance behind CICT is structured. The presentation profiles each part of the NASA Mission in detail, and relates the Mission to the activities of CICT. CICT's Integrated Capability Goal is illustrated, and hypothetical missions which could be enabled by CICT are profiled. CICT technology development is profiled.

  18. A three-dimensional computed tomography-assisted Monte Carlo evaluation of ovoid shielding on the dose to the bladder and rectum in intracavitary radiotherapy for cervical cancer

    International Nuclear Information System (INIS)

    Gifford, Kent A.; Horton, John L.; Pelloski, Christopher E.; Jhingran, Anuja; Court, Laurence E.; Mourtada, Firas; Eifel, Patricia J.

    2005-01-01

    Purpose: To determine the effects of Fletcher Suit Delclos ovoid shielding on dose to the bladder and rectum during intracavitary radiotherapy for cervical cancer. Methods and Materials: The Monte Carlo method was used to calculate the dose in 12 patients receiving low-dose-rate intracavitary radiotherapy with both shielded and unshielded ovoids. Cumulative dose-difference surface histograms were computed for the bladder and rectum. Doses to the 2-cm 3 and 5-cm 3 volumes of highest dose were computed for the bladder and rectum with and without shielding. Results: Shielding affected dose to the 2-cm 3 and 5-cm 3 volumes of highest dose for the rectum (10.1% and 11.1% differences, respectively). Shielding did not have a major impact on the dose to the 2-cm 3 and 5-cm 3 volumes of highest dose for the bladder. The average dose reduction to 5% of the surface area of the bladder was 53 cGy. Reductions as large as 150 cGy were observed to 5% of the surface area of the bladder. The average dose reduction to 5% of the surface area of the rectum was 195 cGy. Reductions as large as 405 cGy were observed to 5% of the surface area of the rectum. Conclusions: Our data suggest that the ovoid shields can greatly reduce the radiation dose delivered to the rectum. We did not find the same degree of effect on the dose to the bladder. To calculate the dose accurately, however, the ovoid shields must be included in the dose model

  19. Computer aided information system for a PWR

    International Nuclear Information System (INIS)

    Vaidian, T.A.; Karmakar, G.; Rajagopal, R.; Shankar, V.; Patil, R.K.

    1994-01-01

    The computer aided information system (CAIS) is designed with a view to improve the performance of the operator. CAIS assists the plant operator in an advisory and support role, thereby reducing the workload level and potential human errors. The CAIS as explained here has been designed for a PWR type KLT- 40 used in Floating Nuclear Power Stations (FNPS). However the underlying philosophy evolved in designing the CAIS can be suitably adopted for other type of nuclear power plants too (BWR, PHWR). Operator information is divided into three broad categories: a) continuously available information b) automatically available information and c) on demand information. Two in number touch screens are provided on the main control panel. One is earmarked for continuously available information and the other is dedicated for automatically available information. Both the screens can be used at the operator's discretion for on-demand information. Automatically available information screen overrides the on-demand information screens. In addition to the above, CAIS has the features of event sequence recording, disturbance recording and information documentation. CAIS design ensures that the operator is not overburdened with excess and unnecessary information, but at the same time adequate and well formatted information is available. (author). 5 refs., 4 figs

  20. Shielding practice

    International Nuclear Information System (INIS)

    Sauermann, P.F.

    1985-08-01

    The basis of shielding practice against external irradiation is shown in a simple way. For most sources of radiation (point sources) occurring in shielding practice, the basic data are given, mainly in the form of tables, which are required to solve the shielding problems. The application of these data is explained and discussed using practical examples. Thickness of shielding panes of glove boxes for α and β radiation; shielding of sealed γ-radiography sources; shielding of a Co-60 radiation source, and of the manipulator panels for hot cells; damping factors for γ radiation and neutrons; shielding of fast and thermal neutrons, and of bremsstrahlung (X-ray tubes, Kr-85 pressure gas cylinders, 42 MeV betatrons, 20 MeV linacs); two-fold shielding (lead glass windows for hot cells, 14 MeV neutron generators); shielding against scattered radiation. (orig./HP) [de

  1. Soft Computing in Construction Information Technology

    NARCIS (Netherlands)

    Ciftcioglu, O.; Durmisevic, S.; Sariyildiz, S.

    2001-01-01

    The last decade, civil engineering has exercised a rapidly growing interest in the application of neurally inspired computing techniques. The motive for this interest was the promises of certain information processing characteristics, which are similar to some extend, to those of human brain. The

  2. Gonadal shielding and collimation information for pelvic radiography in podiatric practice

    International Nuclear Information System (INIS)

    Kalin, A.G.

    1976-01-01

    Pelvic x-rays are often necessary in podiatric practice, to aid in the diagnosis of podiatric and foot-related disorders. The disorders which warrant such x-rays are reviewed. The author urges caution in the administration of pelvic x-rays, citing the possible genetic effects of gonadal exposure to x-rays. Various methods of dose reduction are discussed, with special emphasis on collimators to confine radiation to the smallest body area and gonadal shields to protect the gonads when they fall within the direct x-ray beam

  3. Gonadal shielding and collimation information for pelvic radiography in podiatric practice

    Energy Technology Data Exchange (ETDEWEB)

    Kalin, A.G.

    1976-01-01

    Pelvic x-rays are often necessary in podiatric practice, to aid in the diagnosis of podiatric and foot-related disorders. The disorders which warrant such x-rays are reviewed. The author urges caution in the administration of pelvic x-rays, citing the possible genetic effects of gonadal exposure to x-rays. Various methods of dose reduction are discussed, with special emphasis on collimators to confine radiation to the smallest body area and gonadal shields to protect the gonads when they fall within the direct x-ray beam.

  4. Computer code ANISN multiplying media and shielding calculation II. Code description (input/output)

    International Nuclear Information System (INIS)

    Maiorino, J.R.

    1990-01-01

    The user manual of the ANISN computer code describing input and output subroutines is presented. ANISN code was developed to solve one-dimensional transport equation for neutron or gamma rays in slab, sphere or cylinder geometry with general anisotropic scattering. The solution technique is the discrete ordinate method. (M.C.K.)

  5. Electromagnetic shielding

    International Nuclear Information System (INIS)

    Tzeng, Wen-Shian V.

    1991-01-01

    Electromagnetic interference (EMI) shielding materials are well known in the art in forms such as gaskets, caulking compounds, adhesives, coatings and the like for a variety of EMI shielding purposes. In the past, where high shielding performance is necessary, EMI shielding has tended to use silver particles or silver coated copper particles dispersed in a resin binder. More recently, aluminum core silver coated particles have been used to reduce costs while maintaining good electrical and physical properties. (author). 8 figs

  6. On the hydraulic behaviour of ITER Shield Blocks #14 and #08. Computational analysis and comparison with experimental tests

    Energy Technology Data Exchange (ETDEWEB)

    Di Maio, P.A. [Dipartimento di Energia, Ingegneria dell’Informazione e Modelli Matematici, Università di Palermo Viale delle Scienze, 90128, Palermo (Italy); Merola, M.; Mitteau, R.; Raffray, R. [ITER Organization, Route de Vinon sur Verdon, 13067 Saint Paul, Lez Durance (France); Vallone, E., E-mail: eug.vallone@gmail.com [Dipartimento di Energia, Ingegneria dell’Informazione e Modelli Matematici, Università di Palermo Viale delle Scienze, 90128, Palermo (Italy)

    2016-11-01

    Highlights: • A benchmarking activity has been carried out focusing the attention on the cooling circuits of ITER Shield Blocks #08 and #14. • A theoretical-computational fluid-dynamic approach based on the Finite Volume Method has been followed, adopting a commercial code. • Hydraulic characteristic functions and spatial distributions of coolant mass flow rate, velocity and pressure drop have been assessed. • Results obtained have allowed code benchmarking for Blanket modules and the numerical predictions have been found to be generally lower than but quite close to the experimental results (lower than 10%). - Abstract: As a consequence of its position and functions, the ITER blanket system will be subjected to significant heat loads under nominal reference conditions. Therefore, the design of its cooling system is particularly demanding. Coolant water is distributed individually to the 440 blanket modules (BMs) through manifold piping, which makes it a highly parallelized system. The mass flow rate distribution is finely tuned to meet all operation constraints: adequate margin to burn out in the plasma facing components, even distribution of water flow among the so-called plasma-facing “fingers” of the Blanket First Wall panels, high enough water flow rate to avoid excessive water temperature in the outlet pipes, maximum allowable water velocity lower than 7 m/s in manifold pipes. Furthermore the overall pressure drop and flow rate in each BM shall be within the fixed specified design limit to avoid an unduly unbalance of cooling among the 440 modules. Analyses have to be carried out following a computational fluid-dynamic (CFD) approach based on the finite volume method and adopting a CFD commercial code to assess the thermal-hydraulic behaviour of each single circuit of the ITER blanket cooling system. This paper describes the code benchmarking needed to determine the best method to get reliable and timely results. Since experimental tests are

  7. Computer and Information Sciences II : 26th International Symposium on Computer and Information Sciences

    CERN Document Server

    Lent, Ricardo; Sakellari, Georgia

    2012-01-01

    Information technology is the enabling foundation for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 26th International Symposium on Computer and Information Systems, held at the Royal Society in London on 26th to 28th September 2011. Computer and Information Sciences II contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams in both Europe and Asia.

  8. Neutron shielding point kernel integral calculation code for personal computer: PKN-pc

    International Nuclear Information System (INIS)

    Kotegawa, Hiroshi; Sakamoto, Yukio; Nakane, Yoshihiro; Tomita, Ken-ichi; Kurosawa, Naohiro.

    1994-07-01

    A personal computer version of PKN code, PKN-pc, has been developed to calculate neutron and secondary gamma-ray 1cm depth dose equivalents in water, ordinary concrete and iron for neutron source. Characteristics of PKN code are, to able to calculate dose equivalents in multi-layer three-dimensional system, which are described with two-dimensional surface, for monoenergetic neutron source from 0.01 to 14.9 MeV, 252 Cf fission and 241 Am-Be neutron source quick and easily. In addition to these features, the PKN-pc is possible to process interactive input and to get graphical system configuration and graphical results easily. (author)

  9. Computational programs for shielding calculation with transport of one dimensional and monoenergetic SN

    International Nuclear Information System (INIS)

    Nunes, Carlos Eduardo A.; Barros, Ricardo C.

    2009-01-01

    This paper describes a computational program for result simulation of neutron transport problems at one velocity with isotropic scattering in Cartesian onedimensional geometry. Describing the physical modelling, the next phase is a mathematical modelling of the physical problem for simulation of the neutron distribution. The mathematical modelling uses the linearized Boltzmann equation which represents a balance among the production and loss of particles. The formulation of the discrete ordinates S N consists of discretization of angular variables at N directions (discrete ordinates), and using a set of angular quadratures for the approximation of integral terms of scattering sources. The S N equations are numerically solved. This work describes three numerical methods: diamond difference, step and characteristic step. The paper also presents numerical results for illustration of the efficiency of the developed program

  10. Analysis of the ITER computational shielding benchmark with the Monte Carlo TRIPOLI-4{sup ®} neutron gamma coupled calculations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yi-Kang, E-mail: yi-kang.lee@cea.fr

    2016-11-01

    Highlights: • Verification and validation of TRIPOLI-4 radiation transport calculations for ITER shielding benchmark. • Evaluation of CEA-V5.1.1 and FENDL-3.0 nuclear data libraries on D–T fusion neutron continuous energy transport calculations. • Advances in nuclear analyses for nuclear heating and radiation damage in iron. • This work also demonstrates that the “safety factors” concept is necessary in the nuclear analyses of ITER. - Abstract: With the growing interest in using the continuous-energy TRIPOLI-4{sup ®} Monte Carlo radiation transport code for ITER applications, a key issue that arises is whether or not the released TRIPOLI-4 code and its associated nuclear data libraries are verified and validated for the D–T fusion neutronics calculations. Previous published benchmark results of TRIPOLI-4 code on the ITER related activities have concentrated on the first wall loading, the reactor dosimetry, the nuclear heating, and the tritium breeding ratio. To enhance the TRIPOLI-4 verification and validation on neutron-gamma coupled calculations for fusion device application, the computational ITER shielding benchmark of M. E. Sawan was performed in this work by using the 2013 released TRIPOLI-4.9S code and the associated CEA-V5.1.1 data library. First wall, blanket, vacuum vessel and toroidal field magnet of the inboard and outboard components were fully modelled in this 1-D toroidal cylindrical benchmark. The 14.1 MeV source neutrons were sampled from a uniform isotropic distribution in the plasma zone. Nuclear responses including neutron and gamma fluxes, nuclear heating, and material damage indicator were benchmarked against previous published results. The capabilities of the TRIPOLI-4 code on the evaluation of above physics parameters were presented. The nuclear data library from the new FENDL-3.0 evaluation was also benchmarked against the CEA-V5.1.1 results for the neutron transport calculations. The results show that both data libraries

  11. Analysis of the ITER computational shielding benchmark with the Monte Carlo TRIPOLI-4® neutron gamma coupled calculations

    International Nuclear Information System (INIS)

    Lee, Yi-Kang

    2016-01-01

    Highlights: • Verification and validation of TRIPOLI-4 radiation transport calculations for ITER shielding benchmark. • Evaluation of CEA-V5.1.1 and FENDL-3.0 nuclear data libraries on D–T fusion neutron continuous energy transport calculations. • Advances in nuclear analyses for nuclear heating and radiation damage in iron. • This work also demonstrates that the “safety factors” concept is necessary in the nuclear analyses of ITER. - Abstract: With the growing interest in using the continuous-energy TRIPOLI-4 ® Monte Carlo radiation transport code for ITER applications, a key issue that arises is whether or not the released TRIPOLI-4 code and its associated nuclear data libraries are verified and validated for the D–T fusion neutronics calculations. Previous published benchmark results of TRIPOLI-4 code on the ITER related activities have concentrated on the first wall loading, the reactor dosimetry, the nuclear heating, and the tritium breeding ratio. To enhance the TRIPOLI-4 verification and validation on neutron-gamma coupled calculations for fusion device application, the computational ITER shielding benchmark of M. E. Sawan was performed in this work by using the 2013 released TRIPOLI-4.9S code and the associated CEA-V5.1.1 data library. First wall, blanket, vacuum vessel and toroidal field magnet of the inboard and outboard components were fully modelled in this 1-D toroidal cylindrical benchmark. The 14.1 MeV source neutrons were sampled from a uniform isotropic distribution in the plasma zone. Nuclear responses including neutron and gamma fluxes, nuclear heating, and material damage indicator were benchmarked against previous published results. The capabilities of the TRIPOLI-4 code on the evaluation of above physics parameters were presented. The nuclear data library from the new FENDL-3.0 evaluation was also benchmarked against the CEA-V5.1.1 results for the neutron transport calculations. The results show that both data libraries can be

  12. Shielding plugs

    International Nuclear Information System (INIS)

    Makishima, Kenji.

    1986-01-01

    Purpose: In shielding plugs of an LMFBR type reactor, to restrain natural convection of heat in an annular space between a thermal shield layer and a shield shell, to prevent the lowering of heat-insulation performance, and to alleviate a thermal stress in a reactor container and the shield shell. Constitution: A ring-like leaf spring split in the direction of height is disposed in an annular space between a thermal shield layer and a shield shell. In consequence, the space is partitioned in the direction of height and, therefore, if axial temperature conditions and space width are the same and the space is low, the natural convection is hard to occur. Thus the rise of upper surface temperature of the shielding plugs can prevent the lowering of the heat insulation performance which will result in the increment of shielding plug cooling capacity, thereby improving reliability. In the meantime, since there is mounted an earthquake-resisting support, the thermal shield layer will move for a slight gap in case of an earthquake, being supported by the earthquake-resisting support, and the movement of the thermal shield layer is restricted, thereby maintaining integrity without increasing the stroke of the ring-like spring. (Kawakami, Y.)

  13. Topogram-based tube current modulation of head computed tomography for optimizing image quality while protecting the eye lens with shielding.

    Science.gov (United States)

    Lin, Ming-Fang; Chen, Chia-Yuen; Lee, Yuan-Hao; Li, Chia-Wei; Gerweck, Leo E; Wang, Hao; Chan, Wing P

    2018-01-01

    Background Multiple rounds of head computed tomography (CT) scans increase the risk of radiation-induced lens opacification. Purpose To investigate the effects of CT eye shielding and topogram-based tube current modulation (TCM) on the radiation dose received by the lens and the image quality of nasal and periorbital imaging. Material and Methods An anthropomorphic phantom was CT-scanned using either automatic tube current modulation or a fixed tube current. The lens radiation dose was estimated using cropped Gafchromic films irradiated with or without a shield over the orbit. Image quality, assessed using regions of interest drawn on the bilateral extraorbital areas and the nasal bone with a water-based marker, was evaluated using both a signal-to-noise ratio (SNR) and contrast-noise ratio (CNR). Two CT specialists independently assessed image artifacts using a three-point Likert scale. Results The estimated radiation dose received by the lens was significantly lower when barium sulfate or bismuth-antimony shields were used in conjunction with a fixed tube current (22.0% and 35.6% reduction, respectively). Topogram-based TCM mitigated the beam hardening-associated artifacts of bismuth-antimony and barium sulfate shields. This increased the SNR by 21.6% in the extraorbital region and the CNR by 7.2% between the nasal bones and extraorbital regions. The combination of topogram-based TCM and barium sulfate or bismuth-antimony shields reduced lens doses by 12.2% and 27.2%, respectively. Conclusion Image artifacts induced by the bismuth-antimony shield at a fixed tube current for lenticular radioprotection were significantly reduced by topogram-based TCM, which increased the SNR of the anthropomorphic nasal bones and periorbital tissues.

  14. Secure information transfer based on computing reservoir

    Energy Technology Data Exchange (ETDEWEB)

    Szmoski, R.M.; Ferrari, F.A.S. [Department of Physics, Universidade Estadual de Ponta Grossa, 84030-900, Ponta Grossa (Brazil); Pinto, S.E. de S, E-mail: desouzapinto@pq.cnpq.br [Department of Physics, Universidade Estadual de Ponta Grossa, 84030-900, Ponta Grossa (Brazil); Baptista, M.S. [Institute for Complex Systems and Mathematical Biology, SUPA, University of Aberdeen, Aberdeen (United Kingdom); Viana, R.L. [Department of Physics, Universidade Federal do Parana, 81531-990, Curitiba, Parana (Brazil)

    2013-04-01

    There is a broad area of research to ensure that information is transmitted securely. Within this scope, chaos-based cryptography takes a prominent role due to its nonlinear properties. Using these properties, we propose a secure mechanism for transmitting data that relies on chaotic networks. We use a nonlinear on–off device to cipher the message, and the transfer entropy to retrieve it. We analyze the system capability for sending messages, and we obtain expressions for the operating time. We demonstrate the system efficiency for a wide range of parameters. We find similarities between our method and the reservoir computing.

  15. Monte Carlo computation of Bremsstrahlung intensity and energy spectrum from a 15 MV linear electron accelerator tungsten target to optimise LINAC head shielding

    International Nuclear Information System (INIS)

    Biju, K.; Sharma, Amiya; Yadav, R.K.; Kannan, R.; Bhatt, B.C.

    2003-01-01

    The knowledge of exact photon intensity and energy distributions from the target of an electron target is necessary while designing the shielding for the accelerator head from radiation safety point of view. The computations were carried out for the intensity and energy distribution of photon spectrum from a 0.4 cm thick tungsten target in different angular directions for 15 MeV electrons using a validated Monte Carlo code MCNP4A. Similar results were computed for 30 MeV electrons and found agreeing with the data available in literature. These graphs and the TVT values in lead help to suggest an optimum shielding thickness for 15 MV Linac head. (author)

  16. Computer and Information Sciences III : 27th International Symposium on Computer and Information Sciences

    CERN Document Server

    Lent, Ricardo

    2013-01-01

    Information technology is the enabling foundation science and technology for all of human activity at the beginning of the 21st century, and advances in this area are crucial to all of us. These advances are taking place all over the world and can only be followed and perceived when researchers from all over the world assemble, and exchange their ideas in conferences such as the one presented in this proceedings volume regarding the 27th International Symposium on Computer and Information Systems, held at the Institut Henri Poincare' in Paris on October 3 and 4, 2012. Computer and Information Sciences III: 27th International Symposium on Computer and Information Sciences contains novel advances in the state of the art covering applied research in electrical and computer engineering and computer science, across the broad area of information technology. It provides access to the main innovative activities in research across the world, and points to the results obtained recently by some of the most active teams ...

  17. Shielding chalculations in x-rays installations for medical diagnosis. description of the method and computational solution

    International Nuclear Information System (INIS)

    Borroto Valdes, M.; Saez, D.G.

    1992-01-01

    Shielding requirements for x-rays diagnostic installations are investigated. The description of an entirely analytical method for calculation of thickness, based in the papers of Simpkin and NCRP49, is presented. Considerations described in specialized method to solving this problem. A program for microcomputer IBM and compatibles ones is available for estimation of minimum shielding requirements in lead, concrete and steel. Similar results were obtained from comparing with others authors

  18. The application of SHIELD-HIT12A computer code to calculate of absorption dose for in vitro and in vivo test in BNCT

    International Nuclear Information System (INIS)

    Yohannes Sardjono; Hamidatul Faqqiyyah; Niels Bassler

    2014-01-01

    The projection of world population growth and increased longevity are leading to a rapid increase in the total number of middle-aged and older adults, with a corresponding increase in the number of deaths caused by non communicable diseases. It is projected that the annual number of deaths due to cardiovascular disease will increase from 17 million in 2008 to 25 million in 2030 with annual cancer deaths increasing from 7.6 million to 13 million. Boron Neutron Capture Therapy is a therapy that utilizes the absorption interaction of Boron-10 with thermal neutron and become He-4 particle and located in cell target and very short half life gamma emission. Studies were carried out to dose distribution in HER-2+ breast cancer therapy by Boron Neutron Capture Therapy (BNCT) using SHIELD Heavy Ion Therapy (HIT12A) T program. The Monte Carlo particle transport code SHIELD-HIT1 is designed to precisely simulate therapeutic beams of protons and ions in biological tissue relevant for ion beam cancer therapy. SHIELD-HIT (Heavy Ion Therapy) evolved from the common SHIELD code that models interactions of hadrons and atomic nuclei in complex extended targets in the energy range up to 1 TeV/nucleon. Through this computer code can be applied to calculate of absorption dose in cell target. (author)

  19. Angular neutron transport investigation in the HZETRN free-space ion and nucleon transport and shielding computer program

    International Nuclear Information System (INIS)

    Singleterry, R.C. Jr.; Wilson, J.W.

    1997-01-01

    Extension of the high charge and energy (HZE) transport computer program HZETRN for angular transport of neutrons is considered. For this paper, only light ion transport, He 4 and lighter, will be analyzed using a pure solar proton source. The angular transport calculator is the ANISN/PC program which is being controlled by the HZETRN program. The neutron flux values are compared for straight-ahead transport and angular transport in one dimension. The shield material is aluminum and the target material is water. The thickness of these materials is varied; however, only the largest model calculated is reported which is 50 gm/cm 2 of aluminum and 100 gm/cm 2 of water. The flux from the ANISN/PC calculation is about two orders of magnitude lower than the flux from HZETRN for very low energy neutrons. It is only a magnitude lower for the neutrons in the 10 to 20 MeV range in the aluminum and two orders lower in the water. The major reason for this difference is in the transport modes: straight-ahead versus angular. The angular treatment allows a longer path length than the straight-ahead approximation. Another reason is the different cross section sets used by the ANISN/PC-BUGLE-80 mode and the HZETRN mode. The next step is to investigate further the differences between the two codes and isolate the differences to just the angular versus straight-ahead transport mode. Then, create a better coupling between the angular neutron transport and the charged particle transport

  20. Analysis methods for Kevlar shield response to rotor fragments

    Science.gov (United States)

    Gerstle, J. H.

    1977-01-01

    Several empirical and analytical approaches to rotor burst shield sizing are compared and principal differences in metal and fabric dynamic behavior are discussed. The application of transient structural response computer programs to predict Kevlar containment limits is described. For preliminary shield sizing, present analytical methods are useful if insufficient test data for empirical modeling are available. To provide other information useful for engineering design, analytical methods require further developments in material characterization, failure criteria, loads definition, and post-impact fragment trajectory prediction.

  1. Shielding container

    International Nuclear Information System (INIS)

    Darling, K.A.M.

    1981-01-01

    A shielding container incorporates a dense shield, for example of depleted uranium, cast around a tubular member of curvilinear configuration for accommodating a radiation source capsule. A lining for the tubular member, in the form of a close-coiled flexible guide, provides easy replaceability to counter wear while the container is in service. Container life is extended, and maintenance costs are reduced. (author)

  2. Informatics everywhere : information and computation in society, science, and technology

    NARCIS (Netherlands)

    Verhoeff, T.

    2013-01-01

    Informatics is about information and its processing, also known as computation. Nowadays, children grow up taking smartphones and the internet for granted. Information and computation rule society. Science uses computerized equipment to collect, analyze, and visualize massive amounts of data.

  3. PREFACE: Quantum Information, Communication, Computation and Cryptography

    Science.gov (United States)

    Benatti, F.; Fannes, M.; Floreanini, R.; Petritis, D.

    2007-07-01

    The application of quantum mechanics to information related fields such as communication, computation and cryptography is a fast growing line of research that has been witnessing an outburst of theoretical and experimental results, with possible practical applications. On the one hand, quantum cryptography with its impact on secrecy of transmission is having its first important actual implementations; on the other hand, the recent advances in quantum optics, ion trapping, BEC manipulation, spin and quantum dot technologies allow us to put to direct test a great deal of theoretical ideas and results. These achievements have stimulated a reborn interest in various aspects of quantum mechanics, creating a unique interplay between physics, both theoretical and experimental, mathematics, information theory and computer science. In view of all these developments, it appeared timely to organize a meeting where graduate students and young researchers could be exposed to the fundamentals of the theory, while senior experts could exchange their latest results. The activity was structured as a school followed by a workshop, and took place at The Abdus Salam International Center for Theoretical Physics (ICTP) and The International School for Advanced Studies (SISSA) in Trieste, Italy, from 12-23 June 2006. The meeting was part of the activity of the Joint European Master Curriculum Development Programme in Quantum Information, Communication, Cryptography and Computation, involving the Universities of Cergy-Pontoise (France), Chania (Greece), Leuven (Belgium), Rennes1 (France) and Trieste (Italy). This special issue of Journal of Physics A: Mathematical and Theoretical collects 22 contributions from well known experts who took part in the workshop. They summarize the present day status of the research in the manifold aspects of quantum information. The issue is opened by two review articles, the first by G Adesso and F Illuminati discussing entanglement in continuous variable

  4. Computational methodology for the Oak Ridge Research Reactor (ORR) and Bulk Shielding Reactor (BSR): cross-section and validation. Volume 1

    International Nuclear Information System (INIS)

    Miller, L.F.; Williams, M.L.

    1986-03-01

    A neutronics library suitable for low-enrichment uranium (LEU) and high-enrichment uranium (HEU) fueled cores for both the Oak Ridge Research Reactor (ORR) and the Bulk Shielding Reactor (BSR) is documented herein. The library is obtained from version V of the Evaluated Nuclear Data File (ENDF/B-V) and contains 223 nuclides weighted over a variety of region-dependent neutron spectra. Self-shielding and zone-weighting effects are incorporated with 227-group calculations for several reactor-core configurations. Libraries are archived for both transport and diffusion theory seven-group calculations. Complete listings of processing details are included so that libraries with different specifications can be easily obtained. Results from validation calculations indicate that the neutronics libraries obtained from this effort are suitable for neutronics computations for the ORR and BSR. 12 refs., 5 figs., 15 tabs

  5. Secure medical information sharing in cloud computing.

    Science.gov (United States)

    Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia

    2015-01-01

    Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.

  6. AGIS: Evolution of Distributed Computing Information system for ATLAS

    CERN Document Server

    Anisenkov, Alexey; The ATLAS collaboration; Alandes Pradillo, Maria; Karavakis, Edward

    2015-01-01

    The variety of the ATLAS Computing Infrastructure requires a central information system to define the topology of computing resources and to store the different parameters and configuration data which are needed by the various ATLAS software components. The ATLAS Grid Information System is the system designed to integrate configuration and status information about resources, services and topology of the computing infrastructure used by ATLAS Distributed Computing applications and services.

  7. Quantum information. Teleportation - cryptography - quantum computer

    International Nuclear Information System (INIS)

    Koenneker, Carsten

    2012-01-01

    The following topics are dealt with: Reality in the test facility, quantum teleportation, the reality of quanta, interaction-free quantum measurement, rules for quantum computers, quantum computers with ions, spintronics with diamond, the limits of the quantum computers, a view in the future of quantum optics. (HSI)

  8. Quantum information. Teleporation - cryptography - quantum computer

    International Nuclear Information System (INIS)

    Breuer, Reinhard

    2010-01-01

    The following topics are dealt with: Reality in the test house, quantum teleportation, 100 years of quantum theory, the reality of quanta, interactionless quantum measurement, rules for quantum computers, quantum computers with ions, spintronics with diamond, the limits of the quantum computers, a view into the future of quantum optics. (HSI)

  9. Electromagnetic shield

    International Nuclear Information System (INIS)

    Miller, J.S.

    1987-01-01

    An electromagnetic shield is described comprising: closed, electrically-conductive rings, each having an open center; and binder means for arranging the rings in a predetermined, fixed relationship relative to each other, the so-arranged rings and binder means defining an outer surface; wherein electromagnetic energy received by the shield from a source adjacent its outer surface induces an electrical current to flow in a predetermined direction adjacent and parallel to the outer surface, through the rings; and wherein each ring is configured to cause source-induced alternating current flowing through the portion of the ring closest to the outer surface to electromagnetically induce an oppositely-directed current in the portion of the ring furthest from the surface, such oppositely-directed current bucking any source-induced current in the latter ring portion and thus reducing the magnitude of current flowing through it, whereby the electromagnetic shielding effected by the shield is enhanced

  10. Neutron shieldings

    International Nuclear Information System (INIS)

    Tarutani, Kohei

    1979-01-01

    Purpose: To decrease the stresses resulted by the core bendings to the base of an entrance nozzle. Constitution: Three types of round shielding rods of different diameter are arranged in a hexagonal tube. The hexagonal tube is provided with several spacer pads receiving the loads from the core constrain mechanism at its outer circumference, a handling head for a fuel exchanger at its top and an entrance nozzle for self-holding the neutron shieldings and flowing heat-removing coolants at its bottom. The diameters for R 1 , R 2 and R 3 for the round shielding rods are designed as: 0.1 R 1 2 1 and 0.2 R 1 2 1 . Since a plurality of shielding rods of small diameter are provided, soft structure are obtained and a plurality of coolant paths are formed. (Furukawa, Y.)

  11. Nuclear shields

    International Nuclear Information System (INIS)

    Linares, R.C.; Nienart, L.F.; Toelcke, G.A.

    1976-01-01

    A process is described for preparing melt-processable nuclear shielding compositions from chloro-fluoro substituted ethylene polymers, particularly PCTFE and E-CTFE, containing 1 to 75 percent by weight of a gadolinium compound. 13 claims, no drawings

  12. REACTOR SHIELD

    Science.gov (United States)

    Wigner, E.P.; Ohlinger, L.E.; Young, G.J.; Weinberg, A.M.

    1959-02-17

    Radiation shield construction is described for a nuclear reactor. The shield is comprised of a plurality of steel plates arranged in parallel spaced relationship within a peripheral shell. Reactor coolant inlet tubes extend at right angles through the plates and baffles are arranged between the plates at right angles thereto and extend between the tubes to create a series of zigzag channels between the plates for the circulation of coolant fluid through the shield. The shield may be divided into two main sections; an inner section adjacent the reactor container and an outer section spaced therefrom. Coolant through the first section may be circulated at a faster rate than coolant circulated through the outer section since the area closest to the reactor container is at a higher temperature and is more radioactive. The two sections may have separate cooling systems to prevent the coolant in the outer section from mixing with the more contaminated coolant in the inner section.

  13. Multimodal Information Presentation for High-Load Human Computer Interaction

    NARCIS (Netherlands)

    Cao, Y.

    2011-01-01

    This dissertation addresses multimodal information presentation in human computer interaction. Information presentation refers to the manner in which computer systems/interfaces present information to human users. More specifically, the focus of our work is not on which information to present, but

  14. Development of a computational code for calculations of shielding in dental facilities; Desenvolvimento de um codigo computacional para calculos de blindagem em instalacoes odontologicas

    Energy Technology Data Exchange (ETDEWEB)

    Lava, Deise D.; Borges, Diogo da S.; Affonso, Renato R.W.; Guimaraes, Antonio C.F.; Moreira, Maria de L., E-mail: deise_dy@hotmail.com, E-mail: diogosb@outlook.com, E-mail: raoniwa@yahoo.com.br, E-mail: tony@ien.gov.br, E-mail: malu@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil)

    2014-07-01

    This paper is prepared in order to address calculations of shielding to minimize the interaction of patients with ionizing radiation and / or personnel. The work includes the use of protection report Radiation in Dental Medicine (NCRP-145 or Radiation Protection in Dentistry), which establishes calculations and standards to be adopted to ensure safety to those who may be exposed to ionizing radiation in dental facilities, according to the dose limits established by CNEN-NN-3.1 standard published in September / 2011. The methodology comprises the use of computer language for processing data provided by that report, and a commercial application used for creating residential projects and decoration. The FORTRAN language was adopted as a method for application to a real case. The result is a programming capable of returning data related to the thickness of material, such as steel, lead, wood, glass, plaster, acrylic, acrylic and leaded glass, which can be used for effective shielding against single or continuous pulse beams. Several variables are used to calculate the thickness of the shield, as: number of films used in the week, film load, use factor, occupational factor, distance between the wall and the source, transmission factor, workload, area definition, beam intensity, intraoral and panoramic exam. Before the application of the methodology is made a validation of results with examples provided by NCRP-145. The calculations redone from the examples provide answers consistent with the report.

  15. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  16. A Revolution in Information Technology - Cloud Computing

    OpenAIRE

    Divya BHATT

    2012-01-01

    What is the Internet? It is collection of “interconnected networks” represented as a Cloud in network diagrams and Cloud Computing is a metaphor for certain parts of the Internet. The IT enterprises and individuals are searching for a way to reduce the cost of computation, storage and communication. Cloud Computing is an Internet-based technology providing “On-Demand” solutions for addressing these scenarios that should be flexible enough for adaptation and responsive to requirements. The hug...

  17. Elementary computation of radiation doses and shieldings for radiochemical laboratories; Calculo Elemental de dosis y blindajes para laboratorios radioquimicos

    Energy Technology Data Exchange (ETDEWEB)

    Jimeno de Osso, F

    1971-07-01

    Simple procedures for the calculation of radiation exposition, half thickness, shield thickness, etc. are described and equations and graphs are included for those gamma-emitting radionuclides, that are more often used in radiochemical laboratories. Application is made of these procedures to three radionuclides, bromine-82, sodium-24 and cobalt-60 which cover a rather wl.de energy range; theoretical results are compared with those obtained from experimental measurements. (Author) 23 refs.

  18. Penetration shielding applications of CYLSEC

    International Nuclear Information System (INIS)

    Dexheimer, D.T.; Hathaway, J.M.

