WorldWideScience

Sample records for systems protection framework

  1. A Systemic Approach to Implementing a Protective Factors Framework

    Science.gov (United States)

    Parsons, Beverly; Jessup, Patricia; Moore, Marah

    2014-01-01

    The leadership team of the national Quality Improvement Center on early Childhood ventured into the frontiers of deep change in social systems by funding four research projects. The purpose of the research projects was to learn about implementing a protective factors approach with the goal of reducing the likelihood of child abuse and neglect. In…

  2. A framework for exploring integrated learning systems for the governance and management of public protected areas.

    Science.gov (United States)

    Nkhata, Bimo Abraham; Breen, Charles

    2010-02-01

    This article discusses how the concept of integrated learning systems provides a useful means of exploring the functional linkages between the governance and management of public protected areas. It presents a conceptual framework of an integrated learning system that explicitly incorporates learning processes in governance and management subsystems. The framework is premised on the assumption that an understanding of an integrated learning system is essential if we are to successfully promote learning across multiple scales as a fundamental component of adaptability in the governance and management of protected areas. The framework is used to illustrate real-world situations that reflect the nature and substance of the linkages between governance and management. Drawing on lessons from North America and Africa, the article demonstrates that the establishment and maintenance of an integrated learning system take place in a complex context which links elements of governance learning and management learning subsystems. The degree to which the two subsystems are coupled influences the performance of an integrated learning system and ultimately adaptability. Such performance is largely determined by how integrated learning processes allow for the systematic testing of societal assumptions (beliefs, values, and public interest) to enable society and protected area agencies to adapt and learn in the face of social and ecological change. It is argued that an integrated perspective provides a potentially useful framework for explaining and improving shared understanding around which the concept of adaptability is structured and implemented.

  3. Video copy protection and detection framework (VPD) for e-learning systems

    Science.gov (United States)

    ZandI, Babak; Doustarmoghaddam, Danial; Pour, Mahsa R.

    2013-03-01

    This Article reviews and compares the copyright issues related to the digital video files, which can be categorized as contended based and Digital watermarking copy Detection. Then we describe how to protect a digital video by using a special Video data hiding method and algorithm. We also discuss how to detect the copy right of the file, Based on expounding Direction of the technology of the video copy detection, and Combining with the own research results, brings forward a new video protection and copy detection approach in terms of plagiarism and e-learning systems using the video data hiding technology. Finally we introduce a framework for Video protection and detection in e-learning systems (VPD Framework).

  4. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees

    National Research Council Canada - National Science Library

    Edge, Kenneth S

    2007-01-01

    .... Attack trees by themselves do not provide enough decision support to system defenders. This research develops the concept of using protection trees to offer a detailed risk analysis of a system...

  5. System dynamics simulation framework for the evaluation of physical protection system

    International Nuclear Information System (INIS)

    Kim, Chan Soo; Chung, Chang Hyun; Kwak, Sang Man; Kim, Sok Chul

    2004-01-01

    The events of September 11th, 2001 demonstrated the need for special considerations for the security of nuclear facilities against sabotage. Sabotage can be defined as any deliberate act directed against a nuclear facility or nuclear material in use, storage, or transport which could directly or indirectly endanger the environment or the health and safety of personnel or the public by exposure to radiation or the release of radioactive substances. Sabotage protection aims to protect and mitigate unacceptable radiological consequences. Conventional physical protection concept has focused of how to protect against or prevent intrusion of adversaries based of the Design Basis Threat (DBT) and has given only rare consideration to extreme malevolent envets such as the September 11th attack. Human induced external events were mostly screened out due to their low probabilities of occurrence. However, in this time, several countries have begun to define new design requirements for proliferation resistance and physical protection of new facilities against malevolent event such as those of September 11th, 2001

  6. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees

    National Research Council Canada - National Science Library

    Edge, Kenneth S

    2007-01-01

    .... In addition to developing protection trees, this research improves the existing concept of attack trees and develops rule sets for the manipulation of metrics used in the security of complex systems...