    1985-01-01

    Evaluation of penetration and discontinuity shielding is necessary to meet 10CFR20 regulations for ensuring personnel exposures are as low as reasonably achievable (ALARA). Historically, those shielding evaluations have been done to some degree on all projects. However, many early plants used conservative methods due to lack of an economical computer code, resulting in costly penetration shielding programs. With the increased industry interest in cost effectively reducing personnel exposures to meet ALARA regulations and with the development of the CYLSEC gamma transport computer code at Bechtel, a comprehensive effort was initiated to reduce penetration and discontinuity shielding but still provide a prudent degree of protection for plant personnel from radiation streaming. This effort was more comprehensive than previous programs due to advances in shielding analysis technology and increased interest in controlling project costs while maintaining personnel exposures ALARA. Methodology and resulting cost savings are discussed

  19. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  20. Radiation shielding

    International Nuclear Information System (INIS)

    Aitken, D.

    1979-01-01

    Shields for equipment in which ionising radiation is associated with high electrical gradients, for example X-ray tubes and particle accelerators, incorporate a radiation-absorbing metal, as such or as a compound, and are electrically non-conducting and can be placed in the high electrical gradient region of the equipment. Substances disclosed include dispersions of lead, tungsten, uranium or oxides of these in acrylics polyesters, PVC, ABS, polyamides, PTFE, epoxy resins, glass or ceramics. The material used may constitute an evacuable enclosure of the equipment or may be an external shield thereof. (U.K.)

  1. URR [Unresolved Resonance Region] computer code: A code to calculate resonance neutron cross-section probability tables, Bondarenko self-shielding factors, and self-indication ratios for fissile and fertile nuclides

    International Nuclear Information System (INIS)

    Leal, L.C.; de Saussure, G.; Perez, R.B.

    1990-01-01

    The URR computer code has been developed to calculate cross-section probability tables, Bondarenko self-shielding factors, and self-indication ratios for fertile and fissile isotopes in the unresolved resonance region. Monte Carlo methods are utilized to select appropriate resonance parameters and to compute the cross sections at the desired reference energy. The neutron cross sections are calculated by the single-level Breit-Wigner formalism with s-, p-, and d-wave contributions. The cross-section probability tables are constructed by sampling by Doppler broadened cross-sections. The various self-shielding factors are computer numerically as Lebesgue integrals over the cross-section probability tables

  2. Concrete radiation shielding

    International Nuclear Information System (INIS)

    Kaplan, M.F.

    1989-01-01

    The increased use of nuclear energy has given rise to a growth in the amount of artificially produced radiation and radioactive materials. The design and construction of shielding to protect people, equipment and structures from the effects of radiation has never been more important. Experience has shown that concrete is an effective, versatile and economical material for the construction of radiation shielding. This book provides information on the principles governing the interaction of radiation with matter and on relevant nuclear physics to give the engineer an understanding of the design and construction of concrete shielding. It covers the physical, mechanical and nuclear properties of concrete; the effects of elevated temperatures and possible damage to concrete due to radiation; basic procedures for the design of concrete radiation shields and finally the special problems associated with their construction and cost. Although written primarily for engineers concerned with the design and construction of concrete shielding, the book also reviews the widely scattered data and information available on this subject and should therefore be of interest to students and those wishing to research further in this field. (author)

  3. Patterns of students' computer use and relations to their computer and information literacy

    DEFF Research Database (Denmark)

    Bundsgaard, Jeppe; Gerick, Julia

    2017-01-01

    Background: Previous studies have shown that there is a complex relationship between students’ computer and information literacy (CIL) and their use of information and communication technologies (ICT) for both recreational and school use. Methods: This study seeks to dig deeper into these complex...... relations by identifying different patterns of students’ school-related and recreational computer use in the 21 countries participating in the International Computer and Information Literacy Study (ICILS 2013). Results: Latent class analysis (LCA) of the student questionnaire and performance data from......, raising important questions about differences in contexts. Keywords: ICILS, Computer use, Latent class analysis (LCA), Computer and information literacy....

  4. Human-Computer Interaction and Information Management Research Needs

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — In a visionary future, Human-Computer Interaction HCI and Information Management IM have the potential to enable humans to better manage their lives through the use...

  5. Information granularity, big data, and computational intelligence

    CERN Document Server

    Chen, Shyi-Ming

    2015-01-01

    The recent pursuits emerging in the realm of big data processing, interpretation, collection and organization have emerged in numerous sectors including business, industry, and government organizations. Data sets such as customer transactions for a mega-retailer, weather monitoring, intelligence gathering, quickly outpace the capacities of traditional techniques and tools of data analysis. The 3V (volume, variability and velocity) challenges led to the emergence of new techniques and tools in data visualization, acquisition, and serialization. Soft Computing being regarded as a plethora of technologies of fuzzy sets (or Granular Computing), neurocomputing and evolutionary optimization brings forward a number of unique features that might be instrumental to the development of concepts and algorithms to deal with big data. This carefully edited volume provides the reader with an updated, in-depth material on the emerging principles, conceptual underpinnings, algorithms and practice of Computational Intelligenc...

  6. Gonadal shield.

    Science.gov (United States)

    Purdy, J A; Stiteler, R D; Glasgow, G P; Mill, W B

    1975-10-01

    A secondary gonadal shield for use in the pelvic irradiation of males was designed and built using material and apparatus available with the Cerrobend blocking system. The gonadal dose was reduced to approximately 1.5 to 2.5% of the given dose.

  7. Gonad shielding in diagnostic radiology

    International Nuclear Information System (INIS)

    1975-06-01

    The use of gonad shielding is an important radiation protection technique, intended to reduce unnecessary x-ray exposure of the gonads of patients from diagnostic x-ray procedures. This pamphlet will provide physicians and radiologic technologists with information which will aid their appropriate use of gonad shielding

  8. Analytical Computation of Information Rate for MIMO Channels

    Directory of Open Access Journals (Sweden)

    Jinbao Zhang

    2017-01-01

    Full Text Available Information rate for discrete signaling constellations is significant. However, the computational complexity makes information rate rather difficult to analyze for arbitrary fading multiple-input multiple-output (MIMO channels. An analytical method is proposed to compute information rate, which is characterized by considerable accuracy, reasonable complexity, and concise representation. These features will improve accuracy for performance analysis with criterion of information rate.

  9. Methods and experimental coefficients used in the computation of reactor shielding; Methodes et coefficients experimentaux pour le calcul des protections de reacteurs

    Energy Technology Data Exchange (ETDEWEB)

    Bourgeois, J; Lafore, P; Millot, J P; Rastoin, J; Vathaire, F de [Commissariat a l' Energie Atomique, Saclay (France).Centre d' Etudes Nucleaires

    1959-07-01

    1) The concept of an effective removal cross section has been developed in order more easily to compute reactor shielding thicknesses. We have built an experimental facility for the purpose of measuring effective removal cross sections, the value of which had not been published at that time. The first part of this paper describes the device or facility used, the computation method applied, and the results obtained. 2) Starting from this concept, we endeavoured to define a removal cross section as a function of energy. This enabled us to use the method for computations bearing on the attenuation of fast neutrons of any spectrum. An experimental verification was carried out for the case of fission neutrons filtered by a substantial thickness of graphite. 3) Finally, we outline a computation method enabling us to determine the sources of captured gamma rays by the age theory and we give an example of the application in a composite shield. (author) [French] 1) La notion de section efficace effective de deplacement a ete introduite pour calculer commodement les epaisseurs de protection des reacteurs. Nous avons construit un dispositif experimental destine a mesurer les sections efficaces effectives de deplacement dont la valeur n'avait pas ete publiee a cette epoque. La premiere partie de cette communication decrit le dispositif utilise, la methode de calcul employee et les resultats obtenus. 2) A partir de cette notion, nous avons essaye de definir une section efficace de deplacement fonction de l'energie. Ceci permet d'utiliser la methode du deplacement pour des calculs d'attenuation de neutrons rapides dont le spectre est quelconque. Une verification experimentale a ete faite dans le cas de neutrons de fission filtres par une epaisseur notable de graphite. 3) Enfin une methode de calcul permettant de determiner les sources de gamma de capture par la theorie de l'age est exposee et un exemple d'application donne dans une protection composite. (auteur)

  10. Methods and experimental coefficients used in the computation of reactor shielding; Methodes et coefficients experimentaux pour le calcul des protections de reacteurs

    Energy Technology Data Exchange (ETDEWEB)

    Bourgeois, J; Lafore, P; Millot, J P; Rastoin, J; Vathaire, F de [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1958-07-01

    1. The concept of an effective removal cross section has been developed in order more easily to compute reactor shielding thicknesses. We have built an experimental facility for the purpose of measuring effective removal cross sections, the value of which had not been published at that time. The first part of this paper describes the device or facility used, the computation method applied, and the results obtained. 2. Starting from this concept, we endeavored to define a removal cross section as a function of energy. This enabled us to use the method for computations bearing on the attenuation of fast neutrons of any spectrum. An experimental verification was carried out for the case of fission neutrons filtered by a substantial thickness of graphite. 3. Finally, we outline a computation method enabling us to determine the sources of captured gamma rays by the age theory and we give an example of the application in a composite shield. (author)Fren. [French] 1. La notion de section efficace effective de deplacement a ete introduite pour calculer commodement les epaisseurs de protection des reacteurs. Nous avons construit un dispositif experimental destine a mesurer les sections efficaces effectives de deplacement dont la valeur n'avait pas ete publiee a cette epoque. La premiere partie de cette communication decrit le dispositif utilise, la methode de calcul employee et les resultats obtenus. 2. A partir de cette notion, nous avons essaye de definir une section efficace de deplacement fonction de l'energie. Ceci permet d'utiliser la methode du deplacement pour des calculs d'attenuation de neutrons rapides dont le spectre est quelconque. Une verification experimentale a ete faite dans le cas de neutrons de fission filtres par une epaisseur notable de graphite. 3. Enfin une mde de calcul permettant de determiner les sources de gamma de capture par la theorie de l'age est exposee et un exemple d'application donne dans une protection composite. (auteur)

  11. Information-theoretic temporal Bell inequality and quantum computation

    International Nuclear Information System (INIS)

    Morikoshi, Fumiaki

    2006-01-01

    An information-theoretic temporal Bell inequality is formulated to contrast classical and quantum computations. Any classical algorithm satisfies the inequality, while quantum ones can violate it. Therefore, the violation of the inequality is an immediate consequence of the quantumness in the computation. Furthermore, this approach suggests a notion of temporal nonlocality in quantum computation

  12. Applying Human Computation Methods to Information Science

    Science.gov (United States)

    Harris, Christopher Glenn

    2013-01-01

    Human Computation methods such as crowdsourcing and games with a purpose (GWAP) have each recently drawn considerable attention for their ability to synergize the strengths of people and technology to accomplish tasks that are challenging for either to do well alone. Despite this increased attention, much of this transformation has been focused on…

  13. Advances in Computing and Information Technology : Proceedings of the Second International Conference on Advances in Computing and Information Technology

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2013-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  14. Computing, Information, and Communications Technology (CICT) Program Overview

    Science.gov (United States)

    VanDalsem, William R.

    2003-01-01

    The Computing, Information and Communications Technology (CICT) Program's goal is to enable NASA's Scientific Research, Space Exploration, and Aerospace Technology Missions with greater mission assurance, for less cost, with increased science return through the development and use of advanced computing, information and communication technologies

  15. Entrepreneurial Health Informatics for Computer Science and Information Systems Students

    Science.gov (United States)

    Lawler, James; Joseph, Anthony; Narula, Stuti

    2014-01-01

    Corporate entrepreneurship is a critical area of curricula for computer science and information systems students. Few institutions of computer science and information systems have entrepreneurship in the curricula however. This paper presents entrepreneurial health informatics as a course in a concentration of Technology Entrepreneurship at a…

  16. For Information: 2004 CERN School of Computing

    CERN Multimedia

    IT Department

    2004-01-01

    29 August to 11 September 2004, Hotel Oriente, Vico Equense (Naples), Italy.  Organised by CERN in collaboration with the Institute of Composite and Biomedical Materials, National Research Council, Naples, Italy New this year: Grants from the European Union available to participants to cover part or all of the cost of the School. Programme highlights: GRID Technologies delivers unique theoretical and hands-on education on some of the most advanced GRID topics Software Technologies addresses the most relevant modern techniques and tools for large scale, distributed software development Physics Computing focuses on the particular challenges the HEP community is facing for the LHC computing Application now open - for details, see www.cern.ch/CSC">http://www.cern.ch/CSC>www.cern.ch/CSC

  17. Detailed Information Security in Cloud Computing

    OpenAIRE

    Pavel Valerievich Ivonin

    2013-01-01

    The object of research in this article is technology of public clouds, structure and security system of clouds. Problems of information security in clouds are considered, elements of security system in public clouds are described.

  18. Infinite slab-shield dose calculations

    International Nuclear Information System (INIS)

    Russell, G.J.

    1989-01-01

    I calculated neutron and gamma-ray equivalent doses leaking through a variety of infinite (laminate) slab-shields. In the shield computations, I used, as the incident neutron spectrum, the leakage spectrum (<20 MeV) calculated for the LANSCE tungsten production target at 90 degree to the target axis. The shield thickness was fixed at 60 cm. The results of the shield calculations show a minimum in the total leakage equivalent dose if the shield is 40-45 cm of iron followed by 20-15 cm of borated (5% B) polyethylene. High-performance shields can be attained by using multiple laminations. The calculated dose at the shield surface is very dependent on shield material. 4 refs., 4 figs., 1 tab

  19. Geographical information systems and computer cartography

    CERN Document Server

    Jones, Chris B

    2014-01-01

    A concise text presenting the fundamental concepts in Geographical Information Systems (GIS), emphasising an understanding of techniques in management, analysis and graphic display of spatial information. Divided into five parts - the first part reviews the development and application of GIS, followed by a summary of the characteristics and representation of geographical information. It concludes with an overview of the functions provided by typical GIS systems. Part Two introduces co-ordinate systems and map projections, describes methods for digitising map data and gives an overview of remote sensing. Part Three deals with data storage and database management, as well as specialised techniques for accessing spatial data. Spatial modelling and analytical techniques for decision making form the subject of Part Four, while the final part is concerned with graphical representation, emphasising issues of graphics technology, cartographic design and map generalisation.

  20. Quantum information and computation for chemistry

    CERN Document Server

    Kais, Sabre; Rice, Stuart A

    2014-01-01

    Examines the intersection of quantum information and chemical physics The Advances in Chemical Physics series is dedicated to reviewing new and emerging topics as well as the latest developments in traditional areas of study in the field of chemical physics. Each volume features detailed comprehensive analyses coupled with individual points of view that integrate the many disciplines of science that are needed for a full understanding of chemical physics. This volume of the series explores the latest research findings, applications, and new research paths from the quantum information science

  1. Radiation shielding

    International Nuclear Information System (INIS)

    Yue, D.D.

    1979-01-01

    Details are given of a cylindrical electric penetration assembly for carrying instrumentation leads, used in monitoring the performance of a nuclear reactor, through the containment wall of the reactor. Effective yet economical shielding protection against both fast neutron and high-energy gamma radiation is provided. Adequate spacing within the assembly allows excessive heat to be efficiently dissipated and means of monitoring all potential radiation and gas leakage paths are provided. (UK)

  2. Shielded container

    International Nuclear Information System (INIS)

    Fries, B.A.

    1978-01-01

    A shielded container for transportation of radioactive materials is disclosed in which leakage from the container is minimized due to constructional features including, inter alia, forming the container of a series of telescoping members having sliding fits between adjacent side walls and having at least two of the members including machine sealed lids and at least two of the elements including hand-tightenable caps

  3. Quantum Computers: A New Paradigm in Information Technology

    Directory of Open Access Journals (Sweden)

    Mahesh S. Raisinghani

    2001-01-01

    Full Text Available The word 'quantum' comes from the Latin word quantus meaning 'how much'. Quantum computing is a fundamentally new mode of information processing that can be performed only by harnessing physical phenomena unique to quantum mechanics (especially quantum interference. Paul Benioff of the Argonne National Laboratory first applied quantum theory to computers in 1981 and David Deutsch of Oxford proposed quantum parallel computers in 1985, years before the realization of qubits in 1995. However, it may be well into the 21st century before we see quantum computing used at a commercial level for a variety of reasons discussed in this paper. The subject of quantum computing brings together ideas from classical information theory, computer science, and quantum physics. This paper discusses some of the current advances, applications, and chal-lenges of quantum computing as well as its impact on corporate computing and implications for management. It shows how quantum computing can be utilized to process and store information, as well as impact cryptography for perfectly secure communication, algorithmic searching, factorizing large numbers very rapidly, and simulating quantum-mechanical systems efficiently. A broad interdisciplinary effort will be needed if quantum com-puters are to fulfill their destiny as the world's fastest computing devices.

  4. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  5. FY 1999 Blue Book: Computing, Information, and Communications: Networked Computing for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — U.S.research and development R and D in computing, communications, and information technologies has enabled unprecedented scientific and engineering advances,...

  6. 11th International Conference on Computer and Information Science

    CERN Document Server

    Computer and Information 2012

    2012-01-01

    The series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence – quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Critical to both contributors and readers are the short publication time and world-wide distribution - this permits a rapid and broad dissemination of research results.   The purpose of the 11th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2012...

  7. Speed up of MCACE, a Monte Carlo code for evaluation of shielding safety, by parallel computer, (3)

    International Nuclear Information System (INIS)

    Takano, Makoto; Masukawa, Fumihiro; Naito, Yoshitaka; Onodera, Emi; Imawaka, Tsuneyuki; Yoda, Yoshihisa.

    1993-07-01

    The parallel computing of the MCACE code has been studied on two platforms; 1) Shared Memory Type Vector-Parallel Computer Monte-4 and 2) Networked Several Workstations. On the Monte-4, a disk-file has been allocated to collect all results computed by 4 CPUs in parallel, executing the copy of the MCACE code on each CPU. On the workstations under network environment, two parallel models have been evaluated; 1) a host-node model and 2) the model used on the Monte-4 where no software for parallelization has been employed but only standard FORTRAN language. The measurement of computing times has showed that speed up of about 3 times has been achieved by using 4 CPUs of the Monte-4. Further, connecting 4 workstations by network, the computing speed by parallelization has achieved faster than our scalar main frame computer, FACOM M-780. (author)

  8. CICT Computing, Information, and Communications Technology Program

    Science.gov (United States)

    Laufenberg, Lawrence; Tu, Eugene (Technical Monitor)

    2002-01-01

    The CICT Program is part of the NASA Aerospace Technology Enterprise's fundamental technology thrust to develop tools. processes, and technologies that enable new aerospace system capabilities and missions. The CICT Program's four key objectives are: Provide seamless access to NASA resources- including ground-, air-, and space-based distributed information technology resources-so that NASA scientists and engineers can more easily control missions, make new scientific discoveries, and design the next-generation space vehicles, provide high-data delivery from these assets directly to users for missions, develop goal-oriented human-centered systems, and research, develop and evaluate revolutionary technology.

  9. International Conference on Computer Science and Information Technologies

    CERN Document Server

    2017-01-01

    The book reports on new theories and applications in the field of intelligent systems and computing. It covers computational and artificial intelligence methods, as well as advances in computer vision, current issue in big data and cloud computing, computation linguistics, cyber-physical systems as well as topics in intelligent information management. Written by active researchers, the different chapters are based on contributions presented at the workshop in intelligent systems and computing (ISC), held during CSIT 2016, September 6-9, and jointly organized by the Lviv Polytechnic National University, Ukraine, the Kharkiv National University of RadioElectronics, Ukraine, and the Technical University of Lodz, Poland, under patronage of Ministry of Education and Science of Ukraine. All in all, the book provides academics and professionals with extensive information and a timely snapshot of the field of intelligent systems, and it is expected to foster new discussions and collaborations among different groups. ...

  10. Towards Information Security Metrics Framework for Cloud Computing

    OpenAIRE

    Muhammad Imran Tariq

    2012-01-01

    Cloud computing has recently emerged as new computing paradigm which basically aims to provide customized, reliable, dynamic services over the internet.  Cost and security are influential issues to deploy cloud computing in large enterprise.  Privacy and security are very important issues in terms of user trust and legal compliance. Information Security (IS) metrics are best tool used to measure the efficiency, performance, effectiveness and impact of the security constraints. It is very hard...

  11. Quantum Computers: A New Paradigm in Information Technology

    OpenAIRE

    Mahesh S. Raisinghani

    2001-01-01

    The word 'quantum' comes from the Latin word quantus meaning 'how much'. Quantum computing is a fundamentally new mode of information processing that can be performed only by harnessing physical phenomena unique to quantum mechanics (especially quantum interference). Paul Benioff of the Argonne National Laboratory first applied quantum theory to computers in 1981 and David Deutsch of Oxford proposed quantum parallel computers in 1985, years before the realization of qubits in 1995. However, i...

  12. Availability and Use of Telecommunication/Computer Information ...

    African Journals Online (AJOL)

    buz_centr_03

    the study area, identify Information and Communication Technologies (ICTs) in telecommunication/computer .... recommended that extension should forge new links and create network for sharing knowledge and experience .... Food Security.

  13. Identification of risk factors of computer information technologies in education

    Directory of Open Access Journals (Sweden)

    Hrebniak M.P.

    2014-03-01

    Full Text Available The basic direction of development of secondary school and vocational training is computer training of schoolchildren and students, including distance forms of education and widespread usage of world information systems. The purpose of the work is to determine risk factors for schoolchildren and students, when using modern information and computer technologies. Results of researches allowed to establish dynamics of formation of skills using computer information technologies in education and characteristics of mental ability among schoolchildren and students during training in high school. Common risk factors, while operating CIT, are: intensification and formalization of intellectual activity, adverse ergonomic parameters, unfavorable working posture, excess of hygiene standards by chemical and physical characteristics. The priority preventive directions in applying computer information technology in education are: improvement of optimal visual parameters of activity, rationalization of ergonomic parameters, minimizing of adverse effects of chemical and physical conditions, rationalization of work and rest activity.

  14. Information visualization courses for students with a computer science background.

    Science.gov (United States)

    Kerren, Andreas

    2013-01-01

    Linnaeus University offers two master's courses in information visualization for computer science students with programming experience. This article briefly describes the syllabi, exercises, and practices developed for these courses.

  15. Information Security in the Age of Cloud Computing

    Science.gov (United States)

    Sims, J. Eric

    2012-01-01

    Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…

  16. Selective Bibliography on the History of Computing and Information Processing.

    Science.gov (United States)

    Aspray, William

    1982-01-01

    Lists some of the better-known and more accessible books on the history of computing and information processing, covering: (1) popular general works; (2) more technical general works; (3) microelectronics and computing; (4) artificial intelligence and robotics; (5) works relating to Charles Babbage; (6) other biographical and personal accounts;…

  17. Nuclear data for radiation shielding

    International Nuclear Information System (INIS)

    Miyasaka, Shunichi; Takahashi, Hiroshi.

    1976-01-01

    The third shielding expert conference was convened in Paris in Oct. 1975 for exchanging informations about the sensitivity evaluation of nuclear data in shielding calculation and integral bench mark experiment. The requirements about nuclear data presented at present from the field of nuclear design do not reflect sufficiently the requirements of shielding design, therefore it was the object to gather the requirements about nuclear data from the field of shielding. The nuclides used for shielding are numerous, and the nuclear data on these isotopes are required. Some of them cannot be ignored as the source of secondary γ-ray or in view of the radioactivation of materials. The requirements for the nuclear data of neutrons in the field of shielding are those concerning the reaction cross sections producing secondary γ-ray, the reaction cross sections including the production of secondary neutrons, elastic scattering cross sections, and total cross sections. The topics in the Paris conference about neutron shielding data are described, such as the methodology of sensitivity evaluation, the standardization of group constant libraries, the bench mark experiment on iron and sodium, and the cross section of γ-ray production. In the shielding of nuclear fission reactors, the γ-ray production owing to nuclear fission reaction is also important. In (d, t) fusion reactors, high energy neutrons are generated, and high energy γ-ray is emitted through giant E1 resonance. (Kako, I.)

  18. Information center as a technical institute unifying a user community

    International Nuclear Information System (INIS)

    Maskewitz, B.F.; McGill, B.; Hatmaker, N.A.

    1976-01-01

    The historical background to the information analysis center concept is presented first. The Radiation Shielding Information Center (RSIC) at ORNL is cited as an example of the information analysis center. RSIC objectives and scope are described, and RSIC's role in unification of the field of shielding is discussed. Some problems in handling information exchange with respect to computer codes are examined

  19. Contribution to the algorithmic and efficient programming of new parallel architectures including accelerators for neutron physics and shielding computations

    International Nuclear Information System (INIS)

    Dubois, J.

    2011-01-01

    In science, simulation is a key process for research or validation. Modern computer technology allows faster numerical experiments, which are cheaper than real models. In the field of neutron simulation, the calculation of eigenvalues is one of the key challenges. The complexity of these problems is such that a lot of computing power may be necessary. The work of this thesis is first the evaluation of new computing hardware such as graphics card or massively multi-core chips, and their application to eigenvalue problems for neutron simulation. Then, in order to address the massive parallelism of supercomputers national, we also study the use of asynchronous hybrid methods for solving eigenvalue problems with this very high level of parallelism. Then we experiment the work of this research on several national supercomputers such as the Titane hybrid machine of the Computing Center, Research and Technology (CCRT), the Curie machine of the Very Large Computing Centre (TGCC), currently being installed, and the Hopper machine at the Lawrence Berkeley National Laboratory (LBNL). We also do our experiments on local workstations to illustrate the interest of this research in an everyday use with local computing resources. (author) [fr

  20. The 9th international conference on computing and information technology

    CERN Document Server

    Unger, Herwig; Boonkrong, Sirapat; IC2IT2013

    2013-01-01

    This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.  

  1. Innovations and Advances in Computer, Information, Systems Sciences, and Engineering

    CERN Document Server

    Sobh, Tarek

    2013-01-01

    Innovations and Advances in Computer, Information, Systems Sciences, and Engineering includes the proceedings of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2011). The contents of this book are a set of rigorously reviewed, world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of  Industrial Electronics, Technology and Automation, Telecommunications and Networking, Systems, Computing Sciences and Software Engineering, Engineering Education, Instructional Technology, Assessment, and E-learning.

  2. Dosimetry and shielding

    International Nuclear Information System (INIS)

    Farinelli, U.

    1977-01-01

    Today, reactor dosimetry and shielding have wide areas of overlap as concerns both problems and methods. Increased interchange of results and know-how would benefit both. The areas of common interest include calculational methods, sensitivity studies, theoretical and experimental benchmarks, cross sections and other nuclear data, multigroup libraries and procedures for their adjustment, experimental techniques and damage functions. This paper reviews the state-of-the-art and the latest development in each of these areas as far as shielding is concerned, and suggests a number of interactions that could be profitable for reactor dosimetry. Among them, re-evaluation of the potentialities of calculational methods (in view of the recent developments) in predicting radiation environments of interest; the application of sensitivity analysis to dosimetry problems; a common effort in the field of theoretical benchmarks; the use of the shielding one-material propagation experiments as reference spectra for detector cross sections; common standardization of the detector nuclear data used in both fields; the setting up of a common (or compatible) multigroup structure and library applicable to shielding, dosimetry and core physics; the exchange of information and experience in the fields of cross section errors, correlations and adjustment; and the intercomparison of experimental techniques

  3. A DDC Bibliography on Computers in Information Sciences. Volume II. Information Sciences Series.

    Science.gov (United States)

    Defense Documentation Center, Alexandria, VA.

    The unclassified and unlimited bibliography compiles references dealing specifically with the role of computers in information sciences. The volume contains 239 annotated references grouped under three major headings: Artificial and Programming Languages, Computer Processing of Analog Data, and Computer Processing of Digital Data. The references…

  4. 4th International Conference on Applied Computing and Information Technology

    CERN Document Server

    2017-01-01

    This edited book presents scientific results of the 4th International Conference on Applied Computing and Information Technology (ACIT 2016) which was held on December 12–14, 2016 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. The aim of this conference was also to bring out the research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the Program Committee, and underwent further rigorous rounds of review. Th...

  5. 30th International Symposium on Computer and Information Sciences

    CERN Document Server

    Gelenbe, Erol; Gorbil, Gokce; Lent, Ricardo

    2016-01-01

    The 30th Anniversary of the ISCIS (International Symposium on Computer and Information Sciences) series of conferences, started by Professor Erol Gelenbe at Bilkent University, Turkey, in 1986, will be held at Imperial College London on September 22-24, 2015. The preceding two ISCIS conferences were held in Krakow, Poland in 2014, and in Paris, France, in 2013.   The Proceedings of ISCIS 2015 published by Springer brings together rigorously reviewed contributions from leading international experts. It explores new areas of research and technological development in computer science, computer engineering, and information technology, and presents new applications in fast changing fields such as information science, computer science and bioinformatics.   The topics covered include (but are not limited to) advances in networking technologies, software defined networks, distributed systems and the cloud, security in the Internet of Things, sensor systems, and machine learning and large data sets.

  6. Radiation shielding material

    International Nuclear Information System (INIS)

    Kawakubo, Takamasa; Yamada, Fumiyuki; Nakazato, Kenjiro.

    1976-01-01

    Purpose: To provide a material, which is used for printing a samples name and date on an X-ray photographic film at the same time an X-ray radiography. Constitution: A radiation shielding material of a large mass absorption coefficient such as lead oxide, barium oxide, barium sulfate, etc. is added to a solution of a radiation permeable substance capable of imparting cold plastic fluidity (such as microcrystalline wax, paraffin, low molecular polyethylene, polyvinyl chloride, etc.). The resultant system is agitated and then cooled, and thereafter it is press fitted to or bonded to a base in the form of a film of a predetermined thickness. This radiation shielding layer is scraped off by using a writing tool to enter information to be printed in a photographic film, and then it is laid over the film and exposed to X-radiation to thereby print the information on the film. (Seki, T.)

  7. Splash, pop, sizzle: Information processing with phononic computing

    Directory of Open Access Journals (Sweden)

    Sophia R. Sklan

    2015-05-01

    Full Text Available Phonons, the quanta of mechanical vibration, are important to the transport of heat and sound in solid materials. Recent advances in the fundamental control of phonons (phononics have brought into prominence the potential role of phonons in information processing. In this review, the many directions of realizing phononic computing and information processing are examined. Given the relative similarity of vibrational transport at different length scales, the related fields of acoustic, phononic, and thermal information processing are all included, as are quantum and classical computer implementations. Connections are made between the fundamental questions in phonon transport and phononic control and the device level approach to diodes, transistors, memory, and logic.

  8. AGIS: Evolution of Distributed Computing information system for ATLAS

    Science.gov (United States)

    Anisenkov, A.; Di Girolamo, A.; Alandes, M.; Karavakis, E.

    2015-12-01

    ATLAS, a particle physics experiment at the Large Hadron Collider at CERN, produces petabytes of data annually through simulation production and tens of petabytes of data per year from the detector itself. The ATLAS computing model embraces the Grid paradigm and a high degree of decentralization of computing resources in order to meet the ATLAS requirements of petabytes scale data operations. It has been evolved after the first period of LHC data taking (Run-1) in order to cope with new challenges of the upcoming Run- 2. In this paper we describe the evolution and recent developments of the ATLAS Grid Information System (AGIS), developed in order to integrate configuration and status information about resources, services and topology of the computing infrastructure used by the ATLAS Distributed Computing applications and services.

  9. 1st International Conference on Internet Computing and Information Communications

    CERN Document Server

    Awasthi, Lalit; Masillamani, M; Sridhar, S

    2014-01-01

    The book presents high quality research papers presented by experts in the International Conference on Internet Computing and Information Communications 2012, organized by ICICIC Global organizing committee (on behalf of The CARD Atlanta, Georgia, CREATE Conferences Inc). The objective of this book is to present the latest work done in the field of Internet computing by researchers and industrial professionals across the globe. A step to reduce the research divide between developed and under developed countries.

  10. Green Computing in Local Governments and Information Technology Companies

    Directory of Open Access Journals (Sweden)

    Badar Agung Nugroho

    2013-06-01

    Full Text Available Green computing is a study and practice of designing, manufacturing, using, and disposing of information and communication devices efficiently and effectively with minimum impact on the environment. If the green computing concept was implemented, it will help the agencies or companies to reduce energy and capital cost from their IT infrastructure. The goal from this research is to explore the current condition about the efforts from local governments and IT companies at West Java to implement the green computing concept at their working environment. The primary data were collected by using focus group discussion by inviting the local governments and IT companies representatives who responsible to manage their IT infrastructure. And then, the secondary data were collected by doing brief observation in order to see the real effort of green computing implementation at each institution. The result shows that there are many different perspectives and efforts of green computing implementation between local governments and IT companies.

  11. Muon shielding for PEP

    International Nuclear Information System (INIS)

    Jenkins, T.M.; Thomas, R.H.

    1974-01-01

    The first stage of construction of PEP will consist of electron and positron storage rings. At a later date a 200 GeV proton storage ring may be added. It is judicious therefore, to ensure that the first and second phases of construction are compatible with each other. One of several factors determining the elevation at which the storage rings will be constructed is the necessity to provide adequate radiation shielding. The overhead shielding of PEP is determined by the reproduction of neutrons in the hadron cascade generated by primary protons lost from the storage ring. The minimum overburden planned for PEP is 5.5 meters of earth (1100 gm cm/sup /minus/2/). To obtain a rough estimate of the magnitude of the muon radiation problem this note presents some preliminary calculations. Their purpose is intended merely to show that the presently proposed design for PEP will present no major shielding problems should the protons storage ring be installed. More detailed calculations will be made using muon yield computer codes developed at CERN and NAL and muon transport codes developed at SLAC, when details of the proton storage ring become settled. 9 refs., 4 figs

  12. Fault-tolerant search algorithms reliable computation with unreliable information

    CERN Document Server

    Cicalese, Ferdinando

    2013-01-01

    Why a book on fault-tolerant search algorithms? Searching is one of the fundamental problems in computer science. Time and again algorithmic and combinatorial issues originally studied in the context of search find application in the most diverse areas of computer science and discrete mathematics. On the other hand, fault-tolerance is a necessary ingredient of computing. Due to their inherent complexity, information systems are naturally prone to errors, which may appear at any level - as imprecisions in the data, bugs in the software, or transient or permanent hardware failures. This book pr

  13. URR [Unresolved Resonance Region] computer code: A code to calculate resonance neutron cross-section probability tables, Bondarenko self-shielding factors, and self-indication ratios for fissile and fertile nuclides

    International Nuclear Information System (INIS)

    Leal, L.C.; de Saussure, G.; Perez, R.B.

    1989-01-01

    The URR computer code has been developed to calculate cross-section probability tables, Bondarenko self-shielding factors, and self- indication ratios for fertile and fissile isotopes in the unresolved resonance region. Monte Carlo methods are utilized to select appropriate resonance parameters and to compute the cross sections at the desired reference energy. The neutron cross sections are calculated by the single-level Breit-Wigner formalism with s-, p-, and d-wave contributions. The cross-section probability tables are constructed by sampling the Doppler broadened cross-section. The various shelf-shielded factors are computed numerically as Lebesgue integrals over the cross-section probability tables. 6 refs

  14. Human-computer interaction and management information systems

    CERN Document Server

    Galletta, Dennis F

    2014-01-01

    ""Human-Computer Interaction and Management Information Systems: Applications"" offers state-of-the-art research by a distinguished set of authors who span the MIS and HCI fields. The original chapters provide authoritative commentaries and in-depth descriptions of research programs that will guide 21st century scholars, graduate students, and industry professionals. Human-Computer Interaction (or Human Factors) in MIS is concerned with the ways humans interact with information, technologies, and tasks, especially in business, managerial, organizational, and cultural contexts. It is distinctiv

  15. Computational information geometry for image and signal processing

    CERN Document Server

    Critchley, Frank; Dodson, Christopher

    2017-01-01

    This book focuses on the application and development of information geometric methods in the analysis, classification and retrieval of images and signals. It provides introductory chapters to help those new to information geometry and applies the theory to several applications. This area has developed rapidly over recent years, propelled by the major theoretical developments in information geometry, efficient data and image acquisition and the desire to process and interpret large databases of digital information. The book addresses both the transfer of methodology to practitioners involved in database analysis and in its efficient computational implementation.

  16. INFORMATION DISPLAY: CONSIDERATIONS FOR DESIGNING COMPUTER-BASED DISPLAY SYSTEMS

    International Nuclear Information System (INIS)

    O'HARA, J.M.; PIRUS, D.; BELTRATCCHI, L.

    2004-01-01

    This paper discussed the presentation of information in computer-based control rooms. Issues associated with the typical displays currently in use are discussed. It is concluded that these displays should be augmented with new displays designed to better meet the information needs of plant personnel and to minimize the need for interface management tasks (the activities personnel have to do to access and organize the information they need). Several approaches to information design are discussed, specifically addressing: (1) monitoring, detection, and situation assessment; (2) routine task performance; and (3) teamwork, crew coordination, collaborative work

  17. Shield verification and validation action matrix summary

    International Nuclear Information System (INIS)

    Boman, C.

    1992-02-01

    WSRC-RP-90-26, Certification Plan for Reactor Analysis Computer Codes, describes a series of action items to be completed for certification of reactor analysis computer codes used in Technical Specifications development and for other safety and production support calculations. Validation and verification are integral part of the certification process. This document identifies the work performed and documentation generated to satisfy these action items for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system, it is not certification of the complete SHIELD system. Complete certification will follow at a later date. Each action item is discussed with the justification for its completion. Specific details of the work performed are not included in this document but can be found in the references. The validation and verification effort for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system computer code is completed

  18. Computing, information, and communications: Technologies for the 21. Century

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    To meet the challenges of a radically new and technologically demanding century, the Federal Computing, Information, and Communications (CIC) programs are investing in long-term research and development (R and D) to advance computing, information, and communications in the United States. CIC R and D programs help Federal departments and agencies to fulfill their evolving missions, assure the long-term national security, better understand and manage the physical environment, improve health care, help improve the teaching of children, provide tools for lifelong training and distance learning to the workforce, and sustain critical US economic competitiveness. One of the nine committees of the National Science and Technology Council (NSTC), the Committee on Computing, Information, and Communications (CCIC)--through its CIC R and D Subcommittee--coordinates R and D programs conducted by twelve Federal departments and agencies in cooperation with US academia and industry. These R and D programs are organized into five Program Component Areas: (1) HECC--High End Computing and Computation; (2) LSN--Large Scale Networking, including the Next Generation Internet Initiative; (3) HCS--High Confidence Systems; (4) HuCS--Human Centered Systems; and (5) ETHR--Education, Training, and Human Resources. A brief synopsis of FY 1997 accomplishments and FY 1998 goals by PCA is presented. This report, which supplements the President`s Fiscal Year 1998 Budget, describes the interagency CIC programs.

  19. About the Scythian Shields

    Directory of Open Access Journals (Sweden)

    About the Scythian Shields

    2017-10-01

    Full Text Available Shields played major role in the armament system of the Scythians. Made from organic materials, they are poorly traced on the materials of archaeological excavations. Besides, scaly surface of shields was often perceived in practice as the remnants of the scaly armor. E. V. Chernenko was able to discern the difference between shields’ scaly plates and armor scales. The top edge of the scales was bent inwards, and shield plates had a wire fixation. These observations let significantly increase the number of shields, found in the burial complexes of the Scythians. The comparison of archaeological materials and the images of Scythian warriors allow distinguishing the main forms of Scythian shields. All shields are divided into fencing shields and cover shields. The fencing shields include round wooden shields, reinforced with bronze sheet, and round moon-shaped shields with a notch at the top, with a metal scaly surface. They came to the Scythians under the Greek influence and are known in the monuments of the 4th century BC. Oval shields with scaly surface (back cover shields were used by the Scythian cavalry. They protected the rider in case of frontal attack, and moved back in case of maneuver or closein fighting. Scythian battle tactics were based on rapid approaching the enemy and throwing spears and further rapid withdrawal. Spears stuck in the shields of enemies, forcing them to drop the shields, uncover, and in this stage of the battle the archers attacked the disorganized ranks of the enemy. That was followed by the stage of close fight. Oval form of a wooden shield with leather covering was used by the Scythian infantry and spearmen. Rectangular shields, including wooden shields and the shields pleached from rods, represented a special category. The top of such shield was made of wood, and a pleached pad on leather basis was attached to it. This shield could be a reliable protection from arrows, but it could not protect against javelins

  20. "Glitch Logic" and Applications to Computing and Information Security

    Science.gov (United States)

    Stoica, Adrian; Katkoori, Srinivas

    2009-01-01

    This paper introduces a new method of information processing in digital systems, and discusses its potential benefits to computing and information security. The new method exploits glitches caused by delays in logic circuits for carrying and processing information. Glitch processing is hidden to conventional logic analyses and undetectable by traditional reverse engineering techniques. It enables the creation of new logic design methods that allow for an additional controllable "glitch logic" processing layer embedded into a conventional synchronous digital circuits as a hidden/covert information flow channel. The combination of synchronous logic with specific glitch logic design acting as an additional computing channel reduces the number of equivalent logic designs resulting from synthesis, thus implicitly reducing the possibility of modification and/or tampering with the design. The hidden information channel produced by the glitch logic can be used: 1) for covert computing/communication, 2) to prevent reverse engineering, tampering, and alteration of design, and 3) to act as a channel for information infiltration/exfiltration and propagation of viruses/spyware/Trojan horses.

  1. 10th International Conference on Computing and Information Technology

    CERN Document Server

    Unger, Herwig; Meesad, Phayung

    2014-01-01

    Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to improve technology and its adoption to modern applications. The up-to-date research and technologies must be distributed to researchers and CIT community continuously to aid future development. The 10th International Conference on Computing and Information Technology (IC 2 IT2014) organized by King Mongkut's University of Technology North Bangkok (KMUTNB) and partners provides an exchange of the state of the art and future developments in the two key areas of this process: Computer Networking and Data Mining. Behind the background of the foundation of ASEAN, it becomes clear that efficient languages, business principles and communication methods need to be adapted, unified and especially optimized to gain a maximum benefit to the users and customers of future IT systems.

  2. 13thInternational Conference on Computer and Information Science

    CERN Document Server

    Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2012

    2013-01-01

    The purpose of the 13th  International Conference on Computer and Information Science (SNPD 2012) held on August 8-10, 2012 in Kyoto, Japan was to bring together researchers and scientists, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way.  Our conference officers selected the best 17 papers from those papers accepted for presentation at the conference in order to publish them in this volume.  The papers were chosen based on review scores submitted by members of the program committee, and underwent further rounds of rigorous review.   The  conference organizers selected 17 outstanding papers from SNPD 2012, all of which you will find in this volume of Springer’s Studies in Computational Intelligence.

  3. A Survey of Current Computer Information Science (CIS) Students.

    Science.gov (United States)

    Los Rios Community Coll. District, Sacramento, CA. Office of Institutional Research.

    This document is a survey designed to be completed by current students of Computer Information Science (CIS) in the Los Rios Community College District (LRCCD), which consists of three community colleges: American River College, Cosumnes River College, and Sacramento City College. The students are asked about their educational goals and how…

  4. Informational-computer system for the neutron spectra analysis

    International Nuclear Information System (INIS)

    Berzonis, M.A.; Bondars, H.Ya.; Lapenas, A.A.

    1979-01-01

    In this article basic principles of the build-up of the informational-computer system for the neutron spectra analysis on a basis of measured reaction rates are given. The basic data files of the system, needed software and hardware for the system operation are described

  5. Design of the Information Science and Systems (IS Curriculum in a Computer and Information Sciences Department

    Directory of Open Access Journals (Sweden)

    Behrooz Seyed-Abbassi

    2004-12-01

    Full Text Available Continuous technological changes have resulted in a rapid turnover of knowledge in the computing field. The impact of these changes directly affects the computer-related curriculum offered by educational institutions and dictates that curriculum must evolve to keep pace with technology and to provide students with the skills required by businesses. At the same time, accreditations of curricula from reviewing organizations provide additional guidelines and standardization for computing science as well as information science programs. One of the areas significantly affected by these changes is the field of information systems. This paper describes the evaluation and course structure for the undergraduate information science and systems program in the Computer and Information Sciences Department at the University of North Florida. A list of the major required and elective courses as well as an overview of the challenges encountered during the revision of the curriculum is given.

  6. Radiation dose reduction by water shield

    International Nuclear Information System (INIS)

    Zeb, J.; Arshed, W.; Ahmad, S.S.

    2007-06-01

    This report is an operational manual of shielding software W-Shielder, developed at Health Physics Division (HPD), Pakistan Institute of Nuclear Science and Technology (PINSTECH), Pakistan Atomic Energy Commission. The software estimates shielding thickness for photons having their energy in the range 0.5 to 10 MeV. To compute the shield thickness, self absorption in the source has been neglected and the source has been assumed as a point source. Water is used as a shielding material in this software. The software is helpful in estimating the water thickness for safe handling, storage of gamma emitting radionuclide. (author)

  7. A DDC Bibliography on Computers in Information Sciences. Volume I. Information Sciences Series.

    Science.gov (United States)

    Defense Documentation Center, Alexandria, VA.

    The unclassified and unlimited bibliography compiles references dealing specifically with the role of computers in information sciences. The volume contains 249 annotated references grouped under two major headings: Time Shared, On-Line, and Real Time Systems, and Computer Components. The references are arranged in accesion number (AD-number)…

  8. Computer-based information management system for interventional radiology

    International Nuclear Information System (INIS)

    Forman, B.H.; Silverman, S.G.; Mueller, P.R.; Hahn, P.F.; Papanicolaou, N.; Tung, G.A.; Brink, J.A.; Ferrucci, J.T.

    1989-01-01

    The authors authored and implemented a computer-based information management system (CBIMS) for the integrated analysis of data from a variety of abdominal nonvascular interventional procedures. The CBIMS improved on their initial handwritten-card system (which listed only patient name, hospital number, and type of procedure) by capturing relevant patient data in an organized fashion and integrating information for meaningful analysis. Advantages of CBIMS include enhanced compilation of monthly census, easy access to a patient's interventional history, and flexible querying capability that allows easy extraction of subsets of information from the patient database

  9. Radiation shielding device

    International Nuclear Information System (INIS)

    Nakagawa, Takahiro; Yamagami, Makoto.

    1996-01-01

    A fixed shielding member made of a radiation shielding material is constituted in perpendicular to an opening formed on radiation shielding walls. The fixed shielding member has one side opened and has other side, the upper portion and the lower portion disposed in close contact with the radiation shielding walls. Movable shielding members made of a radiation shielding material are each disposed openably on both side of the fixed shielding member. The movable shielding member has a shaft as a fulcrum on one side thereof for connecting it to the radiation shielding walls. The other side has a handle attached for opening/closing the movable shielding member. Upon access of an operator, when each one of the movable shielding members is opened/closed on every time, leakage of linear or scattered radiation can be prevented. Even when both of the movable shielding members are opened simultaneously, the fixed shielding member and the movable shielding members form labyrinth to prevent leakage of linear radioactivity. (I.N.)

  10. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  11. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  12. A simplified computational memory model from information processing

    Science.gov (United States)

    Zhang, Lanhua; Zhang, Dongsheng; Deng, Yuqin; Ding, Xiaoqian; Wang, Yan; Tang, Yiyuan; Sun, Baoliang

    2016-01-01

    This paper is intended to propose a computational model for memory from the view of information processing. The model, called simplified memory information retrieval network (SMIRN), is a bi-modular hierarchical functional memory network by abstracting memory function and simulating memory information processing. At first meta-memory is defined to express the neuron or brain cortices based on the biology and graph theories, and we develop an intra-modular network with the modeling algorithm by mapping the node and edge, and then the bi-modular network is delineated with intra-modular and inter-modular. At last a polynomial retrieval algorithm is introduced. In this paper we simulate the memory phenomena and functions of memorization and strengthening by information processing algorithms. The theoretical analysis and the simulation results show that the model is in accordance with the memory phenomena from information processing view. PMID:27876847

  13. A simplified computational memory model from information processing.

    Science.gov (United States)

    Zhang, Lanhua; Zhang, Dongsheng; Deng, Yuqin; Ding, Xiaoqian; Wang, Yan; Tang, Yiyuan; Sun, Baoliang

    2016-11-23

    This paper is intended to propose a computational model for memory from the view of information processing. The model, called simplified memory information retrieval network (SMIRN), is a bi-modular hierarchical functional memory network by abstracting memory function and simulating memory information processing. At first meta-memory is defined to express the neuron or brain cortices based on the biology and graph theories, and we develop an intra-modular network with the modeling algorithm by mapping the node and edge, and then the bi-modular network is delineated with intra-modular and inter-modular. At last a polynomial retrieval algorithm is introduced. In this paper we simulate the memory phenomena and functions of memorization and strengthening by information processing algorithms. The theoretical analysis and the simulation results show that the model is in accordance with the memory phenomena from information processing view.

  14. CAISSE (Computer Aided Information System on Solar Energy) technical manual

    Energy Technology Data Exchange (ETDEWEB)

    Cantelon, P E; Beinhauer, F W

    1979-01-01

    The Computer Aided Information System on Solar Energy (CAISSE) was developed to provide the general public with information on solar energy and its potential uses and costs for domestic consumption. CAISSE is an interactive computing system which illustrates solar heating concepts through the use of 35 mm slides, text displays on a screen and a printed report. The user communicates with the computer by responding to questions about his home and heating requirements through a touch sensitive screen. The CAISSE system contains a solar heating simulation model which calculates the heating load capable of being supplied by a solar heating system and uses this information to illustrate installation costs, fuel savings and a 20 year life-cycle analysis of cost and benefits. The system contains several sets of radiation and weather data for Canada and USA. The selection of one of four collector models is based upon the requirements input during the computer session. Optimistic and pessimistic fuel cost forecasts are made for oil, natural gas, electricity, or propane; and the forecasted fuel cost is made the basis of the life cycle cost evaluation for the solar heating application chosen. This manual is organized so that each section describes one major aspect of the use of solar energy systems to provide energy for domestic consumption. The sources of data and technical information and the method of incorporating them into the CAISSE display system are described in the same order as the computer processing. Each section concludes with a list of future developments that could be included to make CAISSE outputs more regionally specific and more useful to designers. 19 refs., 1 tab.

  15. COMPUTER ORIENTED FACILITIES OF TEACHING AND INFORMATIVE COMPETENCE

    Directory of Open Access Journals (Sweden)

    Olga M. Naumenko

    2010-09-01

    Full Text Available In the article it is considered the history of views to the tasks of education, estimations of its effectiveness from the point of view of forming of basic vitally important competences. Opinions to the problem in different countries, international organizations, corresponding experience of the Ukrainian system of education are described. The necessity of forming of informative competence of future teacher is reasonable in the conditions of application of the computer oriented facilities of teaching at the study of naturally scientific cycle subjects in pedagogical colleges. Prognosis estimations concerning the development of methods of application of computer oriented facilities of teaching are presented.

  16. Mobile healthcare information management utilizing Cloud Computing and Android OS.

    Science.gov (United States)

    Doukas, Charalampos; Pliakas, Thomas; Maglogiannis, Ilias

    2010-01-01

    Cloud Computing provides functionality for managing information data in a distributed, ubiquitous and pervasive manner supporting several platforms, systems and applications. This work presents the implementation of a mobile system that enables electronic healthcare data storage, update and retrieval using Cloud Computing. The mobile application is developed using Google's Android operating system and provides management of patient health records and medical images (supporting DICOM format and JPEG2000 coding). The developed system has been evaluated using the Amazon's S3 cloud service. This article summarizes the implementation details and presents initial results of the system in practice.

  17. International Conference on Computer Science and Information Technology

    CERN Document Server

    Li, Xiaolong

    2014-01-01

    The main objective of CSAIT 2013 is to provide a forum for researchers, educators, engineers and government officials involved in the general areas of Computational Sciences and Information Technology to disseminate their latest research results and exchange views on the future research directions of these fields. A medium like this provides an opportunity to the academicians and industrial professionals to exchange and integrate practice of computer science, application of the academic ideas, improve the academic depth. The in-depth discussions on the subject provide an international communication platform for educational technology and scientific research for the world's universities, engineering field experts, professionals and business executives.

  18. A Spread Willingness Computing-Based Information Dissemination Model

    Science.gov (United States)

    Cui, Zhiming; Zhang, Shukui

    2014-01-01

    This paper constructs a kind of spread willingness computing based on information dissemination model for social network. The model takes into account the impact of node degree and dissemination mechanism, combined with the complex network theory and dynamics of infectious diseases, and further establishes the dynamical evolution equations. Equations characterize the evolutionary relationship between different types of nodes with time. The spread willingness computing contains three factors which have impact on user's spread behavior: strength of the relationship between the nodes, views identity, and frequency of contact. Simulation results show that different degrees of nodes show the same trend in the network, and even if the degree of node is very small, there is likelihood of a large area of information dissemination. The weaker the relationship between nodes, the higher probability of views selection and the higher the frequency of contact with information so that information spreads rapidly and leads to a wide range of dissemination. As the dissemination probability and immune probability change, the speed of information dissemination is also changing accordingly. The studies meet social networking features and can help to master the behavior of users and understand and analyze characteristics of information dissemination in social network. PMID:25110738

  19. A spread willingness computing-based information dissemination model.

    Science.gov (United States)

    Huang, Haojing; Cui, Zhiming; Zhang, Shukui

    2014-01-01

    This paper constructs a kind of spread willingness computing based on information dissemination model for social network. The model takes into account the impact of node degree and dissemination mechanism, combined with the complex network theory and dynamics of infectious diseases, and further establishes the dynamical evolution equations. Equations characterize the evolutionary relationship between different types of nodes with time. The spread willingness computing contains three factors which have impact on user's spread behavior: strength of the relationship between the nodes, views identity, and frequency of contact. Simulation results show that different degrees of nodes show the same trend in the network, and even if the degree of node is very small, there is likelihood of a large area of information dissemination. The weaker the relationship between nodes, the higher probability of views selection and the higher the frequency of contact with information so that information spreads rapidly and leads to a wide range of dissemination. As the dissemination probability and immune probability change, the speed of information dissemination is also changing accordingly. The studies meet social networking features and can help to master the behavior of users and understand and analyze characteristics of information dissemination in social network.

  20. A Spread Willingness Computing-Based Information Dissemination Model

    Directory of Open Access Journals (Sweden)

    Haojing Huang

    2014-01-01

    Full Text Available This paper constructs a kind of spread willingness computing based on information dissemination model for social network. The model takes into account the impact of node degree and dissemination mechanism, combined with the complex network theory and dynamics of infectious diseases, and further establishes the dynamical evolution equations. Equations characterize the evolutionary relationship between different types of nodes with time. The spread willingness computing contains three factors which have impact on user’s spread behavior: strength of the relationship between the nodes, views identity, and frequency of contact. Simulation results show that different degrees of nodes show the same trend in the network, and even if the degree of node is very small, there is likelihood of a large area of information dissemination. The weaker the relationship between nodes, the higher probability of views selection and the higher the frequency of contact with information so that information spreads rapidly and leads to a wide range of dissemination. As the dissemination probability and immune probability change, the speed of information dissemination is also changing accordingly. The studies meet social networking features and can help to master the behavior of users and understand and analyze characteristics of information dissemination in social network.

  1. Shielding Calculations for PUSPATI TRIGA Reactor (RTP) Fuel Transfer Cask with Micro shield

    International Nuclear Information System (INIS)

    Nurhayati Ramli; Ahmad Nabil Abdul Rahim; Ariff Shah Ismail

    2011-01-01

    The shielding calculations for RTP fuel transfer cask was performed by using computer code Micro shield 7.02. Micro shield is a computer code designed to provide a model to be used for shielding calculations. The results of the calculations can be obtained fast but the code is not suitable for complex geometries with a shielding composed of more than one material. Nevertheless, the program is sufficient for As Low As Reasonable Achievable (ALARA) optimization calculations. In this calculation, a geometry based on the conceptual design of RTP fuel transfer cask was modeled. Shielding material used in the calculations were lead (Pb) and stainless steel 304 (SS304). The results obtained from these calculations are discussed in this paper. (author)

  2. Implications of Information Theory for Computational Modeling of Schizophrenia.

    Science.gov (United States)

    Silverstein, Steven M; Wibral, Michael; Phillips, William A

    2017-10-01

    Information theory provides a formal framework within which information processing and its disorders can be described. However, information theory has rarely been applied to modeling aspects of the cognitive neuroscience of schizophrenia. The goal of this article is to highlight the benefits of an approach based on information theory, including its recent extensions, for understanding several disrupted neural goal functions as well as related cognitive and symptomatic phenomena in schizophrenia. We begin by demonstrating that foundational concepts from information theory-such as Shannon information, entropy, data compression, block coding, and strategies to increase the signal-to-noise ratio-can be used to provide novel understandings of cognitive impairments in schizophrenia and metrics to evaluate their integrity. We then describe more recent developments in information theory, including the concepts of infomax, coherent infomax, and coding with synergy, to demonstrate how these can be used to develop computational models of schizophrenia-related failures in the tuning of sensory neurons, gain control, perceptual organization, thought organization, selective attention, context processing, predictive coding, and cognitive control. Throughout, we demonstrate how disordered mechanisms may explain both perceptual/cognitive changes and symptom emergence in schizophrenia. Finally, we demonstrate that there is consistency between some information-theoretic concepts and recent discoveries in neurobiology, especially involving the existence of distinct sites for the accumulation of driving input and contextual information prior to their interaction. This convergence can be used to guide future theory, experiment, and treatment development.

  3. Health Information System in a Cloud Computing Context.

    Science.gov (United States)

    Sadoughi, Farahnaz; Erfannia, Leila

    2017-01-01

    Healthcare as a worldwide industry is experiencing a period of growth based on health information technology. The capabilities of cloud systems make it as an option to develop eHealth goals. The main objectives of the present study was to evaluate the advantages and limitations of health information systems implementation in a cloud-computing context that was conducted as a systematic review in 2016. Science direct, Scopus, Web of science, IEEE, PubMed and Google scholar were searched according study criteria. Among 308 articles initially found, 21 articles were entered in the final analysis. All the studies had considered cloud computing as a positive tool to help advance health technology, but none had insisted too much on its limitations and threats. Electronic health record systems have been mostly studied in the fields of implementation, designing, and presentation of models and prototypes. According to this research, the main advantages of cloud-based health information systems could be categorized into the following groups: economic benefits and advantages of information management. The main limitations of the implementation of cloud-based health information systems could be categorized into the 4 groups of security, legal, technical, and human restrictions. Compared to earlier studies, the present research had the advantage of dealing with the issue of health information systems in a cloud platform. The high frequency of studies conducted on the implementation of cloud-based health information systems revealed health industry interest in the application of this technology. Security was a subject discussed in most studies due to health information sensitivity. In this investigation, some mechanisms and solutions were discussed concerning the mentioned systems, which would provide a suitable area for future scientific research on this issue. The limitations and solutions discussed in this systematic study would help healthcare managers and decision

  4. Available data for house shielding estimates of Japanese atomic bomb survivors

    International Nuclear Information System (INIS)

    Woolson, William A.

    1987-01-01

    To make intelligent decisions concerning the methods to update the dosimetry assignments for the Japanese atomic bomb survivors, it is necessary to know the available shielding information that exists in uncoded form on paper and in coded form that can be directly accessed by the computer. The objective of this report is to provide a summary of the available shielding data, both in uncoded and coded form. This report is the result of visits to RERF in Hiroshima and Nagasaki in February and November 1983. The special assistance provided by Mr. Hiroaki Yamada at Hiroshima and Mr. Yoshio Okamoto at Nagasaki is acknowledged. They were in charge of the ABCC shielding sections at their respective locations and have been long involved in the RERF shielding program. Their familiarity with the methods, procedures, and data was of invaluable assistance in this work. The following sections of this report will provide a description of the information that is available in the shielding history files in uncoded form; a brief description of the various shielding methods that were used over the course of time from the T57D system to the present day T65D; and a description of the current coded data bases that can be accessed by computer

  5. Department of Energy: MICS (Mathematical Information, and Computational Sciences Division). High performance computing and communications program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-06-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, {open_quotes}The DOE Program in HPCC{close_quotes}), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW). The information pointed to by the URL is updated frequently, and the interested reader is urged to access the WWW for the latest information.

  6. International Conference on Soft Computing in Information Communication Technology

    CERN Document Server

    Soft Computing in Information Communication Technology

    2012-01-01

      This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.

  7. Advances in Computer Science and Information Engineering Volume 2

    CERN Document Server

    Lin, Sally

    2012-01-01

    CSIE2012 is an integrated conference concentrating its focus on Computer Science and Information Engineering . In the proceeding, you can learn much more knowledge about Computer Science and Information Engineering of researchers from all around the world. The main role of the proceeding is to be used as an exchange pillar for researchers who are working in the mentioned fields. In order to meet the high quality of Springer, AISC series, the organization committee has made their efforts to do the following things. Firstly, poor quality paper has been refused after reviewing course by anonymous referee experts. Secondly, periodically review meetings have been held around the reviewers about five times for exchanging reviewing suggestions. Finally, the conference organizers had several preliminary sessions before the conference. Through efforts of different people and departments, the conference will be successful and fruitful.

  8. Advances in Computer Science and Information Engineering Volume 1

    CERN Document Server

    Lin, Sally

    2012-01-01

    CSIE2012 is an integrated conference concentrating its focus on Computer Science and Information Engineering . In the proceeding, you can learn much more knowledge about Computer Science and Information Engineering of researchers from all around the world. The main role of the proceeding is to be used as an exchange pillar for researchers who are working in the mentioned fields. In order to meet the high quality of Springer, AISC series, the organization committee has made their efforts to do the following things. Firstly, poor quality paper has been refused after reviewing course by anonymous referee experts. Secondly, periodically review meetings have been held around the reviewers about five times for exchanging reviewing suggestions. Finally, the conference organizers had several preliminary sessions before the conference. Through efforts of different people and departments, the conference will be successful and fruitful.

  9. Smart information systems computational intelligence for real-life applications

    CERN Document Server

    Hopfgartner, Frank

    2015-01-01

    This must-read text/reference presents an overview of smart information systems for both the private and public sector, highlighting the research questions that can be studied by applying computational intelligence. The book demonstrates how to transform raw data into effective smart information services, covering the challenges and potential of this approach. Each chapter describes the algorithms, tools, measures and evaluations used to answer important questions. This is then further illustrated by a diverse selection of case studies reflecting genuine problems faced by SMEs, multinational

  10. 12th International Conference on Computing and Information Technology

    CERN Document Server

    Boonkrong, Sirapat; Unger, Herwig

    2016-01-01

    This proceedings book presents recent research work and results in the area of communication and information technologies. The chapters of this book contain the main, well-selected and reviewed contributions of scientists who met at the 12th International Conference on Computing and Information Technology (IC2IT) held during 7th - 8th July 2016 in Khon Kaen, Thailand The book is divided into three parts: “User Centric Data Mining and Text Processing”, “Data Mining Algoritms and their Applications” and “Optimization of Complex Networks”.

  11. 11th International Conference on Computing and Information Technology

    CERN Document Server

    Meesad, Phayung; Boonkrong, Sirapat

    2015-01-01

    This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking.

  12. Fisher information in the design of computer simulation experiments

    Energy Technology Data Exchange (ETDEWEB)

    StehlIk, Milan; Mueller, Werner G [Department of Applied Statistics, Johannes-Kepler-University Linz Freistaedter Strasse 315, A-4040 Linz (Austria)], E-mail: Milan.Stehlik@jku.at, E-mail: Werner.Mueller@jku.at

    2008-11-01

    The concept of Fisher information is conveniently used as a basis for designing efficient experiments. However, if the output stems from computer simulations they are often approximated as realizations of correlated random fields. Consequently, the conditions under which Fisher information may be suitable must be restated. In the paper we intend to give some simple but illuminating examples for these cases. 'Random phenomena have increasing importance in Engineering and Physics, therefore theoretical results are strongly needed. But there is a gap between the probability theory used by mathematicians and practitioners. Two very different languages have been generated in this way...' (Paul Kree, Paris 1995)

  13. Fisher information in the design of computer simulation experiments

    International Nuclear Information System (INIS)

    StehlIk, Milan; Mueller, Werner G

    2008-01-01

    The concept of Fisher information is conveniently used as a basis for designing efficient experiments. However, if the output stems from computer simulations they are often approximated as realizations of correlated random fields. Consequently, the conditions under which Fisher information may be suitable must be restated. In the paper we intend to give some simple but illuminating examples for these cases. 'Random phenomena have increasing importance in Engineering and Physics, therefore theoretical results are strongly needed. But there is a gap between the probability theory used by mathematicians and practitioners. Two very different languages have been generated in this way...' (Paul Kree, Paris 1995)

  14. Information Security Scheme Based on Computational Temporal Ghost Imaging.

    Science.gov (United States)

    Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing

    2017-08-09

    An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.

  15. COMPUTER ORIENTED FACILITIES OF TEACHING AND INFORMATIVE COMPETENCE

    OpenAIRE

    Olga M. Naumenko

    2010-01-01

    In the article it is considered the history of views to the tasks of education, estimations of its effectiveness from the point of view of forming of basic vitally important competences. Opinions to the problem in different countries, international organizations, corresponding experience of the Ukrainian system of education are described. The necessity of forming of informative competence of future teacher is reasonable in the conditions of application of the computer oriented facilities of t...

  16. The First NAFOSTED Conference on Information and Computer Science

    CERN Document Server

    Nguyen, Xuan; Le, Hoai; Nguyen, Viet; Bao, Vo

    2015-01-01

    This book includes the extended and revised versions of a set of selected papers from the First NAFOSTED Conference on Information and Computer Science (NICS’2014), held at Le Quy Don Technical Academy, Hanoi, Vietnam from 13/Mar./2014 to 14/Mar./2014. The conference was co-organized by The National Foundation for Science and Technology Development (NAFOSTED) and Le Quy Don Technical Academy. The purpose of the NICS conference series is to promote scientific publications in the country and to provide a platform for high quality academic exchange among scientists in the fields of computer science, information and communication. The conference includes five tracks, namely “Computer Science”, “Artificial Intelligence”, “Network Systems”, “Software Engineering”, and “Information Systems”.  The papers in this book are among the best contributions at NICS’2014 taken into account the quality of their presentation at the conference and the recommendation of the two experts in the extra round ...

  17. Radiation dose reduction at a price: the effectiveness of a male gonadal shield during helical CT scans

    OpenAIRE

    Erdi Yusuf E; Casciotta Kevin A; Dauer Lawrence T; Rothenberg Lawrence N

    2007-01-01

    Abstract Background It is estimated that 60 million computed tomography (CT) scans were performed during 2006, with approximately 11% of those performed on children age 0–15 years. Various types of gonadal shielding have been evaluated for reducing exposure to the gonads. The purpose of this study was to quantify the radiation dose reduction to the gonads and its effect on image quality when a wrap-around male pediatric gonad shield was used during CT scanning. This information is obtained to...

  18. Cloud Computing in the Curricula of Schools of Computer Science and Information Systems

    Science.gov (United States)

    Lawler, James P.

    2011-01-01

    The cloud continues to be a developing area of information systems. Evangelistic literature in the practitioner field indicates benefit for business firms but disruption for technology departments of the firms. Though the cloud currently is immature in methodology, this study defines a model program by which computer science and information…

  19. Highly heat removing radiation shielding material

    International Nuclear Information System (INIS)

    Asano, Norio; Hozumi, Masahiro.

    1990-01-01

    Organic materials, inorganic materials or metals having excellent radiation shielding performance are impregnated into expanded metal materials, such as Al, Cu or Mg, having high heat conductivity. Further, the porosity of the expanded metals and combination of the expanded metals and the materials to be impregnated are changed depending on the purpose. Further, a plurality of shielding materials are impregnated into the expanded metal of the same kind, to constitute shielding materials. In such shielding materials, impregnated materials provide shielding performance against radiation rays such as neutrons and gamma rays, the expanded metals provide heat removing performance respectively and they act as shielding materials having heat removing performance as a whole. Accordingly, problems of non-informity and discontinuity in the prior art can be dissolved be provide materials having flexibility in view of fabrication work. (T.M.)

  20. Principles of quantum computation and information volume II

    International Nuclear Information System (INIS)

    Kok, P

    2007-01-01

    Any new textbook in quantum information has some pretty strong competition to contend with. Not only is there the classic text by Nielsen and Chuang from 2000, but also John Preskill's lecture notes, available for free online. Nevertheless, a proper textbook seems more enduring than online notes, and the field has progressed considerably in the seven years since Nielsen and Chuang was published. A new textbook is a great opportunity to give a snapshot of our current state of knowledge in quantum information. Therein also lies a problem: The field has expanded so much that it is impossible to cover everything at the undergraduate level. Quantum information theory is relevant to an extremely large portion of physics, from solid state and condensed matter physics to particle physics. Every discipline that has some relation to quantum mechanics is affected by our understanding of quantum information theory. Those who wish to write a book on quantum information therefore have to make some profound choices: Do you keep the ultimate aim of a quantum computer in mind, or do you focus on quantum communication and precision measurements as well? Do you describe how to build a quantum computer with all possible physical systems or do you present only the underlying principles? Do you include only the tried and tested ideas, or will you also explore more speculative directions? You don't have to take a black-or-white stance on these questions, but how you approach them will profoundly determine the character of your book. The authors of 'Principles of Quantum Computation and Information (Volume II: Basic Tools and Special Topics)' have chosen to focus on the construction of quantum computers, but restrict themselves mainly to general techniques. Only in the last chapter do they explicitly address the issues that arise in the different implementations. The book is the second volume in a series, and consists of four chapters (labelled 5 to 8) called 'Quantum Information Theory

  1. Storing and managing information artifacts collected by information analysts using a computing device

    Science.gov (United States)

    Pike, William A; Riensche, Roderick M; Best, Daniel M; Roberts, Ian E; Whyatt, Marie V; Hart, Michelle L; Carr, Norman J; Thomas, James J

    2012-09-18

    Systems and computer-implemented processes for storage and management of information artifacts collected by information analysts using a computing device. The processes and systems can capture a sequence of interactive operation elements that are performed by the information analyst, who is collecting an information artifact from at least one of the plurality of software applications. The information artifact can then be stored together with the interactive operation elements as a snippet on a memory device, which is operably connected to the processor. The snippet comprises a view from an analysis application, data contained in the view, and the sequence of interactive operation elements stored as a provenance representation comprising operation element class, timestamp, and data object attributes for each interactive operation element in the sequence.

  2. Shielding technology for high energy radiation production facility

    International Nuclear Information System (INIS)

    Lee, Byung Chul; Kim, Heon Il

    2004-06-01

    In order to develop shielding technology for high energy radiation production facility, references and data for high energy neutron shielding are searched and collected, and calculations to obtain the characteristics of neutron shield materials are performed. For the evaluation of characteristics of neutron shield material, it is chosen not only general shield materials such as concrete, polyethylene, etc., but also KAERI developed neutron shields of High Density PolyEthylene (HDPE) mixed with boron compound (B 2 O 3 , H 2 BO 3 , Borax). Neutron attenuation coefficients for these materials are obtained for later use in shielding design. The effect of source shape and source angular distribution on the shielding characteristics for several shield materials is examined. This effect can contribute to create shielding concept in case of no detail source information. It is also evaluated the effect of the arrangement of shield materials using current shield materials. With these results, conceptual shielding design for PET cyclotron is performed. The shielding composite using HDPE and concrete is selected to meet the target dose rate outside the composite, and the dose evaluation is performed by configuring the facility room conceptually. From the result, the proper shield configuration for this PET cyclotron is proposed

  3. Justification of computational methods to ensure information management systems

    Directory of Open Access Journals (Sweden)

    E. D. Chertov

    2016-01-01

    Full Text Available Summary. Due to the diversity and complexity of organizational management tasks a large enterprise, the construction of an information management system requires the establishment of interconnected complexes of means, implementing the most efficient way collect, transfer, accumulation and processing of information necessary drivers handle different ranks in the governance process. The main trends of the construction of integrated logistics management information systems can be considered: the creation of integrated data processing systems by centralizing storage and processing of data arrays; organization of computer systems to realize the time-sharing; aggregate-block principle of the integrated logistics; Use a wide range of peripheral devices with the unification of information and hardware communication. Main attention is paid to the application of the system of research of complex technical support, in particular, the definition of quality criteria for the operation of technical complex, the development of information base analysis methods of management information systems and define the requirements for technical means, as well as methods of structural synthesis of the major subsystems of integrated logistics. Thus, the aim is to study on the basis of systematic approach of integrated logistics management information system and the development of a number of methods of analysis and synthesis of complex logistics that are suitable for use in the practice of engineering systems design. The objective function of the complex logistics management information systems is the task of gathering systems, transmission and processing of specified amounts of information in the regulated time intervals with the required degree of accuracy while minimizing the reduced costs for the establishment and operation of technical complex. Achieving the objective function of the complex logistics to carry out certain organization of interaction of information

  4. Handout on shielding calculation

    International Nuclear Information System (INIS)

    Heilbron Filho, P.F.L.

    1991-01-01

    In order to avoid the difficulties of the radioprotection supervisors in the tasks related to shielding calculations, is presented in this paper the basic concepts of shielding theory. It also includes exercises and examples. (author)

  5. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... the coding operations must be performed in a particular way, which we introduce. Finally we evaluate the suggested system and find that the amount of coding can be significantly reduced both at nodes that recode and decode.......This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...

  6. The Impact of Cloud Computing on Information Systems Agility

    Directory of Open Access Journals (Sweden)

    Mohamed Sawas

    2015-09-01

    Full Text Available As businesses are encountering frequent harsh economic conditions, concepts such as outsourcing, agile and lean management, change management and cost reduction are constantly gaining more attention. This is because these concepts are all aimed at saving on budgets and facing unexpected changes. Latest technologies like cloud computing promise to turn IT, that has always been viewed as a cost centre, into a source of saving money and driving flexibility and agility to the business. The purpose of this paper is to first compile a set of attributes that govern the agility benefits added to information systems by cloud computing and then develop a survey-based instrument to measure these agility benefits. Our research analysis employs non-probability sampling based on a combination of convenience and judgment. This approach was used to obtain a representative sample of participants from potential companies belonging to various industries such as oil & gas, banking, private, government and semi-governmental organizations. This research will enable decision makers to measure agility enhancements and hence compare the agility of Information Systems before and after deploying cloud computing.

  7. Cloud Computing Application on Transport Dispatching Informational Support Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Olegovich Gusenitsa

    2015-05-01

    Full Text Available Transport dispatching informational support systems has received widespread attention due to high quality information density, strong coherence and applicable visualization features. Nevertheless, because of large volume of data, complex integration requirements and the need for information exchange between different users, time costs of the development and implementation of the informational support systems, problems associated with various data formats compatibility, security protocols and high maintenance cost, the opportunities for the application of such systems are significantly reduced. This article reviews the possibility of creating a cloud storage data system for transport dispatching informational support system (TDIS using modern computer technology to meet the challenges of mass data processing, information security and reduce operational costs. The system is expected to make full use of the advantages offered by the technology of cloud storage. Integrated cloud will increase the amount of data available to the system, reduce the speed processing requirements and reduce the overall cost of system implementation. Creation and integration of cloud storage is one of the most important areas of TDIS development, which is stimulating and promoting the further development of TDIS to ensure the requirements of its users.

  8. Signal validation with control-room information-processing computers

    International Nuclear Information System (INIS)

    Belblidia, L.A.; Carlson, R.W.; Russell, J.L. Jr.

    1985-01-01

    One of the 'lessons learned' from the Three Mile Island accident focuses upon the need for a validated source of plant-status information in the control room. The utilization of computer-generated graphics to display the readings of the major plant instrumentation has introduced the capability of validating signals prior to their presentation to the reactor operations staff. The current operations philosophies allow the operator a quick look at the gauges to form an impression of the fraction of full scale as the basis for knowledge of the current plant conditions. After the introduction of a computer-based information-display system such as the Safety Parameter Display System (SPDS), operational decisions can be based upon precise knowledge of the parameters that define the operation of the reactor and auxiliary systems. The principal impact of this system on the operator will be to remove the continuing concern for the validity of the instruments which provide the information that governs the operator's decisions. (author)

  9. Shielding features of quarry stone

    International Nuclear Information System (INIS)

    Hernandez V, C.; Contreras S, H.; Hernandez A, L.; Baltazar R, A.; Escareno J, E.; Mares E, C. A.; Vega C, H. R.

    2010-10-01

    Quarry stone lineal attenuation coefficient for gamma-rays has been obtained. In Zacatecas, quarry stone is widely utilized as a decorative item in buildings, however its shielding features against gamma-rays unknown. The aim of this work is to determine the shielding properties of quarry stone against γ-rays using Monte Carlo calculations where a detailed model of a good geometry experimental setup was carried out. In the calculations 10 pieces 10 X 10 cm 2 of different thickness were utilized to evaluate the photons transmission as the quarry stone thickness is increased. It was noticed that transmitted photons decay away as the shield thickness is increased, these results were fitted to an exponential function were the linear attenuation coefficient was estimated. Also, using XCOM code the linear attenuation coefficient from several keV up to 100 MeV was estimated. From the comparison between Monte Carlo results and XCOM calculations a good agreement was found. For 0.662 MeV γ-rays the attenuation coefficient of quarry stone, whose density is 2.413 g-cm -3 , is 0.1798 cm -1 , this mean a X 1/2 = 3.9 cm, X 1/4 = 7.7 cm, X 1/10 = 12.8 cm, and X 1/100 = 25.6 cm. Having the information of quarry stone performance as shielding give the chance to use this material to shield X and γ-ray facilities. (Author)

  10. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  11. PC based temporary shielding administrative procedure (TSAP)

    International Nuclear Information System (INIS)

    Olsen, D.E.; Pederson, G.E.; Hamby, P.N.

    1995-01-01

    A completely new Administrative Procedure for temporary shielding was developed for use at Commonwealth Edison's six nuclear stations. This procedure promotes the use of shielding, and addresses industry requirements for the use and control of temporary shielding. The importance of an effective procedure has increased since more temporary shielding is being used as ALARA goals become more ambitious. To help implement the administrative procedure, a personal computer software program was written to incorporate the procedural requirements. This software incorporates the useability of a Windows graphical user interface with extensive help and database features. This combination of a comprehensive administrative procedure and user friendly software promotes the effective use and management of temporary shielding while ensuring that industry requirements are met

  12. PC based temporary shielding administrative procedure (TSAP)

    Energy Technology Data Exchange (ETDEWEB)

    Olsen, D.E.; Pederson, G.E. [Sargent & Lundy, Chicago, IL (United States); Hamby, P.N. [Commonwealth Edison Co., Downers Grove, IL (United States)

    1995-03-01

    A completely new Administrative Procedure for temporary shielding was developed for use at Commonwealth Edison`s six nuclear stations. This procedure promotes the use of shielding, and addresses industry requirements for the use and control of temporary shielding. The importance of an effective procedure has increased since more temporary shielding is being used as ALARA goals become more ambitious. To help implement the administrative procedure, a personal computer software program was written to incorporate the procedural requirements. This software incorporates the useability of a Windows graphical user interface with extensive help and database features. This combination of a comprehensive administrative procedure and user friendly software promotes the effective use and management of temporary shielding while ensuring that industry requirements are met.

  13. Radiation shielding for fission reactors

    Energy Technology Data Exchange (ETDEWEB)

    Oka, Yoshiaki [Tokyo Univ., Nuclear Engineering Research Laboratory, Tokyo (Japan)

    2000-03-01

    Radiation shielding aspects relating fission reactors have been reviewed. Domestic activities in the past five years have been mainly described concerning nuclear data, calculation methods, shielding and skyshine experiments, Advanced Boiling Water Reactor (ABWR), Advanced Pressurized Water Reactor (APWR), High Temperature Engineering Test Reactor (HTTR), Experimental and Prototype Fast Reactors (JOYO, MONJU), Demonstration FBR, core shroud replacement of BWR, and spent fuel transportation cask and vessel. These studies have valuable information in safety and cost reduction issues of fission reactor design for not only existing reactors but also new reactor concepts in the next century. It has been concluded that we should maintain existing shielding technologies and improve these data and methods for coming generations in the next millennium. (author)

  14. Neutron shielding for a 252 Cf source

    International Nuclear Information System (INIS)

    Vega C, H.R.; Manzanares A, E.; Hernandez D, V.M.; Eduardo Gallego, Alfredo Lorente

    2006-01-01

    To determine the neutron shielding features of water-extended polyester a Monte Carlo study was carried out. Materials with low atomic number are predominantly used for neutron shielding because these materials effectively attenuate neutrons, mainly through inelastic collisions and absorption reactions. During the selection of materials to design a neutron shield, prompt gamma production as well as radionuclide production induced by neutron activation must be considered. In this investigation the Monte Carlo method was used to evaluate the performance of a water-extended polyester shield designed for the transportation, storage, and use of a 252 Cf isotopic neutron source. During calculations a detailed model for the 252 Cf and the shield was utilized. To compare the shielding features of water extended polyester, the calculations were also made for the bare 252 Cf in vacuum, air and the shield filled with water. For all cases the calculated neutron spectra was utilized to determine the ambient equivalent neutron dose at four sites around the shielding. In the case of water extended polyester and water shielding the calculations were extended to include the prompt gamma rays produced during neutron interactions, with this information the Kerma in air was calculated at the same locations where the ambient equivalent neutron dose was determined. (Author)

  15. Soft Computing in Information Communication Technology Volume 2

    CERN Document Server

    2012-01-01

    This book is a collection of the accepted papers concerning soft computing in information communication technology. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Fuzzy Logic, Machine Learning, Cryptography, Pattern Recognition, Bioinformatics, Biomedical Engineering, Advancements in ICT.

  16. Interdisciplinarity and Computer Music Modeling and Information Retrieval

    DEFF Research Database (Denmark)

    Grund, Cynthia M.

    2006-01-01

    Abstract This paper takes a look at computer music modeling and information retrieval (CMMIR) from the point of view of the humanities with emphasis upon areas relevant to the philosophy of music. The desire for more interdisciplinary research involving CMMIR and the humanities is expressed...... for interdisciplinary work involving CMMIR. The paper concludes with some remarks proffered during a panel discussion which took place near the end of the Pisa conference on September 28, 2006 and in correspondence inspired by this discussion, together with some brief commentary on the same. An earlier, somewhat short...

  17. Computational Methods for Physical Model Information Management: Opening the Aperture

    International Nuclear Information System (INIS)

    Moser, F.; Kirgoeze, R.; Gagne, D.; Calle, D.; Murray, J.; Crowley, J.

    2015-01-01

    The volume, velocity and diversity of data available to analysts are growing exponentially, increasing the demands on analysts to stay abreast of developments in their areas of investigation. In parallel to the growth in data, technologies have been developed to efficiently process, store, and effectively extract information suitable for the development of a knowledge base capable of supporting inferential (decision logic) reasoning over semantic spaces. These technologies and methodologies, in effect, allow for automated discovery and mapping of information to specific steps in the Physical Model (Safeguard's standard reference of the Nuclear Fuel Cycle). This paper will describe and demonstrate an integrated service under development at the IAEA that utilizes machine learning techniques, computational natural language models, Bayesian methods and semantic/ontological reasoning capabilities to process large volumes of (streaming) information and associate relevant, discovered information to the appropriate process step in the Physical Model. The paper will detail how this capability will consume open source and controlled information sources and be integrated with other capabilities within the analysis environment, and provide the basis for a semantic knowledge base suitable for hosting future mission focused applications. (author)

  18. Department of Energy Mathematical, Information, and Computational Sciences Division: High Performance Computing and Communications Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-11-01

    This document is intended to serve two purposes. Its first purpose is that of a program status report of the considerable progress that the Department of Energy (DOE) has made since 1993, the time of the last such report (DOE/ER-0536, The DOE Program in HPCC), toward achieving the goals of the High Performance Computing and Communications (HPCC) Program. The second purpose is that of a summary report of the many research programs administered by the Mathematical, Information, and Computational Sciences (MICS) Division of the Office of Energy Research under the auspices of the HPCC Program and to provide, wherever relevant, easy access to pertinent information about MICS-Division activities via universal resource locators (URLs) on the World Wide Web (WWW).

  19. Electromagnetic shielding formulae

    International Nuclear Information System (INIS)

    Dahlberg, E.

    1979-02-01

    This addendum to an earlier collection of electromagnetic shielding formulae (TRITA-EPP-75-27) contains simple transfer matrices suitable for calculating the quasistatic shielding efficiency for multiple transverse-field and axial-field cylindrical and spherical shields, as well as for estimating leakage fields from long coaxial cables and the normal-incidence transmission of a plane wave through a multiple plane shield. The differences and similarities between these cases are illustrated by means of equivalent circuits and transmission line analogies. The addendum also includes a discussion of a possible heuristic improvement of some shielding formulae. (author)

  20. The Active Muon Shield

    CERN Document Server

    Bezshyiko, Iaroslava

    2016-01-01

    In the SHiP beam-dump of the order of 1011 muons will be produced per second. An active muon-shield is used to magnetically deflect these muons out of the acceptance of the spectrom- eter. This note describes how this shield is modelled and optimized. The SHiP spectrometer is being re-optimized using a conical decay-vessel, and utilizing the possibility to magnetize part of the beam-dump shielding iron. A shield adapted to these new conditions is presented which is significantly shorter and lighter than the shield used in the Technical Proposal (TP), while showing a similar performance.

  1. Available computer codes and data for radiation transport analysis

    International Nuclear Information System (INIS)

    Trubey, D.K.; Maskewitz, B.F.; Roussin, R.W.

    1975-01-01

    The Radiation Shielding Information Center (RSIC), sponsored and supported by the Energy Research and Development Administration (ERDA) and the Defense Nuclear Agency (DNA), is a technical institute serving the radiation transport and shielding community. It acquires, selects, stores, retrieves, evaluates, analyzes, synthesizes, and disseminates information on shielding and ionizing radiation transport. The major activities include: (1) operating a computer-based information system and answering inquiries on radiation analysis, (2) collecting, checking out, packaging, and distributing large computer codes, and evaluated and processed data libraries. The data packages include multigroup coupled neutron-gamma-ray cross sections and kerma coefficients, other nuclear data, and radiation transport benchmark problem results

  2. Fine-grained Information Flow for Concurrent Computation

    DEFF Research Database (Denmark)

    Li, Ximeng

    and reference monitors, have been proposed in the context of programming languages and process calculi, to enforce such properties. The most widely used definitions of information flow security are noninterference-like properties. For concurrent systems where processes communicate with each other to accomplish...... computational tasks, fine-grained security policies can be formulated by distinguishing between whether communication can happen, and what is communicated. As the first contribution of this PhD thesis, we formulate a noninterference-like property that takes all combinations of sensitivity levels for “whether...... to a classical one when the two dimensions are intentionally blurred. As the second contribution, we focus on the “what” dimension and further allow the flow policy to vary under different contents stored and communicated. This is the area of content-dependent (or conditional) information flow, which has...

  3. Automatic generation of computable implementation guides from clinical information models.

    Science.gov (United States)

    Boscá, Diego; Maldonado, José Alberto; Moner, David; Robles, Montserrat

    2015-06-01

    Clinical information models are increasingly used to describe the contents of Electronic Health Records. Implementation guides are a common specification mechanism used to define such models. They contain, among other reference materials, all the constraints and rules that clinical information must obey. However, these implementation guides typically are oriented to human-readability, and thus cannot be processed by computers. As a consequence, they must be reinterpreted and transformed manually into an executable language such as Schematron or Object Constraint Language (OCL). This task can be difficult and error prone due to the big gap between both representations. The challenge is to develop a methodology for the specification of implementation guides in such a way that humans can read and understand easily and at the same time can be processed by computers. In this paper, we propose and describe a novel methodology that uses archetypes as basis for generation of implementation guides. We use archetypes to generate formal rules expressed in Natural Rule Language (NRL) and other reference materials usually included in implementation guides such as sample XML instances. We also generate Schematron rules from NRL rules to be used for the validation of data instances. We have implemented these methods in LinkEHR, an archetype editing platform, and exemplify our approach by generating NRL rules and implementation guides from EN ISO 13606, openEHR, and HL7 CDA archetypes. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Shielding calculational system for plutonium

    International Nuclear Information System (INIS)

    Zimmerman, M.G.; Thomsen, D.H.

    1975-08-01

    A computer calculational system has been developed and assembled specifically for calculating dose rates in AEC plutonium fabrication facilities. The system consists of two computer codes and all nuclear data necessary for calculation of neutron and gamma dose rates from plutonium. The codes include the multigroup version of the Battelle Monte Carlo code for solution of general neutron and gamma shielding problems and the PUSHLD code for solution of shielding problems where low energy gamma and x-rays are important. The nuclear data consists of built in neutron and gamma yields and spectra for various plutonium compounds, an automatic calculation of age effects and all cross-sections commonly used. Experimental correlations have been performed to verify portions of the calculational system. (23 tables, 7 figs, 16 refs) (U.S.)

  5. Computer-based safeguards information and accounting system

    International Nuclear Information System (INIS)

    1977-01-01

    Acquiring, processing and analysing information about inventories and flow of nuclear materials are essential parts of IAEA safeguards. Safeguards information originates from several sources. The information to be provided is specified in the various safeguards agreements between the States and the IAEA, including both NPT agreements and safeguards trilateral agreements. Most of the safeguards information currently received by the IAEA is contained in accounting reports from the States party to the NPT. Within the frame of the material balance concept of NPT, three types of reports are provided to the IAEA by the States: Physical Inventory Listings (PIL); Inventory Change Reports (ICR); Material Balance Reports (MBR). In addition, facility design information is reported when NPT safeguards are applied and whenever there is a change in the facility or its operation. Based on this data, an accounting system is used to make available such information as the book inventories of nuclear material as a function of time, material balance evaluations, and analysis of shipments versus receipts of nuclear material. A second source of NPT safeguards information is the inspection activities carried out in the field as a necessary counterpart for verification of the data presented by the States in their accounting reports. The processing of inspection reports and other inspection data is carried out by the present system in a provisional manner until a new system, which is under development is available. The major effort currently is directed not to computer processing but toward developing and applying uniform inspection procedures and information requirements. A third source of NPT safeguards information is advanced notifications and notifications of transfer of source materials before the starting point of safeguards. Since, however, the States are not completely aware of the need and requirement to provide these data, this is a point to be emphasized in future workshops and

  6. Development of radiation shielding standards in the American Nuclear Society

    International Nuclear Information System (INIS)

    Trubey, D.K.

    1975-11-01

    The American Nuclear Society (ANS) is a standards-writing organization-member of the American National Standards Institute (ANSI). The ANS Standards Committee has a subcommittee denoted ANS-6, Shielding, whose charge is to establish standards in connection with radiation protection and shielding, to provide shielding information to other standards writing groups, and to prepare recommended sets of shielding data and test problems. This paper is a progress report of this subcommittee

  7. 78 FR 57839 - Request for Information on Computer Security Incident Coordination (CSIC)

    Science.gov (United States)

    2013-09-20

    ...-02] Request for Information on Computer Security Incident Coordination (CSIC) AGENCY: National... Computer Security Incident Coordination. NIST experienced technical difficulties with receiving email... Technology (NIST) announced that it was soliciting comments relating to Computer Security Incident...

  8. Wake Shield Target Protection

    International Nuclear Information System (INIS)

    Valmianski, Emanuil I.; Petzoldt, Ronald W.; Alexander, Neil B.

    2003-01-01

    The heat flux from both gas convection and chamber radiation on a direct drive target must be limited to avoid target damage from excessive D-T temperature increase. One of the possibilities of protecting the target is a wake shield flying in front of the target. A shield will also reduce drag force on the target, thereby facilitating target tracking and position prediction. A Direct Simulation Monte Carlo (DSMC) code was used to calculate convection heat loads as boundary conditions input into ANSYS thermal calculations. These were used for studying the quality of target protection depending on various shapes of shields, target-shield distance, and protective properties of the shield moving relative to the target. The results show that the shield can reduce the convective heat flux by a factor of 2 to 5 depending on pressure, temperature, and velocity. The protective effect of a shield moving relative to the target is greater than the protective properties of a fixed shield. However, the protective effect of a shield moving under the drag force is not sufficient for bringing the heat load on the target down to the necessary limit. Some other ways of diminishing heat flux using a protective shield are discussed

  9. Technical specifications for the bulk shielding reactor

    International Nuclear Information System (INIS)

    1986-05-01

    This report provides information concerning the technical specifications for the Bulk Shielding Reactor. Areas covered include: safety limits and limiting safety settings; limiting conditions for operation; surveillance requirements; design features; administrative controls; and monitoring of airborne effluents. 10 refs

  10. Towards GLUE 2: evolution of the computing element information model

    International Nuclear Information System (INIS)

    Andreozzi, S; Burke, S; Field, L; Konya, B

    2008-01-01

    A key advantage of Grid systems is the ability to share heterogeneous resources and services between traditional administrative and organizational domains. This ability enables virtual pools of resources to be created and assigned to groups of users. Resource awareness, the capability of users or user agents to have knowledge about the existence and state of resources, is required in order utilize the resource. This awareness requires a description of the services and resources typically defined via a community-agreed information model. One of the most popular information models, used by a number of Grid infrastructures, is the GLUE Schema, which provides a common language for describing Grid resources. Other approaches exist, however they follow different modeling strategies. The presence of different flavors of information models for Grid resources is a barrier for enabling inter-Grid interoperability. In order to solve this problem, the GLUE Working Group in the context of the Open Grid Forum was started. The purpose of the group is to oversee a major redesign of the GLUE Schema which should consider the successful modeling choices and flaws that have emerged from practical experience and modeling choices from other initiatives. In this paper, we present the status of the new model for describing computing resources as the first output from the working group with the aim of dissemination and soliciting feedback from the community

  11. CADMIO: computer aided design for medical information objects.

    Science.gov (United States)

    Minarelli, D V; Ferri, F; Pisanelli, D M; Ricci, F L; Tittarelli, F

    1995-01-01

    The growth of the computational capability and the tools of graphic software is nowadays available in an integrated manner into the development environments, thus permitting the realization of tool kits capable of handling information that is complex and of different kinds such as the typical medical information. This has given a great impulse to the creation of electronic medical folders joining together with new and stimulating functionality with respect to the usual paper document [1]. In the present work, we propose a tool capable of defining a multimedia electronic medical folder and representing its architecture through a layout that is formed on the basis of the particular data types to be handled. This tool is capable of providing an integrated view of data that, even though they are close in cognitive sense, are often stored and represented apart in the practice. Different approaches to the browsing feature are giving within the system, thus the user can personalize the way of viewing the information stored into the folder or can let the system guide the browsing.

  12. Information security: where computer science, economics and psychology meet.

    Science.gov (United States)

    Anderson, Ross; Moore, Tyler

    2009-07-13

    Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into 'security' topics such as privacy, bugs, spam and phishing, but into more general areas of system dependability and policy. This research programme has recently started to interact with psychology. One thread is in response to phishing, the most rapidly growing form of online crime, in which fraudsters trick people into giving their credentials to bogus websites; a second is through the increasing importance of security usability; and a third comes through the psychology-and-economics tradition. The promise of this multidisciplinary research programme is a novel framework for analysing information security problems-one that is both principled and effective.

  13. Radiation shielding of the main injector

    International Nuclear Information System (INIS)

    Bhat, C.M.; Martin, P.S.

    1995-05-01

    The radiation shielding in the Fermilab Main Injector (FMI) complex has been carried out by adopting a number of prescribed stringent guidelines established by a previous safety analysis. Determination of the required amount of radiation shielding at various locations of the FMI has been done using Monte Carlo computations. A three dimensional ray tracing code as well as a code based upon empirical observations have been employed in certain cases

  14. 76 FR 37111 - Access to Confidential Business Information by Computer Sciences Corporation and Its Identified...

    Science.gov (United States)

    2011-06-24

    ... Business Information by Computer Sciences Corporation and Its Identified Subcontractors AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Computer Sciences Corporation of Chantilly, VA and Its Identified Subcontractors, to access information which has...

  15. Advanced information processing system: Inter-computer communication services

    Science.gov (United States)

    Burkhardt, Laura; Masotto, Tom; Sims, J. Terry; Whittredge, Roy; Alger, Linda S.

    1991-01-01

    The purpose is to document the functional requirements and detailed specifications for the Inter-Computer Communications Services (ICCS) of the Advanced Information Processing System (AIPS). An introductory section is provided to outline the overall architecture and functional requirements of the AIPS and to present an overview of the ICCS. An overview of the AIPS architecture as well as a brief description of the AIPS software is given. The guarantees of the ICCS are provided, and the ICCS is described as a seven-layered International Standards Organization (ISO) Model. The ICCS functional requirements, functional design, and detailed specifications as well as each layer of the ICCS are also described. A summary of results and suggestions for future work are presented.

  16. Entangled world. The fascination of quantum information and computation

    International Nuclear Information System (INIS)

    Audretsch, J.

    2006-01-01

    In the quantum world, a particle can behave like a wave and accordingly seems to be in two places at the same time. This of course is contradictory to our daily experiences with classical particles. How then should this be understood? What happens in the transitional area between the classical world and quantum mechanics? The present book answers exciting questions like these in a way that is easy to follow and to understand and it shows that the link between these two worlds will have concrete and applied effects on our daily life in the near future. It will, for example, improve and change the conventional methods of information processing. With the help of quantum cryptography, it will be possible to communicate tap-proof. Using quantum computers we will be able to solve highly complicated problems in a very short time. (orig.)

  17. A Cloud Computing Based Patient Centric Medical Information System

    Science.gov (United States)

    Agarwal, Ankur; Henehan, Nathan; Somashekarappa, Vivek; Pandya, A. S.; Kalva, Hari; Furht, Borko

    This chapter discusses an emerging concept of a cloud computing based Patient Centric Medical Information System framework that will allow various authorized users to securely access patient records from various Care Delivery Organizations (CDOs) such as hospitals, urgent care centers, doctors, laboratories, imaging centers among others, from any location. Such a system must seamlessly integrate all patient records including images such as CT-SCANS and MRI'S which can easily be accessed from any location and reviewed by any authorized user. In such a scenario the storage and transmission of medical records will have be conducted in a totally secure and safe environment with a very high standard of data integrity, protecting patient privacy and complying with all Health Insurance Portability and Accountability Act (HIPAA) regulations.

  18. Radiation shielding concrete

    International Nuclear Information System (INIS)

    Kunishima, Shigeru.

    1990-01-01

    The radiation shielding concretes comprise water, cement, fine aggregates consisting of serpentines and blown mist slags, coarse aggregates consisting of serpentines and kneading materials. Since serpentines containing a relatively great amount of water of crystallization in rocks as coarse aggregates and fine aggregates, the hydrogen content in the radiation shielding concretes is increased and the neutron shielding effect is improved. In addition, since serpentines are added as the fine aggregates and blown mists slags of a great specific gravity are used, the specific gravity of the shielding concretes is increased to improve the γ-ray shielding effect. Further, by the use of the kneading material having a water reducing effect and fluidizing effect, and by the bearing effect of the spherical blown mist slags used as the fine aggregates, concrete fluidity can be increased. Accordingly, workability of the radiation shielding concretes can be improved. (T.M.)

  19. Cloud Computing and Information Technology Resource Cost Management for SMEs

    DEFF Research Database (Denmark)

    Kuada, Eric; Adanu, Kwame; Olesen, Henning

    2013-01-01

    This paper analyzes the decision-making problem confronting SMEs considering the adoption of cloud computing as an alternative to in-house computing services provision. The economics of choosing between in-house computing and a cloud alternative is analyzed by comparing the total economic costs...... in determining the relative value of cloud computing....

  20. 76 FR 20051 - Advisory Committee for Computer and Information; Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2011-04-11

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information; Science and... Committee for Computer and Information Science and Engineering--(1115). Date and Time: May 6, 2011 8:30 a.m... Meeting: Open. Contact Person: Carmen Whitson, Directorate for Computer and Information, Science and...

  1. 76 FR 61118 - Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2011-10-03

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and... Computer and Information Science and Engineering (1115). Date and Time: November 1, 2011 from 12 p.m.-5:30... Computer and Information Science and Engineering, National Science Foundation, 4201 Wilson Blvd., Suite...

  2. A Computer-Based System Integrating Instruction and Information Retrieval: A Description of Some Methodological Considerations.

    Science.gov (United States)

    Selig, Judith A.; And Others

    This report, summarizing the activities of the Vision Information Center (VIC) in the field of computer-assisted instruction from December, 1966 to August, 1967, describes the methodology used to load a large body of information--a programed text on basic opthalmology--onto a computer for subsequent information retrieval and computer-assisted…

  3. A Study of the Programming Languages Used in Information Systems and in Computer Science Curricula

    Science.gov (United States)

    Russell, Jack; Russell, Barbara; Pollacia, Lissa F.; Tastle, William J.

    2010-01-01

    This paper researches the computer languages taught in the first, second and third programming courses in Computer Information Systems (CIS), Management Information Systems (MIS or IS) curricula as well as in Computer Science (CS) and Information Technology (IT) curricula. Instructors teaching the first course in programming within a four year…

  4. Shielding Factor Method for producing effective cross sections: MINX/SPHINX and the CCCC interface system

    International Nuclear Information System (INIS)

    MacFarlane, R.E.; Weisbin, C.R.; Paik, N.C.

    1978-01-01

    The Shielding Factor Method (SFM) is an economical designer-oriented method for producing the coarse-group space and energy self-shielded cross sections needed for reactor-core analysis. Extensive experience with the ETOX/1DX and ENDRUN/TDOWN systems has made the SFM the method of choice for most US fast-reactor design activities. The MINX/SPHINX system was designed to expand upon the capabilities of the older SFM codes and to incorporate the new standard interfaces for fast-reactor cross sections specified by the Committee for Computer Code Coordination (CCCC). MINX is the cross-section processor. It generates multigroup cross sections, shielding factors, and group-to-group transfer matriccs from ENDF/B-IV and writes them out as CCCC ISOTXS and BRKOXS files. It features detailed pointwise resonance reconstruction, accurate Doppler broadening, and an efficient treatment of anisotropic scattering. SPHINX is the space-and-energy shielding code. It uses specific mixture and geometry information together with equivalence principles to construct shielded macroscopic multigroup cross sections in as many as 240 groups. It then makes a flux calculation by diffusion or transport methods and collapses to an appropriate set of cell-averaged coarse-group effective cross sections. The integration of MINX and SPHINX with the CCCC interface system provides an efficient, accurate, and convenient system for producing effective cross sections for use in fast-reactor problems. The system has also proved useful in shielding and CTR applications. 3 figures, 4 tables

  5. Remote sampling and analysis of highly radioactive samples in shielded boxes

    International Nuclear Information System (INIS)

    Kirpikov, D.A.; Miroshnichenko, I.V.; Pykhteev, O.Yu.

    2010-01-01

    The sampling procedure used for highly radioactive coolant water is associated with high risk of personnel irradiation and uncontrolled radioactive contamination. Remote sample manipulation with provision for proper radiation shielding is intended for safety enhancement of the sampling procedure. The sampling lines are located in an isolated compartment, a shielded box. Various equipment which enables remote or automatic sample manipulation is used for this purpose. The main issues of development of the shielded box equipment intended for a wider ranger of remote chemical analyses and manipulation techniques for highly radioactive water samples are considered in the paper. There were three principal directions of work: Transfer of chemical analysis performed in the laboratory inside the shielded box; Prevalence of computer-aided and remote techniques of highly radioactive sample manipulation inside the shielded box; and, Increase in control over sampling and determination of thermal-hydraulic parameters of the coolant water in the sampling lines. The developed equipment and solutions enable remote chemical analysis in the restricted volume of the shielded box by using ion-chromatographic, amperometrical, fluorimetric, flow injection, phototurbidimetric, conductometric and potentiometric methods. Extent of control performed in the shielded box is determined taking into account the requirements of the regulatory documents as well as feasibility and cost of the technical adaptation of various methods to the shielded box conditions. The work resulted in highly precise determination of more than 15 indexes of the coolant water quality performed in on-line mode in the shielded box. It averages to 80% of the total extent of control performed at the prototype reactor plants. The novel solutions for highly radioactive sample handling are implemented in the shielded box (for example, packaging, sample transportation to the laboratory, volume measurement). The shielded box is

  6. The fourth International Conference on Information Science and Cloud Computing

    Science.gov (United States)

    This book comprises the papers accepted by the fourth International Conference on Information Science and Cloud Computing (ISCC), which was held from 18-19 December, 2015 in Guangzhou, China. It has 70 papers divided into four parts. The first part focuses on Information Theory with 20 papers; the second part emphasizes Machine Learning also containing 21 papers; in the third part, there are 21 papers as well in the area of Control Science; and the last part with 8 papers is dedicated to Cloud Science. Each part can be used as an excellent reference by engineers, researchers and students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by the ISCC conference. Special thanks go to Professor Deyu Qi, General Chair of ISCC 2015, for his leadership in supervising the organization of the entire conference; Professor Tinghuai Ma, Program Chair, and members of program committee for evaluating all the submissions and ensuring the selection of only the highest quality papers; and the authors for sharing their ideas, results and insights. We sincerely hope that you enjoy reading papers included in this book.

  7. Shielding concerns at a spallation source

    International Nuclear Information System (INIS)

    Russell, G.J.; Robinson, H.; Legate, G.L.; Woods, R.

    1989-01-01

    Neutrons produced by 800-MeV proton reactions at the Los Alamos Neutron Scattering Center spallation neutron source cause a variety of challenging shielding problems. We identify several characteristics distinctly different from reactor shielding and compute the dose attenuation through an infinite slab/shield composed of iron (100 cm) and borated polyethylene (15 cm). Our calculations show that (for an incident spallation spectrum characteristic of neutrons leaking from a tungsten target at 90/degree/) the dose through the shield is a complex mixture of neutrons and gamma rays. High-energy (> 20 MeV) neutron production from the target is ≅5% of the total, yet causes ≅68% of the dose at the shield surface. Primary low-energy (< 20 MeV) neutrons from the target contribute negligibly (≅0.5%) to the dose at the shield surface yet cause gamma rays, which contribute ≅31% to the total dose at the shield surface. Low-energy neutrons from spallation reactions behave similarly to neutrons with a fission spectrum distribution. 6 refs., 8 figs., 1 tab

  8. INTOR radiation shielding for personnel access

    International Nuclear Information System (INIS)

    Gohar, Y.; Abdou, M.

    1981-01-01

    The INTOR reactor shield system consists of the blanket, bulk shield, penetration shield, component shield, and biological shield. The bulk shield consists of two parts: (a) the inboard shield; and (b) the outboard shield. The distinction between the different components of the shield system is essential to satisfy the different design constraints and achieve various objectives

  9. Evolving the Land Information System into a Cloud Computing Service

    Energy Technology Data Exchange (ETDEWEB)

    Houser, Paul R. [CREW Services LLC, Ellicott City, MD (United States)

    2015-02-17

    The Land Information System (LIS) was developed to use advanced flexible land surface modeling and data assimilation frameworks to integrate extremely large satellite- and ground-based observations with advanced land surface models to produce continuous high-resolution fields of land surface states and fluxes. The resulting fields are extremely useful for drought and flood assessment, agricultural planning, disaster management, weather and climate forecasting, water resources assessment, and the like. We envisioned transforming the LIS modeling system into a scientific cloud computing-aware web and data service that would allow clients to easily setup and configure for use in addressing large water management issues. The focus of this Phase 1 project was to determine the scientific, technical, commercial merit and feasibility of the proposed LIS-cloud innovations that are currently barriers to broad LIS applicability. We (a) quantified the barriers to broad LIS utility and commercialization (high performance computing, big data, user interface, and licensing issues); (b) designed the proposed LIS-cloud web service, model-data interface, database services, and user interfaces; (c) constructed a prototype LIS user interface including abstractions for simulation control, visualization, and data interaction, (d) used the prototype to conduct a market analysis and survey to determine potential market size and competition, (e) identified LIS software licensing and copyright limitations and developed solutions, and (f) developed a business plan for development and marketing of the LIS-cloud innovation. While some significant feasibility issues were found in the LIS licensing, overall a high degree of LIS-cloud technical feasibility was found.

  10. Shielded regenerative neutron detector

    International Nuclear Information System (INIS)

    Terhune, J.H.; Neissel, J.P.

    1978-01-01

    An ion chamber type neutron detector is disclosed which has a greatly extended lifespan. The detector includes a fission chamber containing a mixture of active and breeding material and a neutron shielding material. The breeding and shielding materials are selected to have similar or substantially matching neutron capture cross-sections so that their individual effects on increased detector life are mutually enhanced

  11. Handbook of radiation shielding data

    International Nuclear Information System (INIS)

    Courtney, J.C.

    1976-07-01

    This handbook is a compilation of data on units, conversion factors, geometric considerations, sources of radiation, and the attenuation of photons, neutrons, and charged particles. It also includes related topics in health physics. Data are presented in tabular and graphical form with sufficient narrative for a least first-approximation solutions to a variety of problems in nuclear radiation protection. Members of the radiation shielding community contributed the information in this document from unclassified and uncopyrighted sources, as referenced

  12. Quantum information. Teleportation - cryptography - quantum computer; Quanteninformation. Teleportation - Kryptografie - Quantencomputer

    Energy Technology Data Exchange (ETDEWEB)

    Koenneker, Carsten (comp.)

    2012-11-01

    The following topics are dealt with: Reality in the test facility, quantum teleportation, the reality of quanta, interaction-free quantum measurement, rules for quantum computers, quantum computers with ions, spintronics with diamond, the limits of the quantum computers, a view in the future of quantum optics. (HSI)

  13. Computational spectrotemporal auditory model with applications to acoustical information processing

    Science.gov (United States)

    Chi, Tai-Shih

    A computational spectrotemporal auditory model based on neurophysiological findings in early auditory and cortical stages is described. The model provides a unified multiresolution representation of the spectral and temporal features of sound likely critical in the perception of timbre. Several types of complex stimuli are used to demonstrate the spectrotemporal information preserved by the model. Shown by these examples, this two stage model reflects the apparent progressive loss of temporal dynamics along the auditory pathway from the rapid phase-locking (several kHz in auditory nerve), to moderate rates of synchrony (several hundred Hz in midbrain), to much lower rates of modulations in the cortex (around 30 Hz). To complete this model, several projection-based reconstruction algorithms are implemented to resynthesize the sound from the representations with reduced dynamics. One particular application of this model is to assess speech intelligibility. The spectro-temporal Modulation Transfer Functions (MTF) of this model is investigated and shown to be consistent with the salient trends in the human MTFs (derived from human detection thresholds) which exhibit a lowpass function with respect to both spectral and temporal dimensions, with 50% bandwidths of about 16 Hz and 2 cycles/octave. Therefore, the model is used to demonstrate the potential relevance of these MTFs to the assessment of speech intelligibility in noise and reverberant conditions. Another useful feature is the phase singularity emerged in the scale space generated by this multiscale auditory model. The singularity is shown to have certain robust properties and carry the crucial information about the spectral profile. Such claim is justified by perceptually tolerable resynthesized sounds from the nonconvex singularity set. In addition, the singularity set is demonstrated to encode the pitch and formants at different scales. These properties make the singularity set very suitable for traditional

  14. Modular multiple sensors information management for computer-integrated surgery.

    Science.gov (United States)

    Vaccarella, Alberto; Enquobahrie, Andinet; Ferrigno, Giancarlo; Momi, Elena De

    2012-09-01

    In the past 20 years, technological advancements have modified the concept of modern operating rooms (ORs) with the introduction of computer-integrated surgery (CIS) systems, which promise to enhance the outcomes, safety and standardization of surgical procedures. With CIS, different types of sensor (mainly position-sensing devices, force sensors and intra-operative imaging devices) are widely used. Recently, the need for a combined use of different sensors raised issues related to synchronization and spatial consistency of data from different sources of information. In this study, we propose a centralized, multi-sensor management software architecture for a distributed CIS system, which addresses sensor information consistency in both space and time. The software was developed as a data server module in a client-server architecture, using two open-source software libraries: Image-Guided Surgery Toolkit (IGSTK) and OpenCV. The ROBOCAST project (FP7 ICT 215190), which aims at integrating robotic and navigation devices and technologies in order to improve the outcome of the surgical intervention, was used as the benchmark. An experimental protocol was designed in order to prove the feasibility of a centralized module for data acquisition and to test the application latency when dealing with optical and electromagnetic tracking systems and ultrasound (US) imaging devices. Our results show that a centralized approach is suitable for minimizing synchronization errors; latency in the client-server communication was estimated to be 2 ms (median value) for tracking systems and 40 ms (median value) for US images. The proposed centralized approach proved to be adequate for neurosurgery requirements. Latency introduced by the proposed architecture does not affect tracking system performance in terms of frame rate and limits US images frame rate at 25 fps, which is acceptable for providing visual feedback to the surgeon in the OR. Copyright © 2012 John Wiley & Sons, Ltd.

  15. ANS shielding standards for light-water reactors

    International Nuclear Information System (INIS)

    Trubey, D.K.

    1982-01-01

    The purpose of the American Nuclear Society Standards Subcommittee, ANS-6, Radiation Protection and Shielding, is to develop standards for radiation protection and shield design, to provide shielding information to other standards-writing groups, and to develop standard reference shielding data and test problems. A total of seven published ANS-6 standards are now current. Additional projects of the subcommittee, now composed of nine working groups, include: standard reference data for multigroup cross sections, gamma-ray absorption coefficients and buildup factors, additional benchwork problems for shielding problems and energy spectrum unfolding, power plant zoning design for normal and accident conditions, process radiation monitors, and design for postaccident radiological conditions

  16. Radiation shielding plate

    International Nuclear Information System (INIS)

    Kobayashi, Torakichi; Sugawara, Takeo.

    1983-01-01

    Purpose: To reduce the weight and stabilize the configuration of a radiation shielding plate which is used in close contact with an object to be irradiated with radiation rays. Constitution: The radiation shielding plate comprises a substrate made of lead glass and a metallic lead coating on the surface of the substrate by means of plating, vapor deposition or the like. Apertures for permeating radiation rays are formed to the radiation shielding plate. Since the shielding plate is based on a lead glass plate, a sufficient mechanical strength can be obtained with a thinner structure as compared with the conventional plate made of metallic lead. Accordingly, if the shielding plate is disposed on a soft object to be irradiated with radiation rays, the object and the plate itself less deform to obtain a radiation irradiation pattern with distinct edges. (Moriyama, K.)

  17. Proceedings of ISCIS III, the third international symposium on computer and information sciences

    International Nuclear Information System (INIS)

    Gelenbe, E.; Orhun, E.; Basar, E.

    1988-01-01

    The symposium presented in this book covered the following topics in computer and information sciences: computer networks, computers in education, software engineering, modelling and simulation, concurrency, artificial intelligence, image and signal processing, data base systems, operating systems, parallel processing, robotics, reliability, computer architecture, CAD/CAM, and social and technical applications. Many of the papers presented are studies on computer networks, computers in education, artificial intelligence, software engineering, concurrency, data base systems, image processing, and parallel processing

  18. Status report of shielding investigation in Japan

    International Nuclear Information System (INIS)

    Shindo, M.

    1964-01-01

    The Japan Atomic Energy Research Institute (JAERI) was established in 1954, and immediately proceeded with the construction of a research reactor. The first symposium in Japan on nuclear energy was held in 1957. Most of the papers presented in the field of reactor shielding were limited to shielding materials and their fabrication. In the first stage of our investigations, our efforts were devoted to practical design studies of reactor shielding. As a result of these studies, it was found that the formulae at hand for calculations were inadequate, but at that time no electronic computer was available in Japan nor were theoretical calculations very actively undertaken. Problems on nuclear ship shielding had been investigated at the Ship Research Institute, since 1956 and many fruitful results had been obtained. About that time the Japan Atomic Industry Forum started activities and took the initiative in organizing shielding research. Research workers in the shipbuilding industry in particular have been seriously studying shielding problems. Few years after the first symposium, problems concerning more fundamental studies were treated by many research workers. Shielding experiments using radioisotopes were carried out and many fruitful results were obtained. They are described in the this paper. Medium size electronic computers became available in Japan, permitting a theoretical study group to make an active contribution. They produced some codes, and their results are also described in the following sections. This constituted the second stage of our investigations. A swimming-pool reactor, JRR-4 (Japan Research Reactor-4), has been under construction at JAERI since 1962 and will become critical in autumn 1964. After characteristic tests it will be a very powerful tool for the shielding investigations. This id the beginning of the third stage of investigations

  19. 77 FR 20367 - Proposed Information Collection; Comment Request; Computer and Internet Use Supplement to the...

    Science.gov (United States)

    2012-04-04

    ... DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Proposed Information Collection; Comment Request; Computer and Internet Use Supplement to the Census Bureau's Current... of automated collection techniques or other forms of information technology. Comments submitted in...

  20. A Multi-agent Supply Chain Information Coordination Mode Based on Cloud Computing

    OpenAIRE

    Wuxue Jiang; Jing Zhang; Junhuai Li

    2013-01-01

     In order to improve the high efficiency and security of supply chain information coordination under cloud computing environment, this paper proposes a supply chain information coordination mode based on cloud computing. This mode has two basic statuses which are online status and offline status. At the online status, cloud computing center is responsible for coordinating the whole supply chain information. At the offline status, information exchange can be realized among different nodes by u...

  1. HPGe detector shielding adjustment

    International Nuclear Information System (INIS)

    Trnkova, L.; Rulik, P.

    2008-01-01

    Low-level background shielding of HPGe detectors is used mainly for environmental samples with very low content of radionuclides. National Radiation Protection Institute (SURO) in Prague is equipped with 14 HPGe detectors with relative efficiency up to 150%. The detectors are placed in a room built from materials with low content of natural radionuclides and equipped with a double isolation of the floor against radon. Detectors themselves are placed in lead or steel shielding. Steel shielding with one of these detectors with relative efficiency of 100% was chosen to be rebuilt to achieve lower minimum detectable activity (MDA). Additional lead and copper shielding was built up inside the original steel shielding to reduce the volume of the inner space and filled with nitrogen by means of evaporating liquid nitrogen. The additional lead and copper shielding, consequent reduction of the inner volume and supply of evaporated nitrogen, caused a decrease of the background count and accordingly MDA values as well. The effect of nitrogen evaporation on the net areas of peaks belonging to radon daughters is significant. The enhanced shielding adjustment has the biggest influence in low energy range, what can be seen in collected data. MDA values in energy range from 30 keV to 400 keV decreased to 0.65-0.85 of original value, in energy range from 400 keV to 2 MeV they fell to 0.70-0.97 of original value. (authors)

  2. Shielding in experimental areas

    International Nuclear Information System (INIS)

    Stevens, A.; Tarnopolsky, G.; Thorndike, A.; White, S.

    1979-01-01

    The amount of shielding necessary to protect experimental detectors from various sources of background radiation is discussed. As illustrated an experiment has line of sight to sources extending approx. 90 m upstream from the intersection point. Packing a significant fraction of this space with shielding blocks would in general be unacceptable because primary access to the ring tunnel is from the experimental halls. (1) From basic machine design considerations and the inherent necessity to protect superconducting magnets it is expected that experimental areas in general will be cleaner than at any existing accelerator. (2) Even so, it will likely be necessary to have some shielding blocks available to protect experimental apparatus, and it may well be necessary to have a large amount of shielding available in the WAH. (3) Scraping will likely have some influence on all halls, and retractable apparatus may sometimes be necessary. (4) If access to any tunnel is needed to replace a magnet, one has 96 h (4 days) available to move shielding away to permit access without additional downtime. This (the amount of shielding one can shuffle about in 96 h) is a reasonable upper limit to shielding necessary in a hall

  3. Bioinformatics process management: information flow via a computational journal

    Directory of Open Access Journals (Sweden)

    Lushington Gerald

    2007-12-01

    Full Text Available Abstract This paper presents the Bioinformatics Computational Journal (BCJ, a framework for conducting and managing computational experiments in bioinformatics and computational biology. These experiments often involve series of computations, data searches, filters, and annotations which can benefit from a structured environment. Systems to manage computational experiments exist, ranging from libraries with standard data models to elaborate schemes to chain together input and output between applications. Yet, although such frameworks are available, their use is not widespread–ad hoc scripts are often required to bind applications together. The BCJ explores another solution to this problem through a computer based environment suitable for on-site use, which builds on the traditional laboratory notebook paradigm. It provides an intuitive, extensible paradigm designed for expressive composition of applications. Extensive features facilitate sharing data, computational methods, and entire experiments. By focusing on the bioinformatics and computational biology domain, the scope of the computational framework was narrowed, permitting us to implement a capable set of features for this domain. This report discusses the features determined critical by our system and other projects, along with design issues. We illustrate the use of our implementation of the BCJ on two domain-specific examples.

  4. Emerging Computation and Information teChnologies for Education : Proceeding of 2012 International Conference on Emerging Computation and Information teChnologies for Education

    CERN Document Server

    Xu, Linli; Tian, Wenya

    2012-01-01

    The 2012 International Conference on Emerging Computation and Information teChnologies for Education (ECICE 2012) was  held on Jan. 15-16, 2012, Hangzhou, China.  The main results of the conference are presented in this proceedings book of carefully reviewed and accepted paper addressing the hottest issues in emerging computation and information technologies used for education. The volume covers a wide series of topics in the area, including Computer-Assisted Education, Educational Information Systems, Web-based Learning, etc.

  5. FY 1995 Blue Book: High Performance Computing and Communications: Technology for the National Information Infrastructure

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program was created to accelerate the development of future generations of high performance computers...

  6. Making Informed Decisions: Management Issues Influencing Computers in the Classroom.

    Science.gov (United States)

    Strickland, James

    A number of noninstructional factors appear to determine the extent to which computers make a difference in writing instruction. Once computers have been purchased and installed, it is generally school administrators who make management decisions, often from an uninformed pedagogical orientation. Issues such as what hardware and software to buy,…

  7. Big data computing: Building a vision for ARS information management

    Science.gov (United States)

    Improvements are needed within the ARS to increase scientific capacity and keep pace with new developments in computer technologies that support data acquisition and analysis. Enhancements in computing power and IT infrastructure are needed to provide scientists better access to high performance com...

  8. Shielding member for thermonuclear device

    Energy Technology Data Exchange (ETDEWEB)

    Onozuka, Masanori

    1997-06-30

    In a thermonuclear device for shielding fast neutrons by shielding members disposed in a shielding vessel (vacuum vessel and structures such as a blanket disposed in the vacuum vessel), the shielding member comprises a large number of shielding wires formed fine and short so as to have elasticity. The shielding wires are sealed in a shielding vessel together with water, and when the width of the shielding vessel is changed, the shielding wires follow after the change of the width while elastically deforming in the shielding vessel, so that great stress and deformation are not formed thereby enabling to improve reliability. In addition, the length, the diameter and the shape of each of the shielding wires can be selected in accordance with the shielding space of the shielding vessel. Even if the shape of the shielding vessel is complicated, the shielding wires can be inserted easily. Accordingly, the filling rate of the shielding members can be changed easily. It can be produced more easily compared with a conventional spherical pebbles. It can be produced more easily than existent spherical shielding pebbles thereby enabling to reduce the production cost. (N.H.)

  9. Information-preserving models of physics and computation: Final report

    International Nuclear Information System (INIS)

    1986-01-01

    This research pertains to discrete dynamical systems, as embodied by cellular automata, reversible finite-difference equations, and reversible computation. The research has strengthened the cross-fertilization between physics, computer science and discrete mathematics. It has shown that methods and concepts of physics can be exported to computation. Conversely, fully discrete dynamical systems have been shown to be fruitful for representing physical phenomena usually described with differential equations - cellular automata for fluid dynamics has been the most noted example of such a representation. At the practical level, the fully discrete representation approach suggests innovative uses of computers for scientific computing. The originality of these uses lies in their non-numerical nature: they avoid the inaccuracies of floating-point arithmetic and bypass the need for numerical analysis. 38 refs

  10. An innovative method for on-power radiometry of end-shields of nuclear power plants

    International Nuclear Information System (INIS)

    Kumar, Gaurav; Gupta, Pankaj; Nawal, Shriram; Gautam, Mahesh; Kakkar, Aman Deep; Yadav, Umed

    2012-01-01

    Every lndian PHWR reactor calandria is sandwiched within a pair of shield on either side. These shields are perpendicular to the coaxial axis of calandria and are called end-shields. These provide shielding from leakage radiation from reactor core in escaping out to Fuelling Machine vault, thereby significantly reducing the dose rates in the vaults. This has got a direct impact on radiation field in accessible areas. By maintaining low dose rates in accessible areas, the individual and collective doses of radiation workers can be effectively controlled well within the stipulated limits. Thus, it is of utmost importance to ensure adequacy of shielding provided by end-shields. In this context, a limited radiometry exercise is executed after filling of end-shields with steel balls and prior to their installation at designated place. This exercise provides limited inputs along the periphery of end-shield due to limited strength of radiation source, its handling provisions and dose constraints to the individual. In order to ascertain an in-depth analysis of shielding adequacy on-power, different methodologies have been adopted and have certain limitation in precisely pinpointing the affected area/location besides limitation on number of locations that can be monitored at a single stretch. To overcome these important anomalies, a computer based setup has been indigenously designed. The setup essentially comprises of a radiation monitor with wide energy, measuring, temperature and humidity range; a custom designed 25 m long compatible cable with suitable connectors; a laptop with additional cooling arrangement; a configurable interfacing software; thermal shielding for the detector and tying/fixing provisions. The radiation monitor after being properly shielded for thermal impacts is installed on the head of Fuelling Machine. It is connected through long cable to a laptop kept at Fuelling Machine service area with due cooling provisions (as temperature in the area will

  11. A computer-oriented system for assembling and displaying land management information

    Science.gov (United States)

    Elliot L. Amidon

    1964-01-01

    Maps contain information basic to land management planning. By transforming conventional map symbols into numbers which are punched into cards, the land manager can have a computer assemble and display information required for a specific job. He can let a computer select information from several maps, combine it with such nonmap data as treatment cost or benefit per...

  12. Computer information resources of inorganic chemistry and materials science

    Energy Technology Data Exchange (ETDEWEB)

    Kiselyova, N N; Dudarev, V A; Zemskov, V S [A.A.Baikov Institute of Metallurgy and Materials Science, Russian Academy of Sciences, Moscow (Russian Federation)

    2010-02-28

    Information systems used in inorganic chemistry and materials science are considered. The following basic trends in the development of modern information systems in these areas are highlighted: access to information via the Internet, merging of documental and factual databases, involvement of experts in the evaluation of the data reliability, supplementing databases with information analysis tools on the properties of inorganic substances and materials.

  13. Computer information resources of inorganic chemistry and materials science

    International Nuclear Information System (INIS)

    Kiselyova, N N; Dudarev, V A; Zemskov, V S

    2010-01-01

    Information systems used in inorganic chemistry and materials science are considered. The following basic trends in the development of modern information systems in these areas are highlighted: access to information via the Internet, merging of documental and factual databases, involvement of experts in the evaluation of the data reliability, supplementing databases with information analysis tools on the properties of inorganic substances and materials.

  14. Estimating ISABELLE shielding requirements

    International Nuclear Information System (INIS)

    Stevens, A.J.; Thorndike, A.M.

    1976-01-01

    Estimates were made of the shielding thicknesses required at various points around the ISABELLE ring. Both hadron and muon requirements are considered. Radiation levels at the outside of the shield and at the BNL site boundary are kept at or below 1000 mrem per year and 5 mrem/year respectively. Muon requirements are based on the Wang formula for pion spectra, and the hadron requirements on the hadron cascade program CYLKAZ of Ranft. A muon shield thickness of 77 meters of sand is indicated outside the ring in one area, and hadron shields equivalent to from 2.7 to 5.6 meters in thickness of sand above the ring. The suggested safety allowance would increase these values to 86 meters and 4.0 to 7.2 meters respectively. There are many uncertainties in such estimates, but these last figures are considered to be rather conservative

  15. Scintillation counter, segmented shield

    International Nuclear Information System (INIS)

    Olson, R.E.; Thumim, A.D.

    1975-01-01

    A scintillation counter, particularly for counting gamma ray photons, includes a massive lead radiation shield surrounding a sample-receiving zone. The shield is disassembleable into a plurality of segments to allow facile installation and removal of a photomultiplier tube assembly, the segments being so constructed as to prevent straight-line access of external radiation through the shield into radiation-responsive areas. Provisions are made for accurately aligning the photomultiplier tube with respect to one or more sample-transmitting bores extending through the shield to the sample receiving zone. A sample elevator, used in transporting samples into the zone, is designed to provide a maximum gamma-receiving aspect to maximize the gamma detecting efficiency. (U.S.)

  16. Shields for nuclear reactors

    International Nuclear Information System (INIS)

    Aspden, G.J.

    1984-01-01

    The patent concerns shields for nuclear reactors. The roof shield comprises a normally fixed radial outer portion, a radial inner portion rotatable about a vertical axis, and a connection between the inner and outer portions. In the event of hypothecal core disruption conditions, a cantilever system on the inner wall allows the upward movement of the inner wall, in order to prevent loss of containment. (UK)

  17. Radiation shielding curtain

    International Nuclear Information System (INIS)

    Winkler, N.T.

    1976-01-01

    A radiation shield is described in the form of a stranded curtain made up of bead-chains whose material and geometry are selected to produce a cross-sectional density that is the equivalent of 0.25 mm or more of lead and which curtain may be mounted on various radiological devices to shield against scattered radiation while offering a minimum of obstruction to the radiologist

  18. Shielded cells transfer automation

    International Nuclear Information System (INIS)

    Fisher, J.J.

    1984-01-01

    Nuclear waste from shielded cells is removed, packaged, and transferred manually in many nuclear facilities. Radiation exposure is absorbed by operators during these operations and limited only through procedural controls. Technological advances in automation using robotics have allowed a production waste removal operation to be automated to reduce radiation exposure. The robotic system bags waste containers out of glove box and transfers them to a shielded container. Operators control the system outside the system work area via television cameras. 9 figures

  19. Biotechnology Computing: Information Science for the Era of Molecular Medicine.

    Science.gov (United States)

    Masys, Daniel R.

    1989-01-01

    The evolution from classical genetics to biotechnology, an area of research involving key macromolecules in living cells, is chronicled and the current state of biotechnology is described, noting related advances in computing and clinical medicine. (MSE)

  20. CLOUD COMPUTING BASED INFORMATION SYSTEMS -PRESENT AND FUTURE

    Directory of Open Access Journals (Sweden)

    Maximilian ROBU

    2012-12-01

    Full Text Available The current economic crisis and the global recession have affected the IT market as well. A solution camefrom the Cloud Computing area by optimizing IT budgets and eliminating different types of expenses (servers, licenses,and so on. Cloud Computing is an exciting and interesting phenomenon, because of its relative novelty and explodinggrowth. Because of its raise in popularity and usage Cloud Computing has established its role as a research topic.However the tendency is to focus on the technical aspects of Cloud Computing, thus leaving the potential that thistechnology offers unexplored. With the help of this technology new market player arise and they manage to break thetraditional value chain of service provision. The main focus of this paper is the business aspects of Cloud. In particularwe will talk about the economic aspects that cover using Cloud Computing (when, why and how to use, and theimpacts on the infrastructure, the legalistic issues that come from using Cloud Computing; the scalability and partiallyunclear legislation.

  1. Shielding design for positron emission tomography facility

    International Nuclear Information System (INIS)

    Abdallah, I.I.

    2007-01-01

    With the recent advent of readily available tracer isotopes, there has been marked increase in the number of hospital-based and free-standing positron emission tomography (PET) clinics. PET facilities employ relatively large activities of high-energy photon emitting isotopes, which can be dangerous to the health of humans and animals. This coupled with the current dose limits for radiation worker and members of the public can result in shielding requirements. This research contributes to the calculation of the appropriate shielding to keep the level of radiation within an acceptable recommended limit. Two different methods were used including measurements made at selected points of an operating PET facility and computer simulations by using Monte Carlo Transport Code. The measurements mainly concerned the radiation exposure at different points around facility using the survey meter detectors and Thermoluminescent Dosimeters (TLD). Then the set of manual calculation procedures were used to estimate the shielding requirements for a newly built PEF facility. The results from the measurement and the computer simulation were compared to the results obtained from the set manual calculation procedure. In general, the estimated weekly dose at the points of interest is lower than the regulatory limits for the little company of Mary Hospital. Furthermore, the density and the HVL for normal strength concrete and clay bricks are almost similar. In conclusion, PET facilities present somewhat different design requirements and are more likely to require additional radiation shielding. Therefore, existing shields at the little Company of Mary Hospital are in general found to be adequate and satisfactory and additional shielding was found necessary at the new PET facility in the department of Nuclear Medicine of the Dr. George Mukhari Hospital. By use of appropriate design, by implying specific shielding requirements and by maintaining good operating practices, radiation doses to

  2. Advances in Computing and Information Technology : Proceedings of the Second International

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2012-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  3. Achievable information rates for fiber optics : applications and computations

    NARCIS (Netherlands)

    Alvarado, A.; Fehenberger, T.; Chen, Bin; Willems, F.M.J.

    2018-01-01

    In this paper, achievable information rates (AIR) for fiber optical communications are discussed. It is shown that AIRs such as the mutual information and generalized mutual information are good design metrics for coded optical systems. The theoretical predictions of AIRs are compared to the

  4. Computers behind bars : Information technology in Canadian prison libraries

    DEFF Research Database (Denmark)

    Prange, Laurie

    of information can have upon Canadian prison libraries. Gathered information is compared with the results of Canadian policy regarding the provision of information to inmates. The analysis of the collected facts can provide insight to help prison librarians deal with the increasing popularity of electronic...

  5. RADSHI: shielding calculation program for different geometries sources

    International Nuclear Information System (INIS)

    Gelen, A.; Alvarez, I.; Lopez, H.; Manso, M.

    1996-01-01

    A computer code written in pascal language for IBM/Pc is described. The program calculates the optimum thickness of slab shield for different geometries sources. The Point Kernel Method is employed, which enables the obtention of the ionizing radiation flux density. The calculation takes into account the possibility of self-absorption in the source. The air kerma rate for gamma radiation is determined, and with the concept of attenuation length through the equivalent attenuation length the shield is obtained. The scattering and the exponential attenuation inside the shield material is considered in the program. The shield materials can be: concrete, water, iron or lead. It also calculates the shield for point isotropic neutron source, using as shield materials paraffin, concrete or water. (authors). 13 refs

  6. Revise of a basic data base for shielding design

    International Nuclear Information System (INIS)

    Nakao, Makoto; Takemura, Morio

    2000-03-01

    With use of the two-dimensional discrete ordinates code DORT and the standard groupwise shielding design library JSSTDL produced from the latest evaluated nuclear data library JENDL-3.2, experimental analyses for the representative configurations in the Radial Shield Attenuation Experiment of the JASPER were performed. The results were compared with those obtained with use of traditional method DOT3.5/JSDJ2 for the previous JASPER experimental analyses. In general, the change of the cross section library gives higher results and the change of the transport code gives lower results. Finally the new analysis method gives better agreement with the experimental results and also less deviations of calculational errors between various detectors. Experimental analyses for the thick concrete configuration in the Gap Streaming Experiment of the JASPER was also performed with the new analysis method, after solving the poor agreement found in last year with the original JASPER experimental analyses. The same tendency due to the library change was confirmed with the above mentioned analyses of the Radial Shield Attenuation Experiment. Compilation of the input data necessary for future reanalyses of important configurations in JASPER experiments were continued through the above-mentioned experimental analyses and related informations were added for repletion of the database preserved in a computer disk holding previously accumulated data. Input data descriptions were made for auxiliary routines needed for the experimental analyses and their sample data were compiled and stored in the database. (author)

  7. FY 1998 Blue Book: Computing, Information, and Communications: Technologies for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As the 21st century approaches, the rapid convergence of computing, communications, and information technology promises unprecedented opportunities for scientific...

  8. FY 2000 Blue Book: High Performance Computing and Communications: Information Technology Frontiers for a New Millennium

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As we near the dawn of a new millennium, advances made possible by computing, information, and communications research and development R and D ? once barely...

  9. Computer-integrated design and information management for nuclear projects

    International Nuclear Information System (INIS)

    Gonzalez, A.; Martin-Guirado, L.; Nebrera, F.

    1987-01-01

    Over the past seven years, Empresarios Agrupados has been developing a comprehensive, computer-integrated system to perform the majority of the engineering, design, procurement and construction management activities in nuclear, fossil-fired as well as hydro power plant projects. This system, which is already in a production environment, comprises a large number of computer programs and data bases designed using a modular approach. Each software module, dedicated to meeting the needs of a particular design group or project discipline, facilitates the performance of functional tasks characteristic of the power plant engineering process

  10. Numerical simulation of information recovery in quantum computers

    International Nuclear Information System (INIS)

    Salas, P.J.; Sanz, A.L.

    2002-01-01

    Decoherence is the main problem to be solved before quantum computers can be built. To control decoherence, it is possible to use error correction methods, but these methods are themselves noisy quantum computation processes. In this work, we study the ability of Steane's and Shor's fault-tolerant recovering methods, as well as a modification of Steane's ancilla network, to correct errors in qubits. We test a way to measure correctly ancilla's fidelity for these methods, and state the possibility of carrying out an effective error correction through a noisy quantum channel, even using noisy error correction methods

  11. International Conference on Emerging Technologies for Information Systems, Computing, and Management

    CERN Document Server

    Ma, Tinghuai; Emerging Technologies for Information Systems, Computing, and Management

    2013-01-01

    This book aims to examine innovation in the fields of information technology, software engineering, industrial engineering, management engineering. Topics covered in this publication include; Information System Security, Privacy, Quality Assurance, High-Performance Computing and Information System Management and Integration. The book presents papers from The Second International Conference for Emerging Technologies Information Systems, Computing, and Management (ICM2012) which was held on December 1 to 2, 2012 in Hangzhou, China.

  12. Developing Oral and Written Communication Skills in Undergraduate Computer Science and Information Systems Curriculum

    Science.gov (United States)

    Kortsarts, Yana; Fischbach, Adam; Rufinus, Jeff; Utell, Janine M.; Yoon, Suk-Chung

    2010-01-01

    Developing and applying oral and written communication skills in the undergraduate computer science and computer information systems curriculum--one of the ABET accreditation requirements - is a very challenging and, at the same time, a rewarding task that provides various opportunities to enrich the undergraduate computer science and computer…

  13. Gender Differences in Attitudes toward Computers and Performance in the Accounting Information Systems Class

    Science.gov (United States)

    Lenard, Mary Jane; Wessels, Susan; Khanlarian, Cindi

    2010-01-01

    Using a model developed by Young (2000), this paper explores the relationship between performance in the Accounting Information Systems course, self-assessed computer skills, and attitudes toward computers. Results show that after taking the AIS course, students experience a change in perception about their use of computers. Females'…

  14. Recruiting Women into Computer Science and Information Systems

    Science.gov (United States)

    Broad, Steven; McGee, Meredith

    2014-01-01

    While many technical disciplines have reached or are moving toward gender parity in the number of bachelors degrees in those fields, the percentage of women graduating in computer science remains stubbornly low. Many recent efforts to address this situation have focused on retention of undergraduate majors or graduate students, recruiting…

  15. 11 CFR 9003.6 - Production of computer information.

    Science.gov (United States)

    2010-01-01

    ... disbursements; (2) Receipts by and disbursements from a legal and accounting compliance fund under 11 CFR 9003.3... legal and accounting services, including the allocation of payroll and overhead expenditures; (4... explaining the computer system's software capabilities, such as user guides, technical manuals, formats...

  16. Computer graphics as an information means for power plants

    International Nuclear Information System (INIS)

    Kollmannsberger, J.; Pfadler, H.

    1990-01-01

    Computer-aided graphics have proved increasingly successful as a help in process control in large plants. The specific requirements for the system and the methods of planning and achieving graphic systems in powerstation control rooms are described. Experience from operation is evaluated from completed plants. (orig.) [de

  17. Formal and Information Learning in a Computer Clubhouse Environment

    Science.gov (United States)

    McDougall, Anne; Lowe, Jenny; Hopkins, Josie

    2004-01-01

    This paper outlines the establishment and running of an after-school Computer Clubhouse, describing aspects of the leadership, mentoring and learning activities undertaken there. Research data has been collected from examination of documents associated with the Clubhouse, interviews with its founders, Director, session leaders and mentors, and…

  18. Computational Psychiatry: towards a mathematically informed understanding of mental illness

    Science.gov (United States)

    Huys, Quentin J M; Roiser, Jonathan P

    2016-01-01

    Computational Psychiatry aims to describe the relationship between the brain's neurobiology, its environment and mental symptoms in computational terms. In so doing, it may improve psychiatric classification and the diagnosis and treatment of mental illness. It can unite many levels of description in a mechanistic and rigorous fashion, while avoiding biological reductionism and artificial categorisation. We describe how computational models of cognition can infer the current state of the environment and weigh up future actions, and how these models provide new perspectives on two example disorders, depression and schizophrenia. Reinforcement learning describes how the brain can choose and value courses of actions according to their long-term future value. Some depressive symptoms may result from aberrant valuations, which could arise from prior beliefs about the loss of agency (‘helplessness’), or from an inability to inhibit the mental exploration of aversive events. Predictive coding explains how the brain might perform Bayesian inference about the state of its environment by combining sensory data with prior beliefs, each weighted according to their certainty (or precision). Several cortical abnormalities in schizophrenia might reduce precision at higher levels of the inferential hierarchy, biasing inference towards sensory data and away from prior beliefs. We discuss whether striatal hyperdopaminergia might have an adaptive function in this context, and also how reinforcement learning and incentive salience models may shed light on the disorder. Finally, we review some of Computational Psychiatry's applications to neurological disorders, such as Parkinson's disease, and some pitfalls to avoid when applying its methods. PMID:26157034

  19. Quo vadis? : persuasive computing using real time queue information

    NARCIS (Netherlands)

    Meys, Wouter; Groen, Maarten

    2014-01-01

    By presenting tourists with real-time information an increase in efficiency and satisfaction of their day planning can be achieved. At the same time, real-time information services can offer the municipality the opportunity to spread the tourists throughout the city centre. An important factor for

  20. Soil biological shield exposed to high energy neutrons; Zemlja kao bioloski stit od neutrona visokih energija

    Energy Technology Data Exchange (ETDEWEB)

    Simovic, R; Marinkovic, N [Institute of nuclear sciences Vinca, Belgrade (Yugoslavia)

    1993-04-15

    Shielding efficiency of soil biological shield exposed to high energy neutrons was investigated. Dose rate equivalents for neutrons, secondary gamma and gamma radiation were computed on the surface of soil slabs having different thicknesses. Yields of primary and secondary nuclear radiation in the total dose were evaluated. Influence of the incident neutron spectrum, water content and chemical composition of the material on its shielding efficiency was examined. It was found that the soil density and the water content determine the quality of biological shield, the influence of other factors being less important. Comparison of shielding efficiencies for soil with sand, brick and ordinary concrete shields was done.

  1. Visualization of hierarchically structured information for human-computer interaction

    Energy Technology Data Exchange (ETDEWEB)

    Cheon, Suh Hyun; Lee, J. K.; Choi, I. K.; Kye, S. C.; Lee, N. K. [Dongguk University, Seoul (Korea)

    2001-11-01

    Visualization techniques can be used to support operator's information navigation tasks on the system especially consisting of an enormous volume of information, such as operating information display system and computerized operating procedure system in advanced control room of nuclear power plants. By offering an easy understanding environment of hierarchically structured information, these techniques can reduce the operator's supplementary navigation task load. As a result of that, operators can pay more attention on the primary tasks and ultimately improve the cognitive task performance. In this report, an interface was designed and implemented using hyperbolic visualization technique, which is expected to be applied as a means of optimizing operator's information navigation tasks. 15 refs., 19 figs., 32 tabs. (Author)

  2. 3rd ACIS International Conference on Applied Computing and Information Technology

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 3nd International Conference on Applied Computing and Information Technology (ACIT 2015) which was held on July 12-16, 2015 in Okayama, Japan. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  3. 4th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2016-01-01

    This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.

  4. Neutron shielding material

    International Nuclear Information System (INIS)

    Nodaka, M.; Iida, T.; Taniuchi, H.; Yosimura, K.; Nagahama, H.

    1993-01-01

    From among the neutron shielding materials of the 'kobesh' series developed by Kobe Steel, Ltd. for transport and storage packagings, silicon rubber base type material has been tested for several items with a view to practical application and official authorization, and in order to determine its adaptability to actual vessels. Silicon rubber base type 'kobesh SR-T01' is a material in which, from among the silicone rubber based neutron shielding materials, the hydrogen content is highest and the boron content is most optimized. Its neutron shielding capability has been already described in the previous report (Taniuchi, 1986). The following tests were carried out to determine suitability for practical application; 1) Long-term thermal stability test 2) Pouring test on an actual-scale model 3) Fire test The experimental results showed that the silicone rubber based neutron shielding material has good neutron shielding capability and high long-term fire resistance, and that it can be applied to the advanced transport packaging. (author)

  5. Method for dismantling shields

    International Nuclear Information System (INIS)

    Fukuzawa, Rokuro; Kondo, Nobuhiro; Kamiyama, Yoshinori; Kawasato, Ken; Hiraga, Tomoaki.

    1990-01-01

    The object of the present invention is to enable operators to dismantle shieldings contaminated by radioactivity easily and in a short period of time without danger of radiation exposure. A plurality of introduction pipes are embedded previously to the shielding walls of shielding members which contain a reactor core in a state where both ends of the introduction pipes are in communication with the outside. A wire saw is inserted into the introduction pipes to cut the shieldings upon dismantling. Then, shieldings can be dismantled easily in a short period of time with no radiation exposure to operator's. Further, according to the present invention, since the wire saw can be set easily and a large area can be cut at once, operation efficiency is improved. Further, since remote control is possible, cutting can be conducted in water and complicated places of the reactor. Biting upon starting the wire saw in the introduction pipe is reduced to facilitate startup for the rotation. (I.S.)

  6. Mechanical shielded hot cell

    International Nuclear Information System (INIS)

    Higgy, H.R.; Abdel-Rassoul, A.A.

    1983-01-01

    A plan to erect a mechanical shielded hot cell in the process hall of the Radiochemical Laboratory at Inchas is described. The hot cell is designed for safe handling of spent fuel bundles, from the Inchas reactor, and for dismantling and cutting the fuel rods in preparation for subsequent treatment. The biological shielding allows for the safe handling of a total radioactivity level up to 10,000 MeV-Ci. The hot cell consists of an α-tight stainless-steel box, connected to a γ-shielded SAS, through an air-lock containing a movable carriage. The α-box is tightly connected with six dry-storage cavities for adequate storage of the spent fuel bundles. Both the α-box, with the dry-storage cavities, and the SAS are surrounded by 200-mm thick biological lead shielding. The α-box is equipped with two master-slave manipulators, a lead-glass window, a monorail crane and Padirac and Minirag systems. The SAS is equipped with a lead-glass window, tong manipulator, a shielded pit and a mechanism for the entry of the spent fuel bundle. The hot cell is served by adequate ventilation and monitoring systems. (author)

  7. A Computational Model and Multi-Agent Simulation for Information Assurance

    Science.gov (United States)

    2002-06-01

    Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an

  8. Group Awareness and Self-Presentation in Computer-Supported Information Exchange

    Science.gov (United States)

    Kimmerle, Joachim; Cress, Ulrike

    2008-01-01

    A common challenge in many situations of computer-supported collaborative learning is increasing the willingness of those involved to share their knowledge with other group members. As a prototypical situation of computer-supported information exchange, a shared-database setting was chosen for the current study. This information-exchange situation…

  9. 78 FR 61870 - Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2013-10-04

    ... Committee for Computer and Information Science and Engineering (1115). Date/Time: Oct 31, 2013: 12:30 p.m... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting In accordance with Federal Advisory Committee Act (Pub. L. 92-463, as amended...

  10. 78 FR 79014 - Advisory Committee for Computer and Information Science and Engineering Notice of Meeting

    Science.gov (United States)

    2013-12-27

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and...), the National Science Foundation announces the following meeting: NAME: Advisory Committee for Computer and Information Science and Engineering (1115) DATE/TIME: January 14, 2014, 3:00 p.m. to 5:00 p.m...

  11. 78 FR 64255 - Advisory Committee for Computer and Information Science and Engineering; Cancellation of Meeting

    Science.gov (United States)

    2013-10-28

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and... National Science Foundation is issuing this notice to cancel the October 31 to November 1, 2013 Advisory Committee for Computer and Information Science and Engineering meeting. The public notice for this committee...

  12. 77 FR 24538 - Advisory Committee for Computer and Information Science And Engineering; Notice of Meeting

    Science.gov (United States)

    2012-04-24

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science And... amended), the National Science Foundation announces the following meeting: Name: Advisory Committee for Computer and Information Science and Engineering (1115). Date and Time: May 10, 2012 12 p.m.-5:30 p.m., May...

  13. 75 FR 19428 - Advisory Committee for Computer and Information Science and Engineering; Notice of Meeting

    Science.gov (United States)

    2010-04-14

    ... NATIONAL SCIENCE FOUNDATION Advisory Committee for Computer and Information Science and... amended), the National Science Foundation announces the following meeting: Name: Advisory Committee for Computer and Information Science and Engineering--(1115). Date and Time: May 7, 2010, 8:30 a.m.-5 p.m...

  14. Towards a strategy for the introduction of information and computer literacy (ICL) courses

    NARCIS (Netherlands)

    Plomp, T.; Carleer, G.J.

    1987-01-01

    An important goal of the national policy on computers in education in the Netherlands is the familiarization of all citizens with information technology. This policy was a plea for some basic education in information and computer literacy. In the beginning of the implementation of this basic

  15. The Usage of informal computer based communication in the context of organization’s technological resources

    OpenAIRE

    Raišienė, Agota Giedrė; Jonušauskas, Steponas

    2011-01-01

    Purpose of the article is theoretically and practically analyze the features of informal computer based communication in the context of organization's technological resources. Methodology - meta analysis, survey and descriptive analysis. According to scientists, the functions of informal communication cover sharing of work related information, coordination of team activities, spread of organizational culture and feeling of interdependence and affinity. Also, informal communication widens the ...

  16. SHREDI a removal diffusion shielding code for x-y and r-z geometries

    International Nuclear Information System (INIS)

    Daneri, A.; Toselli, G.

    1974-01-01

    The SHREDI, a removal diffusion neutron shielding code written in FORTRAN for IBM 370/165, is presented. The code computes neutron fluxes or adjoint fluxes and activations in bidimensional sections of the shield. It is also possible to consider shielding points with the same coordinate (y or z) (monodimensional problems)

  17. A Neural Information Field Approach to Computational Cognition

    Science.gov (United States)

    2016-11-18

    effects of distraction during list memory . These distractions include short and long delays before recall, and continuous distraction (forced rehearsal... memory encoding and replay in hippocampus. Computational Neuroscience Society (CNS), p. 166, 2014. D. A. Pinotsis, Neural Field Coding of Short Term ...performance of children learning to count in a SPA model; proposed a new SPA model of cognitive load using the N-back task; developed a new model of the

  18. Computer-Mediated Communication: Decisionmaking and Informal Interaction.

    Science.gov (United States)

    1985-02-15

    the context of a project called the Computer-Administered Panel Study L (CAPS). Respondents in the project were 96 UNC undergraduate students . The...project consisted of the administration of over 100 questionnaires and experimental units to this panel of undergraduates who reported to weekly sessions...humanely (eg., are more likely to ignore or insult) via the more distant media. Audio-only communications are more likely to be depersonalized

  19. Shield support frame. Schildausbaugestell

    Energy Technology Data Exchange (ETDEWEB)

    Plaga, K.

    1981-09-17

    A powered shield support frame for coal sheds is described comprising of two bottom sliding shoes, a large area gob shield and a larg area roof assembly, all joined movable together. The sliding shoes and the gob shield are joined by a lemniscate guide. Two hydraulic props are arranged at the face-side at one third of the length of the sliding shoes and at the goaf-side at one third of the length of the roof assembly. A nearly horizontal lying pushing prop unit joins the bottom wall sliding shoes to the goaf-side lemniscate guide. This assembly can be applied to seams with a thickness down to 45 cm. (OGR).

  20. Radiation shielding material

    International Nuclear Information System (INIS)

    Matsumoto, Akio; Isobe, Eiji.

    1976-01-01

    Purpose: To increase the shielding capacity of the radiation shielding material having an abundant flexibility. Constitution: A mat consisting of a lead or lead alloy fibrous material is covered with a cloth, and the two are made integral by sewing in a kilted fashion by using a yarn. Thereafter, the system is covered with a gas-tight film or sheet. The shielding material obtained in this way has, in addition to the above merits, advantages in that (1) it is free from restoration due to elasticity so that it can readily seal contaminants, (2) it can be used in a state consisting of a number of overlapped layers, (3) it fits the shoulder well and is readily portable and (4) it permits attachment of fasteners or the like. (Ikeda, J.)

  1. Hybrid Magnetic Shielding

    Science.gov (United States)

    Royal, Kevin; Crawford, Christopher; Mullins, Andrew; Porter, Greg; Blanton, Hunter; Johnstone, Connor; Kistler, Ben; Olivera, Daniela

    2017-09-01

    The search for the electric dipole moment of the neutron requires the ambient magnetic field to be on the pT scale which is accomplished with large magnetic shielding rooms. These rooms are fitted with large mu-metal sheets to allow for passive cancellation of background magnetic fields. Active shielding technology cannot uniformly cancel background magnetic fields. These issues can be remedied by combining the methods into a hybrid system. The design used is composed of panels that have an active layer of cancellation between two sheets of mu-metal. The panels form a cube and draw in magnetic fields perpendicular to the surface which can then be reduced using active shielding. This work is supported by the Department of Energy under Contract DE-SC0008107.

  2. Reactor head shielding apparatus

    International Nuclear Information System (INIS)

    Schukei, G.E.; Roebelen, G.J.

    1992-01-01

    This patent describes a nuclear reactor head shielding apparatus for mounting on spaced reactor head lifting members radially inwardly of the head bolts. It comprises a frame of sections for mounting on the lifting members and extending around the top central area of the head, mounting means for so mounting the frame sections, including downwardly projecting members on the frame sections and complementary upwardly open recessed members for fastening to the lifting members for receiving the downwardly projecting members when the frame sections are lowered thereto with lead shielding supported thereby on means for hanging lead shielding on the frame to minimize radiation exposure or personnel working with the head bolts or in the vicinity thereof

  3. Information Sharing for Computing Trust Metrics on COTS Electronic Components

    National Research Council Canada - National Science Library

    McMillon, William J

    2008-01-01

    .... It is challenging for the DoD to determine whether and how much to trust in COTS components, given uncertainty and incomplete information about the developers and suppliers of COTS components as well...

  4. Information as Object of Computer Science in Maritime Transport

    Directory of Open Access Journals (Sweden)

    Utureanu Simona

    2017-01-01

    The use of Information Technology infrastructures and the Internet, in addition to economic, social and political benefits, may also lead to tensions. The issue of cyber security can be addressed by promoting international maritime cyber security interests in international alliances.

  5. Double-layer neutron shield design as neutron shielding application

    Science.gov (United States)

    Sariyer, Demet; Küçer, Rahmi

    2018-02-01

    The shield design in particle accelerators and other high energy facilities are mainly connected to the high-energy neutrons. The deep penetration of neutrons through massive shield has become a very serious problem. For shielding to be efficient, most of these neutrons should be confined to the shielding volume. If the interior space will become limited, the sufficient thickness of multilayer shield must be used. Concrete and iron are widely used as a multilayer shield material. Two layers shield material was selected to guarantee radiation safety outside of the shield against neutrons generated in the interaction of the different proton energies. One of them was one meter of concrete, the other was iron-contained material (FeB, Fe2B and stainless-steel) to be determined shield thicknesses. FLUKA Monte Carlo code was used for shield design geometry and required neutron dose distributions. The resulting two layered shields are shown better performance than single used concrete, thus the shield design could leave more space in the interior shielded areas.

  6. Shielding research in France

    Energy Technology Data Exchange (ETDEWEB)

    Lafore, P

    1964-10-01

    Shielding research as an independent subject in France dates from 1956. The importance of these studies has been reflected in the contribution which they have made to power reactor design and in the resultant savings in expenditure for civil engineering and machinery for the removal of mobile shields. The Reactor Shielding Research Division numbers approximately 60 persons and uses several experimental facilities. These include: NAIADE I, installed near the ZOE reactor and operating with a natural uranium slab 2 cm thick (an effective diameter of 60 cm is the one most commonly used); the TRITON pool-type reactor, mainly used in shielding studies, includes an active-water loop, by means of which the secondary shields required for light-water reactors can be studied; core, NEREIDE, which is situated near a 2 m x 2 m aluminium window enables a large neutron source to be placed in a compartment without water in which large-scale mock-ups can be mounted for the study, in particular, of neutron diffusion in large cavities, and of reactor shielding of greater thickness than that in NAIADE I; SAMES 600 keV accelerator is used for monoenergetic neutron studies. Instrumentation studies are an important part of the work, mainly in the measurement of fast neutrons and their spectra by activation detectors. Of late, attention has been directed towards the use of (n, n') (rhodium) reactions and of heavy detectors for low-flux measurements. The simultaneous use of a large number of detectors poses automation problems. With our installation we can count 16 detectors simultaneously. Neutron spectrum studies are conducted with nuclear emulsions and a lithium-6 semiconductor spectrometer. As to the materials used, the research carried out in France involves chiefly graphite, iron and concrete at various temperatures up to 800 deg C. Different compounds, borated and non-borated and of densities up to between 1 and 9 are under consideration. Problems connected with applications are

  7. Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013), v.1

    CERN Document Server

    Kumar, Ashok; Annamalai, Annamalai

    2013-01-01

      This book is the proceedings of Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013) that was held in Konya, Turkey, on June 7-9. CCSEIT-2013 provided an excellent international forum for sharing knowledge and results in theory, methodology and applications of computational science, engineering and information technology. This book contains research results, projects, survey work and industrial experiences representing significant advances in the field. The different contributions collected in this book cover five main areas: algorithms, data structures and applications;  wireless and mobile networks; computer networks and communications; natural language processing and information theory; cryptography and information security.  

  8. First Wall, Blanket, Shield Engineering Technology Program

    International Nuclear Information System (INIS)

    Nygren, R.E.

    1982-01-01

    The First Wall/Blanket/Shield Engineering Technology Program sponsored by the Office of Fusion Energy of DOE has the overall objective of providing engineering data that will define performance parameters for nuclear systems in advanced fusion reactors. The program comprises testing and the development of computational tools in four areas: (1) thermomechanical and thermal-hydraulic performance of first-wall component facsimiles with emphasis on surface heat loads; (2) thermomechanical and thermal-hydraulic performance of blanket and shield component facsimiles with emphasis on bulk heating; (3) electromagnetic effects in first wall, blanket, and shield component facsimiles with emphasis on transient field penetration and eddy-current effects; (4) assembly, maintenance and repair with emphasis on remote-handling techniques. This paper will focus on elements 2 and 4 above and, in keeping with the conference participation from both fusion and fission programs, will emphasize potential interfaces between fusion technology and experience in the fission industry

  9. Calculated shielding factors for selected European houses

    International Nuclear Information System (INIS)

    Hedemann Jensen, P.

    1984-12-01

    Shielding factors for gamma radiation from activity deposited on structures and ground surfaces have been calculated with the computer model DEPSHIELD for single-family and multi-storey buildings in France, United Kingdom and Denmark. For all three countries it was found that the shielding factors for single-family houses are approximately a factor of 2 - 10 higher that those for buildings with five or more storeys. Away from doors and windows the shielding factors for French, British, and Danish single-family houses are in the range 0.03 - 0.1, 0.06 - 0.4, and 0.07 - 0.3, respectively. The uncertainties of the calculations are discussed and DEPSHIELD-results are compared with other methods as well as with experimental results. (author)

  10. Radiation shielding bricks

    International Nuclear Information System (INIS)

    Crowe, G.J.W.

    1983-01-01

    A radiation shielding brick for use in building dry walls to form radiation proof enclosures and other structures is described. It is square in shape and comprises a sandwich of an inner layer of lead or similar shielding material between outer layers of plastics material, for structural stability. The ability to mechanically interlock adjacent bricks is provided by shaping the edges as cooperating external and internal V-sections. Relatively leak-free joints are ensured by enlarging the width of the inner layer in the edge region. (author)

  11. Shielding design to obtain compact marine reactor

    International Nuclear Information System (INIS)

    Yamaji, Akio; Sako, Kiyoshi

    1994-01-01

    The marine reactors equipped in previously constructed nuclear ships are in need of the secondary shield which is installed outside the containment vessel. Most of the weight and volume of the reactor plants are occupied by this secondary shield. An advanced marine reactor called MRX (Marine Reactor X) has been designed to obtain a more compact and lightweight marine reactor with enhanced safety. The MRX is a new type of marine reactor which is an integral PWR (The steam generator is installed in the pressure vessel.) with adopting a water-filled containment vessel and a new shielding design method of no installation of the secondary shield. As a result, MRX is considerably lighter in weight and more compact in size as compared with the reactors equipped in previously constructed nuclear ships. For instance, the plant weight and volume of the containment vessel of MRX are about 50% and 70% of those of the Nuclear Ship MUTSU, in spite of the power of MRX is 2.8 times as large as the MUTSU's reactor. The shielding design calculation was made using the ANISN, DOT3.5, QAD-CGGP2 and ORIGEN codes. The computational accuracy was confirmed by experimental analyses. (author)

  12. Monte Carlo based radial shield design of typical PWR reactor

    Energy Technology Data Exchange (ETDEWEB)

    Gul, Anas; Khan, Rustam; Qureshi, M. Ayub; Azeem, Muhammad Waqar; Raza, S.A. [Pakistan Institute of Engineering and Applied Sciences, Islamabad (Pakistan). Dept. of Nuclear Engineering; Stummer, Thomas [Technische Univ. Wien (Austria). Atominst.

    2016-11-15

    Neutron and gamma flux and dose equivalent rate distribution are analysed in radial and shields of a typical PWR type reactor based on the Monte Carlo radiation transport computer code MCNP5. The ENDF/B-VI continuous energy cross-section library has been employed for the criticality and shielding analysis. The computed results are in good agreement with the reference results (maximum difference is less than 56 %). It implies that MCNP5 a good tool for accurate prediction of neutron and gamma flux and dose rates in radial shield around the core of PWR type reactors.

  13. Design of platform for removing screws from LCD display shields

    Science.gov (United States)

    Tu, Zimei; Qin, Qin; Dou, Jianfang; Zhu, Dongdong

    2017-11-01

    Removing the screws on the sides of a shield is a necessary process in disassembling a computer LCD display. To solve this issue, a platform has been designed for removing the screws on display shields. This platform uses virtual instrument technology with LabVIEW as the development environment to design the mechanical structure with the technologies of motion control, human-computer interaction and target recognition. This platform removes the screws from the sides of the shield of an LCD display mechanically thus to guarantee follow-up separation and recycle.

  14. Hybrid Active-Passive Radiation Shielding System

    Data.gov (United States)

    National Aeronautics and Space Administration — A radiation shielding system is proposed that integrates active magnetic fields with passive shielding materials. The objective is to increase the shielding...

  15. Radiation protection and shielding standards for the 1980s

    International Nuclear Information System (INIS)

    Trubey, D.K.

    1982-01-01

    The American Nuclear Society (ANS) is a standards-writing organization member of the American National Standards Institute (ANSI). The ANS Standards Committee has a subcommittee denoted ANS-6, Radiation Protection and Shielding, whose charge is to develop standards for radiation protection and shield design, to provide shielding information to other standards-writing groups, and to develop standard reference shielding data and test problems. This paper is a progress report of this subcommittee. Significant progress has been made since the last comprehensive report to the Society

  16. Towards GLUE2 evolution of the computing element information model

    CERN Document Server

    Andreozzi, S; Field, L; Kónya, B

    2008-01-01

    A key advantage of Grid systems is the ability to share heterogeneous resources and services between traditional administrative and organizational domains. This ability enables virtual pools of resources to be created and assigned to groups of users. Resource awareness, the capability of users or user agents to have knowledge about the existence and state of resources, is required in order utilize the resource. This awareness requires a description of the services and resources typically defined via a community-agreed information model. One of the most popular information models, used by a number of Grid infrastructures, is the GLUE Schema, which provides a common language for describing Grid resources. Other approaches exist, however they follow different modeling strategies. The presence of different flavors of information models for Grid resources is a barrier for enabling inter-Grid interoperability. In order to solve this problem, the GLUE Working Group in the context of the Open Grid Forum was started. ...

  17. The Information Science Experiment System - The computer for science experiments in space

    Science.gov (United States)

    Foudriat, Edwin C.; Husson, Charles

    1989-01-01

    The concept of the Information Science Experiment System (ISES), potential experiments, and system requirements are reviewed. The ISES is conceived as a computer resource in space whose aim is to assist computer, earth, and space science experiments, to develop and demonstrate new information processing concepts, and to provide an experiment base for developing new information technology for use in space systems. The discussion covers system hardware and architecture, operating system software, the user interface, and the ground communication link.

  18. Cloud computing: a new business paradigm for biomedical information sharing.

    Science.gov (United States)

    Rosenthal, Arnon; Mork, Peter; Li, Maya Hao; Stanford, Jean; Koester, David; Reynolds, Patti

    2010-04-01

    We examine how the biomedical informatics (BMI) community, especially consortia that share data and applications, can take advantage of a new resource called "cloud computing". Clouds generally offer resources on demand. In most clouds, charges are pay per use, based on large farms of inexpensive, dedicated servers, sometimes supporting parallel computing. Substantial economies of scale potentially yield costs much lower than dedicated laboratory systems or even institutional data centers. Overall, even with conservative assumptions, for applications that are not I/O intensive and do not demand a fully mature environment, the numbers suggested that clouds can sometimes provide major improvements, and should be seriously considered for BMI. Methodologically, it was very advantageous to formulate analyses in terms of component technologies; focusing on these specifics enabled us to bypass the cacophony of alternative definitions (e.g., exactly what does a cloud include) and to analyze alternatives that employ some of the component technologies (e.g., an institution's data center). Relative analyses were another great simplifier. Rather than listing the absolute strengths and weaknesses of cloud-based systems (e.g., for security or data preservation), we focus on the changes from a particular starting point, e.g., individual lab systems. We often find a rough parity (in principle), but one needs to examine individual acquisitions--is a loosely managed lab moving to a well managed cloud, or a tightly managed hospital data center moving to a poorly safeguarded cloud? 2009 Elsevier Inc. All rights reserved.

  19. Radiation dose reduction at a price: the effectiveness of a male gonadal shield during helical CT scans

    International Nuclear Information System (INIS)

    Dauer, Lawrence T; Casciotta, Kevin A; Erdi, Yusuf E; Rothenberg, Lawrence N

    2007-01-01

    It is estimated that 60 million computed tomography (CT) scans were performed during 2006, with approximately 11% of those performed on children age 0–15 years. Various types of gonadal shielding have been evaluated for reducing exposure to the gonads. The purpose of this study was to quantify the radiation dose reduction to the gonads and its effect on image quality when a wrap-around male pediatric gonad shield was used during CT scanning. This information is obtained to assist the attending radiologist in the decision to utilize such male gonadal shields in pediatric imaging practice. The dose reduction to the gonads was measured for both direct radiation and for indirect scattered radiation from the abdomen. A 6 cm 3 ion chamber (Model 10X5-6, Radcal Corporation, Monrovia, CA) was placed on a Humanoid real bone pelvic phantom at a position of the male gonads. When exposure measurements with shielding were made, a 1 mm lead wrap-around gonadal shield was placed around the ion chamber sensitive volume. The use of the shields reduced scatter dose to the gonads by a factor of about 2 with no appreciable loss of image quality. The shields reduced the direct beam dose by a factor of about 35 at the expense of extremely poor CT image quality due to severe streak artifacts. Images in the direct exposure case are not useful due to these severe artifacts and the difficulties in positioning these shields on patients in the scatter exposure case may not be warranted by the small absolute reduction in scatter dose unless it is expected that the patient will be subjected to numerous future CT scans

  20. Radiation dose reduction at a price: the effectiveness of a male gonadal shield during helical CT scans.

    Science.gov (United States)

    Dauer, Lawrence T; Casciotta, Kevin A; Erdi, Yusuf E; Rothenberg, Lawrence N

    2007-03-16

    It is estimated that 60 million computed tomography (CT) scans were performed during 2006, with approximately 11% of those performed on children age 0-15 years. Various types of gonadal shielding have been evaluated for reducing exposure to the gonads. The purpose of this study was to quantify the radiation dose reduction to the gonads and its effect on image quality when a wrap-around male pediatric gonad shield was used during CT scanning. This information is obtained to assist the attending radiologist in the decision to utilize such male gonadal shields in pediatric imaging practice. The dose reduction to the gonads was measured for both direct radiation and for indirect scattered radiation from the abdomen. A 6 cm3 ion chamber (Model 10X5-6, Radcal Corporation, Monrovia, CA) was placed on a Humanoid real bone pelvic phantom at a position of the male gonads. When exposure measurements with shielding were made, a 1 mm lead wrap-around gonadal shield was placed around the ion chamber sensitive volume. The use of the shields reduced scatter dose to the gonads by a factor of about 2 with no appreciable loss of image quality. The shields reduced the direct beam dose by a factor of about 35 at the expense of extremely poor CT image quality due to severe streak artifacts. Images in the direct exposure case are not useful due to these severe artifacts and the difficulties in positioning these shields on patients in the scatter exposure case may not be warranted by the small absolute reduction in scatter dose unless it is expected that the patient will be subjected to numerous future CT scans.

  1. Radiation dose reduction at a price: the effectiveness of a male gonadal shield during helical CT scans

    Directory of Open Access Journals (Sweden)

    Erdi Yusuf E

    2007-03-01

    Full Text Available Abstract Background It is estimated that 60 million computed tomography (CT scans were performed during 2006, with approximately 11% of those performed on children age 0–15 years. Various types of gonadal shielding have been evaluated for reducing exposure to the gonads. The purpose of this study was to quantify the radiation dose reduction to the gonads and its effect on image quality when a wrap-around male pediatric gonad shield was used during CT scanning. This information is obtained to assist the attending radiologist in the decision to utilize such male gonadal shields in pediatric imaging practice. Methods The dose reduction to the gonads was measured for both direct radiation and for indirect scattered radiation from the abdomen. A 6 cm3 ion chamber (Model 10X5-6, Radcal Corporation, Monrovia, CA was placed on a Humanoid real bone pelvic phantom at a position of the male gonads. When exposure measurements with shielding were made, a 1 mm lead wrap-around gonadal shield was placed around the ion chamber sensitive volume. Results The use of the shields reduced scatter dose to the gonads by a factor of about 2 with no appreciable loss of image quality. The shields reduced the direct beam dose by a factor of about 35 at the expense of extremely poor CT image quality due to severe streak artifacts. Conclusion Images in the direct exposure case are not useful due to these severe artifacts and the difficulties in positioning these shields on patients in the scatter exposure case may not be warranted by the small absolute reduction in scatter dose unless it is expected that the patient will be subjected to numerous future CT scans.

  2. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  3. Future directions in shielding methods and analysis

    International Nuclear Information System (INIS)

    Goldstein, H.

    1987-01-01

    Over the nearly half century history of shielding against reactor radiation, there has been a see-saw battle between theory and measurement. During that period the capability and accuracy of calculational methods have been enormously improved. The microscopic cross sections needed as input to the theoretical computations are now also known to adequate accuracy (with certain exceptions). Nonetheless, there remain substantial classes of shielding problems not yet accessible to satisfactory computational methods, particularly where three-dimensional geometries are involved. This paper discusses promising avenues to approach such problems, especially in the light of recent and expected advances in supercomputers. In particular, it seems that Monte Carlo methods should be much more advantageous in the new computer environment than they have been in the past

  4. Learning general phonological rules from distributional information: a computational model.

    Science.gov (United States)

    Calamaro, Shira; Jarosz, Gaja

    2015-04-01

    Phonological rules create alternations in the phonetic realizations of related words. These rules must be learned by infants in order to identify the phonological inventory, the morphological structure, and the lexicon of a language. Recent work proposes a computational model for the learning of one kind of phonological alternation, allophony (Peperkamp, Le Calvez, Nadal, & Dupoux, 2006). This paper extends the model to account for learning of a broader set of phonological alternations and the formalization of these alternations as general rules. In Experiment 1, we apply the original model to new data in Dutch and demonstrate its limitations in learning nonallophonic rules. In Experiment 2, we extend the model to allow it to learn general rules for alternations that apply to a class of segments. In Experiment 3, the model is further extended to allow for generalization by context; we argue that this generalization must be constrained by linguistic principles. Copyright © 2014 Cognitive Science Society, Inc.

  5. Distributed Information and Control system reliability enhancement by fog-computing concept application

    Science.gov (United States)

    Melnik, E. V.; Klimenko, A. B.; Ivanov, D. Ya

    2018-03-01

    The paper focuses on the information and control system reliability issue. Authors of the current paper propose a new complex approach of information and control system reliability enhancement by application of the computing concept elements. The approach proposed consists of a complex of optimization problems to be solved. These problems are: estimation of computational complexity, which can be shifted to the edge of the network and fog-layer, distribution of computations among the data processing elements and distribution of computations among the sensors. The problems as well as some simulated results and discussion are formulated and presented within this paper.

  6. Radiation shielding cloth

    International Nuclear Information System (INIS)

    Ijiri, Yasuo; Fujinuma, Tadashi; Tamura, Shoji.

    1989-01-01

    Radiation shielding cloth having radiation shielding layers comprising a composition of inorganic powder of high specific gravity and rubber are excellentin flexibility and comfortable to put on. However, since they are heavy in the weight, operators are tired upon putting them for a long time. In view of the above, the radiation ray shielding layers are prepared by calendering sheets obtained by preliminary molding of the composition to set the variation of the thickness within a range of +15% to -0% of prescribed thickness. Since the composition of inorganic powder at high specific gravity and rubber used for radiation ray shielding comprises a great amount of inorganic powder at high specific gravity blended therein, it is generally poor in fabricability. Therefor, it is difficult to attain fine control for the sheet thickness by merely molding a composition block at once. Then, the composition is at first preliminarily molded into a sheet-like shape which is somewhat thickener than the final thickness and then finished by calendering, by which the thickness can be reduced in average as compared with conventional products while keeping the prescribed thickness and reducing the weight reduce by so much. (N.H.)

  7. Electrostatic shielding of transformers

    Energy Technology Data Exchange (ETDEWEB)

    De Leon, Francisco

    2017-11-28

    Toroidal transformers are currently used only in low-voltage applications. There is no published experience for toroidal transformer design at distribution-level voltages. Toroidal transformers are provided with electrostatic shielding to make possible high voltage applications and withstand the impulse test.

  8. Penetration portion shielding structure

    International Nuclear Information System (INIS)

    Hayashi, Katsumi; Narita, Hitoshi; Handa, Hiroyuki; Takeuchi, Jun; Tozuka, Fumio.

    1994-01-01

    Openings of a plurality of shieldings for penetration members are aligned to each other, and penetration members are inserted from the openings. Then, the openings of the plurality of shielding members are slightly displaced with each other to make the penetration portions into a helical configuration, so that leakage of radiation is reduced. Upon removal of the members, reverse operation is conducted. When a flowable shielding material is used, the penetration portions are constituted with two plates having previously formed openings and pipes for connecting the openings with each other and a vessel covering the entire of them. After passing the penetration members such as a cable, the relative position of the two plates is changed by twisting, to form a helical configuration which reduces radiation leakage. Since they are bent into the helical configuration, shielding performance is extremely improved compared with a case that radiation leakage is caused from an opening of a straight pipe. In addition, since they can be returned to straight pipes, attachment, detachment and maintenance can be conducted easily. (N.H.)

  9. Radiation shielding glass

    International Nuclear Information System (INIS)

    Kido, Kazuhiro; Ueda, Hajime.

    1997-01-01

    It was found that a glass composition comprising, as essential ingredients, SiO 2 , PbO, Gd 2 O 3 and alkali metal oxides can provide a shielding performance against electromagnetic waves, charged particles and neutrons. The present invention provides radiation shielding glass containing at least from 16 to 46wt% of SiO 2 , from 47 to 75wt% of PbO, from 1 to 10wt% of Gd 2 O 3 , from 0 to 3wt% of Li 2 O, from 0 to 7wt% of Na 2 O, from 0 to 7wt% of K 2 O provided that Li 2 O + Na 2 O + K 2 O is from 1 to 10wt%, B 2 O 3 is from 0 to 10wt%, CeO 2 is from 0 to 3wt%, As 2 O 3 is from 0 to 1wt% and Sb 2 O 3 is from 0 to 1wt%. Since the glass can shield electromagnetic waves, charged particles and neutrons simultaneously, radiation shielding windows can be designed and manufactured at a reduced thickness and by less constitutional numbers in a circumstance where they are present altogether. (T.M.)

  10. Summary of researches being performed in the Institute of Mathematics and Computer Science on computer science and information technologies

    Directory of Open Access Journals (Sweden)

    Artiom Alhazov

    2008-07-01

    Full Text Available Evolution of the informatization notion (which assumes automation of majority of human activities applying computers, computer networks, information technologies towards the notion of {\\it Global Information Society} (GIS challenges the determination of new paradigms of society: automation and intellectualization of production, new level of education and teaching, formation of new styles of work, active participation in decision making, etc. To assure transition to GIS for any society, including that from Republic of Moldova, requires both special training and broad application of progressive technologies and information systems. Methodological aspects concerning impact of GIS creation over the citizen, economic unit, national economy in the aggregate demands a profound study. Without systematic approach to these aspects the GIS creation would have confront great difficulties. Collective of researchers from the Institute of Mathematics and Computer Science (IMCS of Academy of Sciences of Moldova, which work in the field of computer science, constitutes the center of advanced researches and activates in those directions of researches of computer science which facilitate technologies and applications without of which the development of GIS cannot be assured.

  11. Building with electromagnetic shield structure for individual floors

    Energy Technology Data Exchange (ETDEWEB)

    Takahashi, T; Nakamura, M; Yabana, Y; Ishikawa, T; Nagata, K

    1991-09-10

    This invention relates to a building having a floor-by-floor electromagnetic shield structure well-suited for application to an information network system in which an electromagnetically shielded space is divided by individual floors and electric waves are utilized within the building on a floor-by-floor basis. (author). 8 figs.

  12. Gonad shielding in paediatric pelvic radiography : Disadvantages prevail over benefit

    NARCIS (Netherlands)

    Frantzen, M.J.; Robben, S.; Postma, A.A.; Zoetelief, J.; Wildberger, J.E.; Kemerink, G.J.

    2012-01-01

    Objective To re-evaluate gonad shielding in paediatric pelvic radiography in terms of attainable radiation risk reduction and associated loss of diagnostic information. Methods A study on patient dose and the quality of gonad shielding was performed retrospectively using 500 pelvic radiographs of

  13. Building with electromagnetic shield structure for individual floors

    International Nuclear Information System (INIS)

    Takahashi, T.; Nakamura, M.; Yabana, Y.; Ishikawa, T.; Nagata, K.

    1991-01-01

    This invention relates to a building having a floor-by-floor electromagnetic shield structure well-suited for application to an information network system in which an electromagnetically shielded space is divided by individual floors and electric waves are utilized within the building on a floor-by-floor basis. (author). 8 figs

  14. A computer system for occupational radiation exposure information

    International Nuclear Information System (INIS)

    Hunt, H.W.

    1984-01-01

    A computerized occupational radiation exposure information system has been developed to maintain records for contractors at the U.S. Department of Energy's (DOE) Hanford Site. The system also allows indexing and retrieval of three million documents from microfilm, thus significantly reducing storage needs and costs. The users are linked by display terminals to the data base permitting them instant access to dosemetry and other radiation exposure information. Personnel dosemeter and bioassay results, radiation training, respirator fittings, skin contaminations and other radiation occurrence records are included in the data base. The system yields immediate analysis of radiological exposures for operating management and health physics personnel, thereby releasing personnel to use their time more effectively

  15. Work improvement by computerizing the process of shielding block production

    International Nuclear Information System (INIS)

    Kang, Dong Hyuk; Jeong, Do Hyeong; Kang, Dong Yoon; Jeon, Young Gung; Hwang, Jae Woong

    2013-01-01

    Introducing CR (Computed Radiography) system created a process of printing therapy irradiation images and converting the degree of enlargement. This is to increase job efficiency and contribute to work improvement using a computerized method with home grown software to simplify this process, work efficiency. Microsoft EXCEL (ver. 2007) and VISUAL BASIC (ver. 6.0) have been used to make the software. A window for each shield block was designed to enter patients' treatment information. Distances on the digital images were measured, the measured data were entered to the Excel program to calculate the degree of enlargement, and printouts were produced to manufacture shield blocks. By computerizing the existing method with this program, the degree of enlargement can easily be calculated and patients' treatment information can be entered into the printouts by using macro function. As a result, errors in calculation which may occur during the process of production or errors that the treatment information may be delivered wrongly can be reduced. In addition, with the simplification of the conversion process of the degree of enlargement, no copy machine was needed, which resulted in the reduction of use of paper. Works have been improved by computerizing the process of block production and applying it to practice which would simplify the existing method. This software can apply to and improve the actual conditions of each hospital in various ways using various features of EXCEL and VISUAL BASIC which has already been proven and used widely

  16. Work improvement by computerizing the process of shielding block production

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Dong Hyuk; Jeong, Do Hyeong; Kang, Dong Yoon; Jeon, Young Gung; Hwang, Jae Woong [Proton Therapy Center, National Cancer Center, Goyang (Korea, Republic of)

    2013-09-15

    Introducing CR (Computed Radiography) system created a process of printing therapy irradiation images and converting the degree of enlargement. This is to increase job efficiency and contribute to work improvement using a computerized method with home grown software to simplify this process, work efficiency. Microsoft EXCEL (ver. 2007) and VISUAL BASIC (ver. 6.0) have been used to make the software. A window for each shield block was designed to enter patients' treatment information. Distances on the digital images were measured, the measured data were entered to the Excel program to calculate the degree of enlargement, and printouts were produced to manufacture shield blocks. By computerizing the existing method with this program, the degree of enlargement can easily be calculated and patients' treatment information can be entered into the printouts by using macro function. As a result, errors in calculation which may occur during the process of production or errors that the treatment information may be delivered wrongly can be reduced. In addition, with the simplification of the conversion process of the degree of enlargement, no copy machine was needed, which resulted in the reduction of use of paper. Works have been improved by computerizing the process of block production and applying it to practice which would simplify the existing method. This software can apply to and improve the actual conditions of each hospital in various ways using various features of EXCEL and VISUAL BASIC which has already been proven and used widely.

  17. Evolving spectral transformations for multitemporal information extraction using evolutionary computation

    Science.gov (United States)

    Momm, Henrique; Easson, Greg

    2011-01-01

    Remote sensing plays an important role in assessing temporal changes in land features. The challenge often resides in the conversion of large quantities of raw data into actionable information in a timely and cost-effective fashion. To address this issue, research was undertaken to develop an innovative methodology integrating biologically-inspired algorithms with standard image classification algorithms to improve information extraction from multitemporal imagery. Genetic programming was used as the optimization engine to evolve feature-specific candidate solutions in the form of nonlinear mathematical expressions of the image spectral channels (spectral indices). The temporal generalization capability of the proposed system was evaluated by addressing the task of building rooftop identification from a set of images acquired at different dates in a cross-validation approach. The proposed system generates robust solutions (kappa values > 0.75 for stage 1 and > 0.4 for stage 2) despite the statistical differences between the scenes caused by land use and land cover changes coupled with variable environmental conditions, and the lack of radiometric calibration between images. Based on our results, the use of nonlinear spectral indices enhanced the spectral differences between features improving the clustering capability of standard classifiers and providing an alternative solution for multitemporal information extraction.

  18. INFORM: European survey of computers in intensive care units.

    Science.gov (United States)

    Ambroso, C; Bowes, C; Chambrin, M C; Gilhooly, K; Green, C; Kari, A; Logie, R; Marraro, G; Mereu, M; Rembold, P

    1992-01-01

    The aims of this study were (a) to survey and evaluate the impact of information technology applications in High Dependency Environments (HDEs) on organizational, psychological and cost-effectiveness factors, (b) to contribute information and design requirements to the other workpackages in the INFORM Project, and (c) to develop useful evaluation methodologies. The evaluation methodologies used were: questionnaires, case studies, objective findings (keystroke) and literature search and review. Six questionnaires were devised covering organizational impact, cost-benefit impact and perceived advantages and disadvantages of computerized systems in HDE (psychological impact). The general conclusion was that while existing systems have been generally well received, they are not yet designed in such a developed and integrated way as to yield their full potential. Greater user involvement in design and implementation and more emphasis on training emerged as strong requirements. Lack of reliability leading to parallel charting was a major problem with the existing systems. It proved difficult to assess cost effectiveness due to a lack of detailed accounting costs; however, it appeared that in the short term, computerisation in HDEs tended to increase costs. It is felt that through a better stock control and better decision making, costs may be reduced in the longer run and effectiveness increased; more detailed longitudinal studies appear to be needed on this subject.

  19. Gonad shielding in diagnostic radiology

    International Nuclear Information System (INIS)

    Anon.

    1975-01-01

    The use of gonad shielding is an important radiation protection technique, intended to reduce unnecessary x-ray exposure of the gonads of patients from diagnostic x-ray procedures. The types of gonad shields in use are discussed as are the types of diagnostic examinations that should include gonad shielding. It was found that when properly used, most shields provided substantial gonad dose reductions

  20. Instrumentation for Scientific Computing in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics.

    Science.gov (United States)

    1987-10-01

    include Security Classification) Instrumentation for scientific computing in neural networks, information science, artificial intelligence, and...instrumentation grant to purchase equipment for support of research in neural networks, information science, artificail intellignece , and applied mathematics...in Neural Networks, Information Science, Artificial Intelligence, and Applied Mathematics Contract AFOSR 86-0282 Principal Investigator: Stephen

  1. Dissemination of Information in Developing Countries: The Personal Computer and beyond

    Science.gov (United States)

    Wong, Wai-Man

    2005-01-01

    With the blooming of information in digital format, dissemination of information is becoming a big challenge for developing countries. It is not only due to the limited provision of personal computers--in addition, the technological infrastructure and the ability to access information are also becoming major concerns in developing countries. This…

  2. Second Annual AEC Scientific Computer Information Exhange Meeting. Proceedings of the technical program theme: computer graphics

    Energy Technology Data Exchange (ETDEWEB)

    Peskin,A.M.; Shimamoto, Y.

    1974-01-01

    The topic of computer graphics serves well to illustrate that AEC affiliated scientific computing installations are well represented in the forefront of computing science activities. The participant response to the technical program was overwhelming--both in number of contributions and quality of the work described. Session I, entitled Advanced Systems, contains presentations describing systems that contain features not generally found in graphics facilities. These features can be roughly classified as extensions of standard two-dimensional monochromatic imaging to higher dimensions including color and time as well as multidimensional metrics. Session II presents seven diverse applications ranging from high energy physics to medicine. Session III describes a number of important developments in establishing facilities, techniques and enhancements in the computer graphics area. Although an attempt was made to schedule as many of these worthwhile presentations as possible, it appeared impossible to do so given the scheduling constraints of the meeting. A number of prospective presenters 'came to the rescue' by graciously withdrawing from the sessions. Some of their abstracts have been included in the Proceedings.

  3. Shielding experiments for accelerator facilities

    Energy Technology Data Exchange (ETDEWEB)

    Nakashima, Hiroshi; Tanaka, Susumu; Sakamoto, Yukio [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment] [and others

    2000-06-01

    A series of shielding experiments was carried out by using AVF cyclotron accelerator of TIARA at JAERI in order to validate shielding design methods for accelerator facilities in intermediate energy region. In this paper neutron transmission experiment through thick shields and radiation streaming experiment through a labyrinth are reported. (author)

  4. Shielding experiments for accelerator facilities

    International Nuclear Information System (INIS)

    Nakashima, Hiroshi; Tanaka, Susumu; Sakamoto, Yukio

    2000-01-01

    A series of shielding experiments was carried out by using AVF cyclotron accelerator of TIARA at JAERI in order to validate shielding design methods for accelerator facilities in intermediate energy region. In this paper neutron transmission experiment through thick shields and radiation streaming experiment through a labyrinth are reported. (author)

  5. Volunteered Geographic Information: Interpretation, Visualisation and Social Computing (VGIscience)

    Science.gov (United States)

    Burghardt, Dirk; Nejdl, Wolfgang; Schiewe, Jochen; Sester, Monika

    2018-05-01

    In the past years Volunteered Geographic Information (VGI) has emerged as a novel form of user-generated content, which involves active generation of geo-data for example in citizen science projects or during crisis mapping as well as the passive collection of data via the user's location-enabled mobile devices. In addition there are more and more sensors available that detect our environment with ever greater detail and dynamics. These data can be used for a variety of applications, not only for the solution of societal tasks such as in environment, health or transport fields, but also for the development of commercial products and services. The interpretation, visualisation and usage of such multi-source data is challenging because of the large heterogeneity, the differences in quality, the high update frequencies, the varying spatial-temporal resolution, subjective characteristics and low semantic structuring. Therefore the German Research Foundation has launched a priority programme for the next 3-6 years which will support interdisciplinary research projects. This priority programme aims to provide a scientific basis for raising the potential of VGI- and sensor data. Research questions described more in detail in this short paper span from the extraction of spatial information, to the visual analysis and knowledge presentation, taking into account the social context while collecting and using VGI.

  6. WASTE HANDLING BUILDING SHIELD WALL ANALYSIS

    International Nuclear Information System (INIS)

    Padula, D.

    2000-01-01

    The scope of this analysis is to estimate the shielding wall, ceiling or equivalent door thicknesses that will be required in the Waste Handling Building to maintain the radiation doses to personnel within acceptable limits. The shielding thickness calculated is the minimum required to meet administrative limits, and not necessarily what will be recommended for the final design. The preliminary evaluations will identify the areas which have the greatest impact on mechanical and facility design concepts. The objective is to provide the design teams with the necessary information to assure an efficient and effective design

  7. Shielding Design and Radiation Shielding Evaluation for LSDS System Facility

    International Nuclear Information System (INIS)

    Kim, Younggook; Kim, Jeongdong; Lee, Yongdeok

    2015-01-01

    As the system characteristics, the target in the spectrometer emits approximately 1012 neutrons/s. To efficiently shield the neutron, the shielding door designs are proposed for the LSDS system through a comparison of the direct shield and maze designs. Hence, to guarantee the radiation safety for the facility, the door design is a compulsory course of the development of the LSDS system. To improve the shielding rates, 250x250 covering structure was added as a subsidiary around the spectrometer. In this study, the evaluations of the suggested shielding designs were conducted using MCNP code. The suggested door design and covering structures can shield the neutron efficiently, thus all evaluations of all conditions are satisfied within the public dose limits. From the Monte Carlo code simulation, Resin(Indoor type) and Tungsten(Outdoor type) were selected as the shielding door materials. From a comparative evaluation of the door thickness, In and Out door thickness was selected 50 cm

  8. Development of shielding design analysis system

    International Nuclear Information System (INIS)

    Tada, Keiko; Shiraki, Takako

    2001-03-01

    The aim of this work is to develop insufficient auxiliary routines which manage input and output data and interface the main codes and to establish a shielding design analysis system on work stations (SUN, DEC). In shielding design analyses, one- and two- dimensional (1-D and 2-D) transport Sn codes are used mainly with some auxiliary codes which generate input data of Sn calculation and edit Sn calculation outputs. The main transport calculation codes can be obtained from the Code Center of RIST (Research Organization for Information Science and Technology). In this work, peripheral codes are developed to generate cross sections, produce Sn quadrature sets, edit calculation outputs or draw contour figures. In shielding calculations around a reactor, the boot-strapping technique is often employed to treat a large area extending from the core to the biological shield to improve the calculation accuracy. When a three-dimensional (3-D) calculation for a complex geometry with shielding defects, 2-D and 3-D coupling calculation is employed frequently. To use this coupling method conversion cods are prepared which read flux file from DORT and prepare an external boundary source file for the 2-D or the 3-D calculation codes. For further conveniences well used data such as the Sn quadrature sets, the dose rate conversion factors, the reaction cross section sets are stored as a data base and code manuals including sample inputs of typical problems are prepared which are comprehensible to beginners. (author)

  9. Radiation shielding and safety design

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yong Ouk; Gil, C. S.; Cho, Y. S.; Kim, D. H.; Kim, H. I.; Kim, J. W.; Lee, C. W.; Kim, K. Y.; Kim, B. H. [KAERI, Daejeon (Korea, Republic of)

    2011-07-15

    A benchmarking for the test facility, evaluations of the prompt radiation fields, evaluation of the induced activities in the facility, and estimation of the radiological impact on the environment were performed in this study. and the radiation safety analysis report for nuclear licensing was written based on this study. In the benchmark calculation, the neutron spectra was measured in the 20 Mev test facility and the measurements were compared with the computational results to verify the calculation system. In the evaluation of the prompt radiation fields, the shielding design for 100 MeV target rooms, evaluations of the leakage doses from the accidents and skyshine analysis were performed. The evaluation of the induced activities were performed for the coolant, inside air, structural materials, soil and ground-water. At last, the radiation safety analysis report was written based on results from these studies

  10. Principal Component Analysis - A Powerful Tool in Computing Marketing Information

    Directory of Open Access Journals (Sweden)

    Constantin C.

    2014-12-01

    Full Text Available This paper is about an instrumental research regarding a powerful multivariate data analysis method which can be used by the researchers in order to obtain valuable information for decision makers that need to solve the marketing problem a company face with. The literature stresses the need to avoid the multicollinearity phenomenon in multivariate analysis and the features of Principal Component Analysis (PCA in reducing the number of variables that could be correlated with each other to a small number of principal components that are uncorrelated. In this respect, the paper presents step-by-step the process of applying the PCA in marketing research when we use a large number of variables that naturally are collinear.

  11. Heavy metal oxide glasses as gamma rays shielding material

    International Nuclear Information System (INIS)

    Kaur, Preet; Singh, Devinder; Singh, Tejbir

    2016-01-01

    The gamma rays shielding parameters for heavy metal oxide glasses and concrete samples are comparable. However, the transparent nature of glasses provides additional feature to visualize inside the shielding material. Hence, different researchers had contributed in computing/measuring different shielding parameters for different configurations of heavy metal oxide glass systems. In the present work, a detailed study on different heavy metal (_5_6Ba, _6_4Gd, _8_2Pb, _8_3Bi) oxide glasses has been presented on the basis of different gamma rays shielding parameters as reported by different researchers in the recent years. It has been observed that among the selected heavy metal oxide glass systems, Bismuth based glasses provide better gamma rays shielding. Hence, Bismuth based glasses can be better substitute to concrete walls at nuclear reactor sites and nuclear labs.

  12. Heavy metal oxide glasses as gamma rays shielding material

    Energy Technology Data Exchange (ETDEWEB)

    Kaur, Preet; Singh, Devinder; Singh, Tejbir, E-mail: dr.tejbir@gmail.com

    2016-10-15

    The gamma rays shielding parameters for heavy metal oxide glasses and concrete samples are comparable. However, the transparent nature of glasses provides additional feature to visualize inside the shielding material. Hence, different researchers had contributed in computing/measuring different shielding parameters for different configurations of heavy metal oxide glass systems. In the present work, a detailed study on different heavy metal ({sub 56}Ba, {sub 64}Gd, {sub 82}Pb, {sub 83}Bi) oxide glasses has been presented on the basis of different gamma rays shielding parameters as reported by different researchers in the recent years. It has been observed that among the selected heavy metal oxide glass systems, Bismuth based glasses provide better gamma rays shielding. Hence, Bismuth based glasses can be better substitute to concrete walls at nuclear reactor sites and nuclear labs.

  13. Neutron shielding for a {sup 252} Cf source

    Energy Technology Data Exchange (ETDEWEB)

    Vega C, H.R.; Manzanares A, E.; Hernandez D, V.M. [Unidades Academicas de Estudios Nucleares e Ingenieria Electrica, Universidad Autonoma de Zacatecas, C. Cipres 10, Fracc. La Penuela, 98068 Zacatecas (Mexico); Eduardo Gallego, Alfredo Lorente [Depto. de Ingenieria Nuclear, ETS Ingenieros Industriales, Universidad Politecnica de Madrid, C. Jose Gutierrez Abascal 2, 28006 Madrid (Spain)]. e-mail: fermineutron@yahoo.com

    2006-07-01

    To determine the neutron shielding features of water-extended polyester a Monte Carlo study was carried out. Materials with low atomic number are predominantly used for neutron shielding because these materials effectively attenuate neutrons, mainly through inelastic collisions and absorption reactions. During the selection of materials to design a neutron shield, prompt gamma production as well as radionuclide production induced by neutron activation must be considered. In this investigation the Monte Carlo method was used to evaluate the performance of a water-extended polyester shield designed for the transportation, storage, and use of a {sup 252}Cf isotopic neutron source. During calculations a detailed model for the {sup 252}Cf and the shield was utilized. To compare the shielding features of water extended polyester, the calculations were also made for the bare {sup 252}Cf in vacuum, air and the shield filled with water. For all cases the calculated neutron spectra was utilized to determine the ambient equivalent neutron dose at four sites around the shielding. In the case of water extended polyester and water shielding the calculations were extended to include the prompt gamma rays produced during neutron interactions, with this information the Kerma in air was calculated at the same locations where the ambient equivalent neutron dose was determined. (Author)

  14. Shielding in ungated field emitter arrays

    Energy Technology Data Exchange (ETDEWEB)

    Harris, J. R. [U.S. Navy Reserve, Navy Operational Support Center New Orleans, New Orleans, Louisiana 70143 (United States); Jensen, K. L. [Code 6854, Naval Research Laboratory, Washington, D.C. 20375 (United States); Shiffler, D. A. [Directed Energy Directorate, Air Force Research Laboratory, Albuquerque, New Mexico 87117 (United States); Petillo, J. J. [Leidos, Billerica, Massachusetts 01821 (United States)

    2015-05-18

    Cathodes consisting of arrays of high aspect ratio field emitters are of great interest as sources of electron beams for vacuum electronic devices. The desire for high currents and current densities drives the cathode designer towards a denser array, but for ungated emitters, denser arrays also lead to increased shielding, in which the field enhancement factor β of each emitter is reduced due to the presence of the other emitters in the array. To facilitate the study of these arrays, we have developed a method for modeling high aspect ratio emitters using tapered dipole line charges. This method can be used to investigate proximity effects from similar emitters an arbitrary distance away and is much less computationally demanding than competing simulation approaches. Here, we introduce this method and use it to study shielding as a function of array geometry. Emitters with aspect ratios of 10{sup 2}–10{sup 4} are modeled, and the shielding-induced reduction in β is considered as a function of tip-to-tip spacing for emitter pairs and for large arrays with triangular and square unit cells. Shielding is found to be negligible when the emitter spacing is greater than the emitter height for the two-emitter array, or about 2.5 times the emitter height in the large arrays, in agreement with previously published results. Because the onset of shielding occurs at virtually the same emitter spacing in the square and triangular arrays, the triangular array is preferred for its higher emitter density at a given emitter spacing. The primary contribution to shielding in large arrays is found to come from emitters within a distance of three times the unit cell spacing for both square and triangular arrays.

  15. Critical Vulnerability: Defending the Decisive Point of United States Computer Networked Information Systems

    National Research Council Canada - National Science Library

    Virden, Roy

    2003-01-01

    .... The military's use of computer networked information systems is thus a critical strength. These systems are then critical vulnerabilities because they may lack adequate protection and are open to enemy attack...

  16. Granular computing and intelligent systems design with information granules of higher order and higher type

    CERN Document Server

    Pedrycz, Witold; Chen, Shyi-Ming

    2011-01-01

    Information granules are conceptual entities that aid the perception of complex phenomena. This book looks at granular computing techniques such as algorithmic pursuits and includes diverse applications and case studies from fields such as power engineering.

  17. FY 1996 Blue Book: High Performance Computing and Communications: Foundations for America`s Information Future

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of...

  18. FY 1997 Blue Book: High Performance Computing and Communications: Advancing the Frontiers of Information Technology

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of...

  19. Information Risks Analysis in the Cloud Computing System on the basis of Intellectual Technologies

    Directory of Open Access Journals (Sweden)

    Alina Yurievna Sentsova

    2013-02-01

    Full Text Available In this article the possibility of the fuzzy cognitive maps application for the purpose of artificial neural network sample data set formation are used for information security risks estimation in cloud computing system.

  20. FY 1994 Blue Book: High Performance Computing and Communications: Toward a National Information Infrastructure

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — government and industry that advanced computer and telecommunications technologies could provide huge benefits throughout the research community and the entire U.S....

  1. Assessing the efficiency of information protection systems in the computer systems and networks

    OpenAIRE

    Nachev, Atanas; Zhelezov, Stanimir

    2015-01-01

    The specific features of the information protection systems in the computer systems and networks require the development of non-trivial methods for their analysis and assessment. Attempts for solutions in this area are given in this paper.

  2. VA INFORMATION SYSTEMS: Computer Security Weaknesses Persist at the Veterans Health Administration

    National Research Council Canada - National Science Library

    2000-01-01

    .... To determine the status of computer security within VHA, we (1) evaluated information system general controls at the VA Maryland Health Cafe System, the New Mexico VA Health Care System, and the VA North Texas Health Care System and (2...

  3. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    The threat to the Defense Information Infrastructure is growing Hackers have advanced in sophistication and the potential exists for an alliance of independent hackers and terrorist/criminal groups...

  4. Methods for calculating radiation attenuation in shields

    Energy Technology Data Exchange (ETDEWEB)

    Butler, J; Bueneman, D; Etemad, A; Lafore, P; Moncassoli, A M; Penkuhn, H; Shindo, M; Stoces, B

    1964-10-01

    In recent years the development of high-speed digital computers of large capacity has revolutionized the field of reactor shield design. For compact special-purpose reactor shields, Monte-Carlo codes in two- and three dimensional geometries are now available for the proper treatment of both the neutron and gamma- ray problems. Furthermore, techniques are being developed for the theoretical optimization of minimum-weight shield configurations for this type of reactor system. In the design of land-based power reactors, on the other hand, there is a strong incentive to reduce the capital cost of the plant, and economic considerations are also relevant to reactors designed for merchant ship propulsion. In this context simple methods are needed which are economic in their data input and computing time requirements and which, at the same time, are sufficiently accurate for design work. In general the computing time required for Monte-Carlo calculations in complex geometry is excessive for routine design calculations and the capacity of the present codes is inadequate for the proper treatment of large reactor shield systems in three dimensions. In these circumstances a wide range of simpler techniques are currently being employed for design calculations. The methods of calculation for neutrons in reactor shields fall naturally into four categories: Multigroup diffusion theory; Multigroup diffusion with removal sources; Transport codes; and Monte Carlo methods. In spite of the numerous Monte- Carlo techniques which are available for penetration and back scattering, serious problems are still encountered in practice with the scattering of gamma rays from walls of buildings which contain critical facilities and also concrete-lined discharge shafts containing irradiated fuel elements. The considerable volume of data in the unclassified literature on the solution of problems of this type in civil defence work appears not to have been evaluated for reactor shield design. In

  5. External dosimetry sources and shielding

    International Nuclear Information System (INIS)

    Calisto, Washington

    1994-01-01

    A definition of external dosimetry r external sources dosimetry,physical and mathematical treatment of the interaction of gamma radiation with a minimal area in that direction. Concept of attenuation coefficient, cumulated effect by polyenergetic sources, exposition rate, units, cumulated dose,shielding, foton shielding, depth calculation, materials used for shielding.Beta shielding, consideration of range and maximum β energy , low stopping radiation by use of low Z shielding. Tables for β energy of β emitters, I (tau) factor, energy-range curves for β emitters in aqueous media, gamma attenuation factors for U, W and Pb. Y factor for bone tissue,muscle and air, build-up factors

  6. Radiation shielding calculation using MCNP

    International Nuclear Information System (INIS)

    Masukawa, Fumihiro

    2001-01-01

    To verify the Monte Carlo code MCNP4A as a tool to generate the reference data in the shielding designs and the safety evaluations, various shielding benchmark experiments were analyzed using this code. These experiments were categorized in three types of the shielding subjects; bulk shielding, streaming, and skyshine. For the variance reduction technique, which is indispensable to get meaningful results with the Monte Carlo shielding calculation, we mainly used the weight window, the energy dependent Russian roulette and spitting. As a whole, our analyses performed enough small statistical errors and showed good agreements with these experiments. (author)

  7. Seamless personal health information system in cloud computing.

    Science.gov (United States)

    Chung, Wan-Young; Fong, Ee May

    2014-01-01

    Noncontact ECG measurement has gained popularity these days due to its noninvasive and conveniences to be applied on daily life. This approach does not require any direct contact between patient's skin and sensor for physiological signal measurement. The noncontact ECG measurement is integrated with mobile healthcare system for health status monitoring. Mobile phone acts as the personal health information system displaying health status and body mass index (BMI) tracking. Besides that, it plays an important role being the medical guidance providing medical knowledge database including symptom checker and health fitness guidance. At the same time, the system also features some unique medical functions that cater to the living demand of the patients or users, including regular medication reminders, alert alarm, medical guidance, appointment scheduling. Lastly, we demonstrate mobile healthcare system with web application for extended uses, thus health data are clouded into web server system and web database storage. This allows remote health status monitoring easily and so forth it promotes a cost effective personal healthcare system.

  8. 3rd International Conference on "Emerging Research in Computing, Information, Communication and Applications"

    CERN Document Server

    Prasad, NH; Nalini, N

    2015-01-01

    This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of  Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers.

  9. Transforming information for computer-aided instruction: using a Socratic Dialogue method to teach gross anatomy.

    Science.gov (United States)

    Constantinou, P; Daane, S; Dev, P

    1994-01-01

    Traditional teaching of anatomy can be a difficult process of rote memorization. Computers allow information presentation to be much more dynamic, and interactive; the same information can be presented in multiple organizations. Using this idea, we have implemented a new pedagogy for computer-assisted instruction in The Anatomy Lesson, an interactive digital teacher which uses a "Socratic Dialogue" metaphor, as well as a textbook-like approach, to facilitate conceptual learning in anatomy.

  10. Analysis of lenses absorbed dose in head CT scan with the use of bismuth shielding

    Energy Technology Data Exchange (ETDEWEB)

    Santos, F.S.; Santana, P.C., E-mail: fernanda.stephaniebh@yahoo.com.br [Universidade Federal de Minas Gerais (UFMG), Belo Horizonte (Brazil); Mourão, A.P. [Centro de Educação Tecnológica de Minas Gerais (CEFET-MG), Belo Horizonte, MG (Brazil)

    2017-07-01

    Computed Tomography (CT) has become an important tool to diagnose cancer and to obtain additional information for different clinical questions. However, CT scan usually requires a higher radiation exposure than a conventional radiography examination. Head CT scans are used for diagnosis of traumatic head injuries, infections and other diseases with instability. Based on this information, it was studied the dose variation deposited in the lenses and in nearby organs, such as: pharynx, hypophysis and salivary gland with and without the use of bismuth shield. In this study a head CT scan was performed on anthropomorphic male phantom using a GE scanner. Dose measurements have been performed by using radiochromic film strips to register the individual doses in the organs of interest. The results show that the lenses had a reduction of 26% of the dose with the use of the bismuth shield. (author)

  11. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    OpenAIRE

    Sun Qiong; Min Liu; Shiming Pang

    2013-01-01

    With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...

  12. Shielding benchmark test

    International Nuclear Information System (INIS)

    Kawai, Masayoshi

    1984-01-01

    Iron data in JENDL-2 have been tested by analyzing shielding benchmark experiments for neutron transmission through iron block performed at KFK using CF-252 neutron source and at ORNL using collimated neutron beam from reactor. The analyses are made by a shielding analysis code system RADHEAT-V4 developed at JAERI. The calculated results are compared with the measured data. As for the KFK experiments, the C/E values are about 1.1. For the ORNL experiments, the calculated values agree with the measured data within an accuracy of 33% for the off-center geometry. The d-t neutron transmission measurements through carbon sphere made at LLNL are also analyzed preliminarily by using the revised JENDL data for fusion neutronics calculation. (author)

  13. Neutron shielding material

    International Nuclear Information System (INIS)

    Suzuki, Shigenori; Iimori, Hiroshi; Kobori, Junzo.

    1980-01-01

    Purpose: To provide a neutron shielding material which incorporates preferable shielding capacity, heat resistance, fire resistance and workability by employing a mixture of thermosetting resin, polyethylene and aluminium hydroxide in special range ratio and curing it. Constitution: A mixture containing 20 to 60% by weight of thermosetting resin having preferable heat resistance, 10 to 40% by weight of polyethylene powder having high hydrogen atom density and 1000 to 60000 of molecular weight, and 15 to 55% by weight of Al(OH) 3 for imparting fire resistance and self-fire extinguishing property thereto is cured. At this time approx. 0.5 to 5% of curing catalyst of the thermosetting resin is contained in 100 parts by weight of the mixture. (Sekiya, K.)

  14. Radiation shielding wall structure

    International Nuclear Information System (INIS)

    Nishimura, Yoshitaka; Oka, Shinji; Kan, Toshihiko; Misato, Takeshi.

    1990-01-01

    A space between a pair of vertical steel plates laterally disposed in parallel at an optional distance has a structure of a plurality of vertically extending tranks partitioned laterally by vertically placed steel plates. Then, cements are grouted to the tranks. Strip-like steel plates each having a thickness greater than the gap between the each of the vertically placed steel plates and the cement are bonded each at the surface for each of the vertically placed steel plates opposing to the cements. A protrusion of a strip width having radiation shielding performance substantially identical with that by the thickness of the cement is disposed in the strip-like steel plates. With such a constitution, a safety radiation shielding wall structure with no worry of radiation intrusion to gaps, if formed, between the steel plates and the grouted cements due to shrinkage of the cements. (I.N.)

  15. Multilayer radiation shield

    Science.gov (United States)

    Urbahn, John Arthur; Laskaris, Evangelos Trifon

    2009-06-16

    A power generation system including: a generator including a rotor including a superconductive rotor coil coupled to a rotatable shaft; a first prime mover drivingly coupled to the rotatable shaft; and a thermal radiation shield, partially surrounding the rotor coil, including at least a first sheet and a second sheet spaced apart from the first sheet by centripetal force produced by the rotatable shaft. A thermal radiation shield for a generator including a rotor including a super-conductive rotor coil including: a first sheet having at least one surface formed from a low emissivity material; and at least one additional sheet having at least one surface formed from a low emissivity material spaced apart from the first sheet by centripetal force produced by the rotatable shaft, wherein each successive sheet is an incrementally greater circumferential arc length and wherein the centripetal force shapes the sheets into a substantially catenary shape.

  16. Light shielding apparatus

    Science.gov (United States)

    Miller, Richard Dean; Thom, Robert Anthony

    2017-10-10

    A light shielding apparatus for blocking light from reaching an electronic device, the light shielding apparatus including left and right support assemblies, a cross member, and an opaque shroud. The support assemblies each include primary support structure, a mounting element for removably connecting the apparatus to the electronic device, and a support member depending from the primary support structure for retaining the apparatus in an upright orientation. The cross member couples the left and right support assemblies together and spaces them apart according to the size and shape of the electronic device. The shroud may be removably and adjustably connectable to the left and right support assemblies and configured to take a cylindrical dome shape so as to form a central space covered from above. The opaque shroud prevents light from entering the central space and contacting sensitive elements of the electronic device.

  17. Multimedia information processing in the SWAN mobile networked computing system

    Science.gov (United States)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  18. Shielding container for radioactive isotopes

    International Nuclear Information System (INIS)

    Sumi, Tetsuo; Tosa, Masayoshi; Hatogai, Tatsuaki.

    1975-01-01

    Object: To effect opening and closing bidirectional radiation used particularly for a gamma densimeter or the like by one operation. Structure: This device comprises a rotatable shielding body for receiving radioactive isotope in the central portion thereof and having at least two radiation openings through which radiation is taken out of the isotope, and a shielding container having openings corresponding to the first mentioned radiation openings, respectively. The radioactive isotope is secured to a rotational shaft of the shielding body, and the shielding body is rotated to register the openings of the shielding container with the openings of the shielding body or to shield the openings, thereby effecting radiation and cut off of gamma ray in the bidirection by one operation. (Kamimura, M.)

  19. Primary shield displacement and bowing

    International Nuclear Information System (INIS)

    Scott, K.V.

    1978-01-01

    The reactor primary shield is constructed of high density concrete and surrounds the reactor core. The inlet, outlet and side primary shields were constructed in-place using 2.54 cm (1 in) thick steel plates as the forms. The plates remained as an integral part of the shields. The elongation of the pressure tubes due to thermal expansion and pressurization is not moving through the inlet nozzle hardware as designed but is accommodated by outward displacement and bowing of the inlet and outlet shields. Excessive distortion of the shields may result in gas seal failures, intolerable helium gas leaks, increased argon-41 emissions, and shield cooling tube failures. The shield surveillance and testing results are presented

  20. Shielding calculations using FLUKA

    International Nuclear Information System (INIS)

    Yamaguchi, Chiri; Tesch, K.; Dinter, H.

    1988-06-01

    The dose equivalent on the surface of concrete shielding has been calculated using the Monte Carlo code FLUKA86 for incident proton energies from 10 to 800 GeV. The results have been compared with some simple equations. The value of the angular dependent parameter in Moyer's equation has been calculated from the locations where the values of the maximum dose equivalent occur. (author)

  1. Shielding calculations for NET

    International Nuclear Information System (INIS)

    Verschuur, K.A.; Hogenbirk, A.

    1991-05-01

    In the European Fusion Technology Programme there is only a small activity on research and development for fusion neutronics. Never-the-less, looking further than blanket design now, as ECN is getting involved in design of radiation shields for the coils and biological shields, it becomes apparent that fusion neutronics as a whole still needs substantial development. Existing exact codes for calculation of complex geometries like MCNP and DORT/TORT are put over the limits of their numerical capabilities, whilst approximate codes for complex geometries like FURNACE and MERCURE4 are put over the limits of their modelling capabilities. The main objective of this study is just to find out how far we can get with existing codes in obtaining reliable values for the radiation levels inside and outside the cryostat/shield during operation and after shut-down. Starting with a 1D torus model for preliminary parametric studies, more dimensional approximation of the torus or parts of it including the main heterogeneities should follow. Regular contacts with the NET-Team are kept, to be aware of main changes in NET design that might affect our calculation models. Work on the contract started 1 July 1990. The technical description of the contract is given. (author). 14 refs.; 4 figs.; 1 tab

  2. Methodology of shielding calculation for nuclear reactors

    International Nuclear Information System (INIS)

    Maiorino, J.R.; Mendonca, A.G.; Otto, A.C.; Yamaguchi, Mitsuo

    1982-01-01

    A methodology of calculation that coupling a serie of computer codes in a net that make the possibility to calculate the radiation, neutron and gamma transport, is described, for deep penetration problems, typical of nuclear reactor shielding. This net of calculation begining with the generation of constant multigroups, for neutrons and gamma, by the AMPX system, coupled to ENDF/B-IV data library, the transport calculation of these radiations by ANISN, DOT 3.5 and Morse computer codes, up to the calculation of absorbed doses and/or equivalents buy SPACETRAN code. As examples of the calculation method, results from benchmark n 0 6 of Shielding Benchmark Problems - ORNL - RSIC - 25, namely Neutron and Secondary Gamma Ray fluence transmitted through a Slab of Borated Polyethylene, are presented. (Author) [pt

  3. Protecting the Accounting Information in the Conditions of Outsourcing with Use of the Information-Computer Technologies

    Directory of Open Access Journals (Sweden)

    Liakhovych Halyna І.

    2017-12-01

    Full Text Available The article is aimed at disclosing measures of protection of accounting information in the conditions of outsourcing, using modern information-computer technologies. On the basis of processing of scientific works, the approaches to development of system of protection of the accounting information were generalized, measures of protection were grouped by users of data with definition of subjects of provision in the conditions of outsourcing. Special attention is paid to the characterization and content of internal organizational measures of protection of accounting information (normative, personnel, structural. The complex of measures on protection of the information of accountance for large and small-size enterprises has been defined. The prospect of further research is the issue of information risk management in accounting outsourcing.

  4. Algorithm-structured computer arrays and networks architectures and processes for images, percepts, models, information

    CERN Document Server

    Uhr, Leonard

    1984-01-01

    Computer Science and Applied Mathematics: Algorithm-Structured Computer Arrays and Networks: Architectures and Processes for Images, Percepts, Models, Information examines the parallel-array, pipeline, and other network multi-computers.This book describes and explores arrays and networks, those built, being designed, or proposed. The problems of developing higher-level languages for systems and designing algorithm, program, data flow, and computer structure are also discussed. This text likewise describes several sequences of successively more general attempts to combine the power of arrays wi

  5. Computer-based control of nuclear power information systems at international level

    International Nuclear Information System (INIS)

    Boniface, Ekechukwu; Okonkwo, Obi

    2011-01-01

    In most highly industrialized countries of the world information plays major role in anti-nuclear campaign. Information and discussions on nuclear power need critical and objective analysis before the structured information presentation to the public to avoid bias anti-nuclear information on one side and neglect of great risk in nuclear power. This research is developing a computer-based information system for the control of nuclear power at international level. The system is to provide easy and fast information highways for the followings: (1) Low Regulatory dose and activity limit as level of high danger for individuals and public. (2) Provision of relevant technical or scientific education among the information carriers in the nuclear power countries. The research is on fact oriented investigation about radioactivity. It also deals with fact oriented education about nuclear accidents and safety. A standard procedure for dissemination of latest findings using technical and scientific experts in nuclear technology is developed. The information highway clearly analyzes the factual information about radiation risk and nuclear energy. Radiation cannot be removed from our environment. The necessity of radiation utilizations defines nuclear energy as two-edge sword. It is therefore, possible to use computer-based information system in projecting and dissemination of expert knowledge about nuclear technology positively and also to use it in directing the public on the safety and control of the nuclear energy. The computer-based information highway for nuclear energy technology is to assist in scientific research and technological development at international level. (author)

  6. 3th IEEE/ACIS International Conference on Computer and Information Science

    CERN Document Server

    2015-01-01

    This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference.  The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference’s most promis...

  7. Comprehensive analysis of shielding effectiveness for HDPE, BPE and concrete as candidate materials for neutron shielding

    International Nuclear Information System (INIS)

    Dhang, Prosenjit; Verma, Rishi; Shyam, Anurag

    2015-01-01

    In the compact accelerator based DD neutron generator, the deuterium ions generated by the ion source are accelerated after the extraction and bombarded to a deuterated titanium target. The emitted neutrons have typical energy of ∼2.45MeV. Utilization of these compact accelerator based neutron generators of yield up to 10 9 neutron/second (DD) is under active consideration in many research laboratories for conducting active neutron interrogation experiments. Requirement of an adequately shielded laboratory is mandatory for the effective and safe utilization of these generators for intended applications. In this reference, we report the comprehensive analysis of shielding effectiveness for High Density Polyethylene (HDPE), Borated Polyethylene (BPE) and Concrete as candidate materials for neutron shielding. In shielding calculations, neutron induced scattering and absorption gamma dose has also been considered along with neutron dose. Contemporarily any material with higher hydrogenous concentration is best suited for neutron shielding. Choice of shielding material is also dominated by practical issues like economic viability and availability of space. Our computational analysis results reveal that utilization of BPE sheets results in minimum wall thickness requirement for attaining similar range of attenuation in neutron and gamma dose. The added advantage of using borated polyethylene is that it reduces the effect of both neutron and gamma dose by absorbing neutron and producing lithium and alpha particle. It has also been realized that for deciding upon optimum thickness determination of any shielding material, three important factors to be necessarily considered are: use factor, occupancy factor and work load factor. (author)

  8. Ford motor company NDE facility shielding design

    International Nuclear Information System (INIS)

    Metzger, R. L.; Van Riper, K. A.; Jones, M. H.

    2005-01-01

    Ford Motor Company proposed the construction of a large non-destructive evaluation laboratory for radiography of automotive power train components. The authors were commissioned to design the shielding and to survey the completed facility for compliance with radiation doses for occupationally and non-occupationally exposed personnel. The two X-ray sources are Varian Linatron 3000 accelerators operating at 9-11 MV. One performs computed tomography of automotive transmissions, while the other does real-time radiography of operating engines and transmissions. The shield thickness for the primary barrier and all secondary barriers were determined by point-kernel techniques. Point-kernel techniques did not work well for skyshine calculations and locations where multiple sources (e.g. tube head leakage and various scatter fields) impacted doses. Shielding for these areas was determined using transport calculations. A number of MCNP [Briesmeister, J. F. MCNPCA general Monte Carlo N-particle transport code version 4B. Los Alamos National Laboratory Manual (1997)] calculations focused on skyshine estimates and the office areas. Measurements on the operational facility confirmed the shielding calculations. (authors)

  9. Ford Motor Company NDE facility shielding design.

    Science.gov (United States)

    Metzger, Robert L; Van Riper, Kenneth A; Jones, Martin H

    2005-01-01

    Ford Motor Company proposed the construction of a large non-destructive evaluation laboratory for radiography of automotive power train components. The authors were commissioned to design the shielding and to survey the completed facility for compliance with radiation doses for occupationally and non-occupationally exposed personnel. The two X-ray sources are Varian Linatron 3000 accelerators operating at 9-11 MV. One performs computed tomography of automotive transmissions, while the other does real-time radiography of operating engines and transmissions. The shield thickness for the primary barrier and all secondary barriers were determined by point-kernel techniques. Point-kernel techniques did not work well for skyshine calculations and locations where multiple sources (e.g. tube head leakage and various scatter fields) impacted doses. Shielding for these areas was determined using transport calculations. A number of MCNP [Briesmeister, J. F. MCNPCA general Monte Carlo N-particle transport code version 4B. Los Alamos National Laboratory Manual (1997)] calculations focused on skyshine estimates and the office areas. Measurements on the operational facility confirmed the shielding calculations.

  10. Comparison of Computer-Based Versus Counselor-Based Occupational Information Systems with Disadvantaged Vocational Students

    Science.gov (United States)

    Maola, Joseph; Kane, Gary

    1976-01-01

    Subjects, who were Occupational Work Experience students, were randomly assigned to individual guidance from either a computerized occupational information system, to a counselor-based information system or to a control group. Results demonstrate a hierarchical learning effect: The computer group learned more than the counseled group, which…

  11. Learners' Perceived Information Overload in Online Learning via Computer-Mediated Communication

    Science.gov (United States)

    Chen, Chun-Ying; Pedersen, Susan; Murphy, Karen L.

    2011-01-01

    Many studies report information overload as one of the main problems that students encounter in online learning via computer-mediated communication. This study aimed to explore the sources of online students' information overload and offer suggestions for increasing students' cognitive resources for learning. Participants were 12 graduate students…

  12. Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination

    Science.gov (United States)

    Foltz, C. Bryan; Renwick, Janet S.

    2011-01-01

    The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…

  13. Design tools for computer-generated display of information to operators

    International Nuclear Information System (INIS)

    O'Brien, J.F.; Cain, D.G.; Sun, B.K.H.

    1985-01-01

    More and more computers are being used to process and display information to operators who control nuclear power plants. Implementation of computer-generated displays in power plant control rooms represents a considerable design challenge for industry designers. Over the last several years, the EPRI has conducted research aimed at providing industry designers tools to meet this new design challenge. These tools provide guidance in defining more 'intelligent' information for plant control and in developing effective displays to communicate this information to the operators. (orig./HP)

  14. Features of the Synthesis of Performance Security Information in Computer Systems

    Directory of Open Access Journals (Sweden)

    V. K. Dzhogan

    2011-12-01

    Full Text Available Synthesis of a scorecard is a gradual process of composition, since the set of elements that reflect the original, systematized their condition, and, through a series of intermediates, linking them in a single bound to the structure ends with one element that reflects the purpose of the system. The hierarchical structure of the system performance of information security in computer systems is a structure with regard to “one to many”. The article reflects the extent of information security tools capabilities influence at the security of information resources of computer systems (from indirect — Class 1, to direct — Class 4.

  15. A contribution to shielding effectiveness analysis of shielded tents

    Directory of Open Access Journals (Sweden)

    Vranić Zoran M.

    2004-01-01

    Full Text Available An analysis of shielding effectiveness (SE of the shielded tents made of the metallised fabrics is given. First, two electromagnetic characteristic fundamental for coupling through electrically thin shield, the skin depth break frequency and the surface resistance or transfer impedance, is defined and analyzed. Then, the transfer function and the SE are analyzed regarding to the frequency range of interest to the Electromagnetic Compatibility (EMC Community.

  16. Application of a dummy eye shield for electron treatment planning

    International Nuclear Information System (INIS)

    Kang, Sei-Kwon; Park, Soah; Hwang, Taejin; Cheong, Kwang-Ho; Han, Taejin; Kim, Haeyoung; Lee, Me-Yeon; Kim, Kyoung Ju; Oh, Do Hoon; Bae, Hoonsik

    2013-01-01

    Metallic eye shields have been widely used for near-eye treatments to protect critical regions, but have never been incorporated into treatment plans because of the unwanted appearance of the metal artifacts on CT images. The purpose of this work was to test the use of an acrylic dummy eye shield as a substitute for a metallic eye shield during CT scans. An acrylic dummy shield of the same size as the tungsten eye shield was machined and CT scanned. The BEAMnrc and the DOSXYZnrc were used for the Monte Carlo (MC) simulation, with the appropriate material information and density for the aluminum cover, steel knob and tungsten body of the eye shield. The Pinnacle adopting the Hogstrom electron pencil-beam algorithm was used for the one-port 6-MeV beam plan after delineation and density override of the metallic parts. The results were confirmed with the metal oxide semiconductor field effect transistor (MOSFET) detectors and the Gafchromic EBT2 film measurements. For both the maximum eyelid dose over the shield and the maximum dose under the shield, the MC results agreed with the EBT2 measurements within 1.7%. For the Pinnacle plan, the maximum dose under the shield agreed with the MC within 0.3%; however, the eyelid dose differed by -19.3%. The adoption of the acrylic dummy eye shield was successful for the treatment plan. However, the Pinnacle pencil-beam algorithm was not sufficient to predict the eyelid dose on the tungsten shield, and more accurate algorithms like MC should be considered for a treatment plan. (author)

  17. Monitoring and Auditing Residual Information on the User’s Computer

    Directory of Open Access Journals (Sweden)

    Vladlena Sergeevna Oladk

    2015-06-01

    Full Text Available This paper considers the problem of violation of information security components such as confidentiality and availability in the event of a computer user's residual information. Analyze the requirements of regulators and mechanisms to be applied in the organization to monitor the residual information or its destruction.Approach to monitoring and auditing residual information on the user's computer, which allows monitoring the residual information in certain areas proposed. Approach allows us to identify the detected information and rank it according to the degree of criticality, as well as calculate the risk of leakage and its potential to develop recommendations aimed at its reduction. The proposed approach is formally described and automated in a software system.

  18. Radiation shielding quality assurance

    Science.gov (United States)

    Um, Dallsun

    For the radiation shielding quality assurance, the validity and reliability of the neutron transport code MCNP, which is now one of the most widely used radiation shielding analysis codes, were checked with lot of benchmark experiments. And also as a practical example, follows were performed in this thesis. One integral neutron transport experiment to measure the effect of neutron streaming in iron and void was performed with Dog-Legged Void Assembly in Knolls Atomic Power Laboratory in 1991. Neutron flux was measured six different places with the methane detectors and a BF-3 detector. The main purpose of the measurements was to provide benchmark against which various neutron transport calculation tools could be compared. Those data were used in verification of Monte Carlo Neutron & Photon Transport Code, MCNP, with the modeling for that. Experimental results and calculation results were compared in both ways, as the total integrated value of neutron fluxes along neutron energy range from 10 KeV to 2 MeV and as the neutron spectrum along with neutron energy range. Both results are well matched with the statistical error +/-20%. MCNP results were also compared with those of TORT, a three dimensional discrete ordinates code which was developed by Oak Ridge National Laboratory. MCNP results are superior to the TORT results at all detector places except one. This means that MCNP is proved as a very powerful tool for the analysis of neutron transport through iron & air and further it could be used as a powerful tool for the radiation shielding analysis. For one application of the analysis of variance (ANOVA) to neutron and gamma transport problems, uncertainties for the calculated values of critical K were evaluated as in the ANOVA on statistical data.

  19. Contaminant deposition building shielding factors for US residential structures

    International Nuclear Information System (INIS)

    Dickson, E D; Hamby, D M; Eckerman, K F

    2015-01-01

    This paper presents validated building shielding factors designed for contemporary US housing-stock under an idealized, yet realistic, exposure scenario from contaminant deposition on the roof and surrounding surfaces. The building shielding factors are intended for use in emergency planning and level three probabilistic risk assessments for a variety of postulated radiological events in which a realistic assessment is necessary to better understand the potential risks for accident mitigation and emergency response planning. Factors are calculated from detailed computational housing-units models using the general-purpose Monte Carlo N-Particle computational code, MCNP5, and are benchmarked from a series of narrow- and broad-beam measurements analyzing the shielding effectiveness of ten common general-purpose construction materials and ten shielding models representing the primary weather barriers (walls and roofs) of likely US housing-stock. Each model was designed to scale based on common residential construction practices and include, to the extent practical, all structurally significant components important for shielding against ionizing radiation. Calculations were performed for floor-specific locations from contaminant deposition on the roof and surrounding ground as well as for computing a weighted-average representative building shielding factor for single- and multi-story detached homes, both with and without basement as well for single-wide manufactured housing-unit. (paper)

  20. Cloud immersion building shielding factors for US residential structures

    International Nuclear Information System (INIS)

    Dickson, E D; Hamby, D M

    2014-01-01

    This paper presents validated building shielding factors designed for contemporary US housing-stock under an idealized, yet realistic, exposure scenario within a semi-infinite cloud of radioactive material. The building shielding factors are intended for use in emergency planning and level three probabilistic risk assessments for a variety of postulated radiological events in which a realistic assessment is necessary to better understand the potential risks for accident mitigation and emergency response planning. Factors are calculated from detailed computational housing-units models using the general-purpose Monte Carlo N-Particle computational code, MCNP5, and are benchmarked from a series of narrow- and broad-beam measurements analyzing the shielding effectiveness of ten common general-purpose construction materials and ten shielding models representing the primary weather barriers (walls and roofs) of likely US housing-stock. Each model was designed to scale based on common residential construction practices and include, to the extent practical, all structurally significant components important for shielding against ionizing radiation. Calculations were performed for floor-specific locations as well as for computing a weighted-average representative building shielding factor for single- and multi-story detached homes, both with and without basement, as well for single-wide manufactured housing-units. (paper)

  1. Contaminant deposition building shielding factors for US residential structures.

    Science.gov (United States)

    Dickson, Elijah; Hamby, David; Eckerman, Keith

    2017-10-10

    This paper presents validated building shielding factors designed for contemporary US housing-stock under an idealized, yet realistic, exposure scenario from contaminant deposition on the roof and surrounding surfaces. The building shielding factors are intended for use in emergency planning and level three probabilistic risk assessments for a variety of postulated radiological events in which a realistic assessment is necessary to better understand the potential risks for accident mitigation and emergency response planning. Factors are calculated from detailed computational housing-units models using the general-purpose Monte Carlo N-Particle computational code, MCNP5, and are benchmarked from a series of narrow- and broad-beam measurements analyzing the shielding effectiveness of ten common general-purpose construction materials and ten shielding models representing the primary weather barriers (walls and roofs) of likely US housing-stock. Each model was designed to scale based on common residential construction practices and include, to the extent practical, all structurally significant components important for shielding against ionizing radiation. Calculations were performed for floor-specific locations from contaminant deposition on the roof and surrounding ground as well as for computing a weighted-average representative building shielding factor for single- and multi-story detached homes, both with and without basement as well for single-wide manufactured housing-unit. © 2017 IOP Publishing Ltd.

  2. Shielding calculation for treatment rooms of high energy linear accelerator

    International Nuclear Information System (INIS)

    Elleithy, M.A.

    2006-01-01

    A review of German Institute of Standardization (DIN) scheme of the shielding calculation and the essential data required has been done for X-rays and electron beam in the energy range from 1 MeV to 50 MeV. Shielding calculation was done for primary and secondary radiations generated during X-ray operation of Linac. In addition, shielding was done against X-rays generated (Bremsstrahlung) by useful electron beams. The calculations also covered the neutrons generated from the interactions of useful X-rays (at energies above 8 MeV) with the surrounding. The present application involved the computation of shielding against the double scattered components of X-rays and neutrons in the maze area and the thickness of the paraffin wax of the room door. A new developed computer program was designed to assist shielding thickness calculations for a new Linac installation or in replacing an existing machine. The program used a combination of published tables and figures in computing the shielding thickness at different locations for all possible radiation situations. The DIN published data of 40 MeV accelerator room was compared with the program calculations. It was found that there is good agreement between both calculations. The developed program improved the accuracy and speed of calculation

  3. Determination of shielding factors for typical buildings in Brazil

    International Nuclear Information System (INIS)

    Salinas, Isabel Cristina Poquet

    2006-10-01

    This study presents a methodology for the determination of the air kerma inside buildings due to contamination on the external surfaces and the shielding factors for the construction material to be used on emergency assessment systems for urban areas. The commonly used construction materials were simulated with the MCNP computer code. A special methodology to simulate the bricks with holes were developed, mixing all different regions into a single one, making the simulation easier and faster. The effective density and the attenuation coefficients for the 50-3000 keV energy range were determined. The effective protection for the bricks with no cement cover decreases by 40-50% for energies greater then 300 keV when compared to bricks covered on both sides. With the data made available it was possible to evaluate the influence of the construction materials densities and thickness on the exposure due to external surfaces contamination and to estimate the error on the dose when the shielding factor applied on the calculation differs from the more realistic ones. The shielding factors for three types of walls were determined for a five rooms house. Special protection procedures should be applied for houses built with bricks with no cement cover, because they are due to the double of the dose when compared to houses built with bricks two-sided cement covered. The influence of windows and doors were evaluated too. This work was developed at the IRD in order to provide information on the construction material commonly uses on building in Brazil. (author)

  4. Investigation of Shielding Properties of Yarns, Twisted with Metal Wire

    Directory of Open Access Journals (Sweden)

    Sandra VARNAITĖ-ŽURAVLIOVA

    2014-04-01

    Full Text Available The development level of the modern techniques and information technologies creates diverse nature electromagnetic fields and electric field accumulations in the human environment. Electrically conductive textiles that protect against electromagnetic waves and electric charge accumulations can be usable as protective covers for work in computer equipment rooms, measuring stands, air and gas filters and so on. One of the methods used in increase of electrical conductivity in textiles is the development of their specific structures (including the development of threads with the metal component. In this paper, unlike the currently used in the world conductive material production method, where different metal fibres are used as an additives to the main fibre composition in order to create a variety of fibres and yarns, a spun yarn with metal wire was prototyped as samples for this research and the parameters of protective properties of these samples were investigated (such as surface resistivity, vertical resistance, etc.. The protective and shielding properties of woven network with prototyped twisted electro conductive thread with a wire (metal wire diameter of 15 microns were investigated. During the investigation the influence of the following factors, such as conductive fibre composition, electrically conductive thread distribution frequency of the longitudinal and transverse direction, on the protective shielding properties of conductive network were analyzed. The research enabled the assessment of influence of electrically conductive fibre yarn composition and its distribution in the woven mesh on protective shielding properties. DOI: http://dx.doi.org/10.5755/j01.ms.20.1.2492

  5. Neutronic reactor thermal shield

    International Nuclear Information System (INIS)

    Lowe, P.E.

    1976-01-01

    A shield for a nuclear reactor includes at least two layers of alternating wide and narrow rectangular blocks so arranged that the spaces between blocks in adjacent layers are out of registry, each block having an opening therein equally spaced from the sides of the blocks and nearer the top of the block than the bottom, the distance from the top of the block to the opening in one layer being different from this distance in adjacent layers, openings in blocks in adjacent layers being in registry. 1 claim, 7 drawing figures

  6. A shield against distraction

    OpenAIRE

    Halin, N.; Marsh, J.E.; Hellman, A.; Hellstrom, I.; Sörqvist, Patrik

    2014-01-01

    In this paper, we apply the basic idea of a trade-off between the level of concentration and distractibility to test whether a manipulation of task difficulty can shield against distraction. Participants read, either in quiet or with a speech noise background, texts that were displayed either in an easy-to-read or a hard-to-read font. Background speech impaired prose recall, but only when the text was displayed in the easy-to-read font. Most importantly, recall was better in the background sp...

  7. A ROADMAP FOR A COMPUTATIONAL THEORY OF THE VALUE OF INFORMATION IN ORIGIN OF LIFE QUESTIONS

    Directory of Open Access Journals (Sweden)

    Soumya Banerjee

    2016-06-01

    Full Text Available Information plays a critical role in complex biological systems. Complex systems like immune systems and ant colonies co-ordinate heterogeneous components in a decentralized fashion. How do these distributed decentralized systems function? One key component is how these complex systems efficiently process information. These complex systems have an architecture for integrating and processing information coming in from various sources and points to the value of information in the functioning of different complex biological systems. This article proposes a role for information processing in questions around the origin of life and suggests how computational simulations may yield insights into questions related to the origin of life. Such a computational model of the origin of life would unify thermodynamics with information processing and we would gain an appreciation of why proteins and nucleotides evolved as the substrate of computation and information processing in living systems that we see on Earth. Answers to questions like these may give us insights into non-carbon based forms of life that we could search for outside Earth. We hypothesize that carbon-based life forms are only one amongst a continuum of life-like systems in the universe. Investigations into the role of computational substrates that allow information processing is important and could yield insights into: 1 novel non-carbon based computational substrates that may have “life-like” properties, and 2 how life may have actually originated from non-life on Earth. Life may exist as a continuum between non-life and life and we may have to revise our notion of life and how common it is in the universe. Looking at life or life-like phenomenon through the lens of information theory may yield a broader view of life.

  8. Measuring space radiation shielding effectiveness

    OpenAIRE

    Bahadori Amir; Semones Edward; Ewert Michael; Broyan James; Walker Steven

    2017-01-01

    Passive radiation shielding is one strategy to mitigate the problem of space radiation exposure. While space vehicles are constructed largely of aluminum, polyethylene has been demonstrated to have superior shielding characteristics for both galactic cosmic rays and solar particle events due to the high hydrogen content. A method to calculate the shielding effectiveness of a material relative to reference material from Bragg peak measurements performed using energetic heavy charged particles ...

  9. Selective shielding device for scintiphotography

    International Nuclear Information System (INIS)

    Harper, J.W.; Kay, T.D.

    1976-01-01

    A selective shielding device to be used in combination with a scintillation camera is described. The shielding device is a substantially oval-shaped configuration removably secured to the scintillation camera. As a result of this combination scanning of preselected areas of a patient can be rapidly and accurately performed without the requirement of mounting any type of shielding paraphernalia on the patient. 1 claim, 2 drawing figures

  10. Tax Shield, Insolvenz und Zinsschranke

    OpenAIRE

    Arnold, Sven; Lahmann, Alexander; Schwetzler, Bernhard

    2010-01-01

    Dieser Beitrag analysiert den Wertbeitrag fremdfinanzierungsbedingter Steuervorteile (Tax Shield) unter realistischen Bedingungen (keine Negativsteuer; mögliche Insolvenz) für unterschiedliche Finanzierungspolitiken. Zusätzlich wird der Effekt der sogenannten Zinsschranke auf den Wert des Tax Shield ermittelt. Die Bewertung des Tax Shield mit und ohne Zinsschranke findet im einperiodigen Fall auf der Basis von Optionspreismodellen und im mehrperiodigen Fall auf der Basis von Monte Carlo Simul...

  11. The Study of Pallet Pooling Information Platform Based on Cloud Computing

    Directory of Open Access Journals (Sweden)

    Jia-bin Li

    2018-01-01

    Full Text Available Effective implementation of pallet pooling system needs a strong information platform to support. Through the analysis of existing pallet pooling information platform (PPIP, the paper pointed out that the existing studies of PPIP are mainly based on traditional IT infrastructures and technologies which have software, hardware, resource utilization, and process restrictions. Because of the advantages of cloud computing technology like strong computing power, high flexibility, and low cost which meet the requirements of the PPIP well, this paper gave a PPIP architecture of two parts based on cloud computing: the users client and the cloud services. The cloud services include three layers, which are IaaS, PaaS, and SaaS. The method of how to deploy PPIP based on cloud computing is proposed finally.

  12. Measuring consumers' information acquisition and decision behavior with the computer-based information-display-matrix

    DEFF Research Database (Denmark)

    Aschemann-Witzel, Jessica; Hamm, Ulrich

    2011-01-01

    development of the method: starting points are choice of location, increased relevance of choice, individual adjustment of task structure, simplified navigation and realistic layout. Used in multi-measurement-approaches, the IDM can provide detailed background information about consumer information behaviour...... prior to decisions reached in interviews or choice experiments. The contribution introduces to the method and its´ development, use and (dis-)advantages. Results of a survey illustrate the options for analysis and indicate that consumer behaviour in the IDM, compared to face-to-face-interviews, is less...

  13. SHIELD verification and validation report

    International Nuclear Information System (INIS)

    Boman, C.

    1992-02-01

    This document outlines the verification and validation effort for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system code. Along with its predecessors, SHIELD has been in use at the Savannah River Site (SRS) for more than ten years. During this time the code has been extensively tested and a variety of validation documents have been issued. The primary function of this report is to specify the features and capabilities for which SHIELD is to be considered validated, and to reference the documents that establish the validation

  14. Multifunctional Hot Structure Heat Shield

    Data.gov (United States)

    National Aeronautics and Space Administration — This project is performing preliminary development of a Multifunctional Hot Structure (HOST) heat shield for planetary entry. Results of this development will...

  15. Radiation shield for nuclear reactors

    International Nuclear Information System (INIS)

    Weissenfluh, J.A.

    1978-01-01

    A shield for use with nuclear reactor systems to attenuate radiation resulting from reactor operation is described. The shield comprises a container preferably of a thin, flexible or elastic material, which may be in the form of a bag, a mattress, a toroidal segment or toroid or the like filled with radiation attenuating liuid. Means are provided in the container for filling and draining the container in place. Due to its flexibility, the shield readily conforms to irregularities in surfaces with which it may be in contact in a shielding position

  16. Mathematical Foundations of Quantum Information and Computation and Its Applications to Nano- and Bio-systems

    CERN Document Server

    Ohya, Masanori

    2011-01-01

    This monograph provides a mathematical foundation  to  the theory of quantum information and computation, with applications to various open systems including nano and bio systems. It includes introductory material on algorithm, functional analysis, probability theory, information theory, quantum mechanics and quantum field theory. Apart from standard material on quantum information like quantum algorithm and teleportation, the authors discuss findings on the theory of entropy in C*-dynamical systems, space-time dependence of quantum entangled states, entangling operators, adaptive dynamics, relativistic quantum information, and a new paradigm for quantum computation beyond the usual quantum Turing machine. Also, some important applications of information theory to genetics and life sciences, as well as recent experimental and theoretical discoveries in quantum photosynthesis are described.

  17. Ex Vivo Methods for Informing Computational Models of the Mitral Valve

    OpenAIRE

    Bloodworth, Charles H.; Pierce, Eric L.; Easley, Thomas F.; Drach, Andrew; Khalighi, Amir H.; Toma, Milan; Jensen, Morten O.; Sacks, Michael S.; Yoganathan, Ajit P.

    2016-01-01

    Computational modeling of the mitral valve (MV) has potential applications for determining optimal MV repair techniques and risk of recurrent mitral regurgitation. Two key concerns for informing these models are (1) sensitivity of model performance to the accuracy of the input geometry, and, (2) acquisition of comprehensive data sets against which the simulation can be validated across clinically relevant geometries. Addressing the first concern, ex vivo micro-computed tomography (microCT) wa...

  18. The Usage of Informal Computer Based Communication in the Context of Organization’s Technological Resources

    Directory of Open Access Journals (Sweden)

    Steponas Jonušauskas

    2011-12-01

    Full Text Available Purpose of the article is theoretically and practically analyze the features of informal computer based communication in the context of organization’s technological resources.Methodology—meta analysis, survey and descriptive analysis.Findings. According to scientists, the functions of informal communication cover sharing of work related information, coordination of team activities, spread of organizational culture and feeling of interdependence and affinity. Also, informal communication widens the individuals’ recognition of reality, creates general context of environment between talkers, and strengthens interpersonal attraction. For these reasons, informal communication is desirable and even necessary in organizations because it helps to ensure efficient functioning of the enterprise. However, communicating through electronic channels suppresses informal connections or addresses them to the outside of the organization. So, electronic communication is not beneficial for developing ties in informal organizational network. The empirical research showed, thatsignificant part of courts administration staff is prone to use technological resources of their office for informal communication. Representatives of courts administration choose friends for computer based communication much more often than colleagues (72% and 63%respectively. 93%of the research respondents use an additional e-mail box serviced by commercial providers for non work communication. High intensity of informal electronic communication with friends and familiars shows that workers of court administration are used to meet their psycho emotional needs outside the work place. The survey confirmed conclusion of the theoretical analysis: computer based communication is not beneficial for developing informal contacts between workers. In order for the informal communication could carry out its functions and technological recourses of organization would be used effectively, staff

  19. The Usage of Informal Computer Based Communication in the Context of Organization’s Technological Resources

    Directory of Open Access Journals (Sweden)

    Agota Giedrė Raišienė

    2013-08-01

    Full Text Available Purpose of the article is theoretically and practically analyze the features of informal computer based communication in the context of organization’s technological resources. Methodology—meta analysis, survey and descriptive analysis. Findings. According to scientists, the functions of informal communication cover sharing of work related information, coordination of team activities, spread of organizational culture and feeling of interdependence and affinity. Also, informal communication widens the individuals’ recognition of reality, creates general context of environment between talkers, and strengthens interpersonal attraction. For these reasons, informal communication is desirable and even necessary in organizations because it helps to ensure efficient functioning of the enterprise. However, communicating through electronic channels suppresses informal connections or addresses them to the outside of the organization. So, electronic communication is not beneficial for developing ties in informal organizational network. The empirical research showed, that significant part of courts administration staff is prone to use technological resources of their office for informal communication. Representatives of courts administration choose friends for computer based communication much more often than colleagues (72% and 63%respectively. 93%of the research respondents use an additional e-mail box serviced by commercial providers for non work communication. High intensity of informal electronic communication with friends and familiars shows that workers of court administration are used to meet their psycho emotional needs outside the work place. The survey confirmed conclusion of the theoretical analysis: computer based communication is not beneficial for developing informal contacts between workers. In order for the informal communication could carry out its functions and technological recourses of organization would be used effectively, staff

  20. New Toroid shielding design

    CERN Multimedia

    Hedberg V

    On the 15th of June 2001 the EB approved a new conceptual design for the toroid shield. In the old design, shown in the left part of the figure above, the moderator part of the shielding (JTV) was situated both in the warm and cold areas of the forward toroid. It consisted both of rings of polyethylene and hundreds of blocks of polyethylene (or an epoxy resin) inside the toroid vacuum vessel. In the new design, shown to the right in the figure above, only the rings remain inside the toroid. To compensate for the loss of moderator in the toroid, the copper plug (JTT) has been reduced in radius so that a layer of borated polyethylene can be placed around it (see figure below). The new design gives significant cost-savings and is easier to produce in the tight time schedule of the forward toroid. Since the amount of copper is reduced the weight that has to be carried by the toroid is also reduced. Outgassing into the toroid vacuum was a potential problem in the old design and this is now avoided. The main ...