  7. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees

    Science.gov (United States)

    2007-07-01

    Systems, Ciudad Real, Spain, 2002. [Ame00] "Metamorphosis," in American Heritage Dictionary of the English Language Fourth ed: Houghton Mifflin Company...Beyond Fear: Thinking Sensibly About Security in an Uncertain World. New York: Copernicus Books, 2003. [Sch99] Schneier, B. "Modeling Security

  8. Control Systems Security Center Comparison Study of Industrial Control System Standards against the Control Systems Protection Framework Cyber-Security Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Robert P. Evans

    2005-09-01

    Cyber security standards, guidelines, and best practices for control systems are critical requirements that have been delineated and formally recognized by industry and government entities. Cyber security standards provide a common language within the industrial control system community, both national and international, to facilitate understanding of security awareness issues but, ultimately, they are intended to strengthen cyber security for control systems. This study and the preliminary findings outlined in this report are an initial attempt by the Control Systems Security Center (CSSC) Standard Awareness Team to better understand how existing and emerging industry standards, guidelines, and best practices address cyber security for industrial control systems. The Standard Awareness Team comprised subject matter experts in control systems and cyber security technologies and standards from several Department of Energy (DOE) National Laboratories, including Argonne National Laboratory, Idaho National Laboratory, Pacific Northwest National Laboratory, and Sandia National Laboratories. This study was conducted in two parts: a standard identification effort and a comparison analysis effort. During the standard identification effort, the Standard Awareness Team conducted a comprehensive open-source survey of existing control systems security standards, regulations, and guidelines in several of the critical infrastructure (CI) sectors, including the telecommunication, water, chemical, energy (electric power, petroleum and oil, natural gas), and transportation--rail sectors and sub-sectors. During the comparison analysis effort, the team compared the requirements contained in selected, identified, industry standards with the cyber security requirements in ''Cyber Security Protection Framework'', Version 0.9 (hereafter referred to as the ''Framework''). For each of the seven sector/sub-sectors listed above, one standard was

  9. FIRE PROTECTION SYSTEMS AND TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Aristov Denis Ivanovich

    2016-03-01

    Full Text Available The All-Russian Congress “Fire Stop Moscow” was de-voted to the analysis of the four segments of the industry of fire protection systems and technologies: the design of fire protec-tion systems, the latest developments and technologies of active and passive fire protection of buildings, the state and the devel-opment of the legal framework, the practice of fire protection of buildings and structures. The forum brought together the repre-sentatives of the industry of fire protection systems, scientists, leading experts, specialists in fire protection and representatives of construction companies from different regions of Russia. In parallel with the Congress Industrial Exhibition of fire protection systems, materials and technology was held, where manufacturers presented their products. The urgency of the “Fire Stop Moscow” Congress in 2015 organized by the Congress Bureau ODF Events lies primarily in the fact that it considered the full range of issues related to the fire protection of building and construction projects; studied the state of the regulatory framework for fire safety and efficiency of public services, research centers, private companies and busi-nesses in the area of fire safety. The main practical significance of the event which was widely covered in the media space, was the opportunity to share the views and information between management, science, and practice of business on implementing fire protection systems in the conditions of modern economic relations and market realities. : congress, fire protection, systems, technologies, fire protection systems, exhibition

  10. Computer information systems framework

    International Nuclear Information System (INIS)

    Shahabuddin, S.

    1989-01-01

    Management information systems (MIS) is a commonly used term in computer profession. The new information technology has caused management to expect more from computer. The process of supplying information follows a well defined procedure. MIS should be capable for providing usable information to the various areas and levels of organization. MIS is different from data processing. MIS and business hierarchy provides a good framework for many organization which are using computers. (A.B.)

  11. Machine protection systems

    CERN Document Server

    Macpherson, A L

    2010-01-01

    A summary of the Machine Protection System of the LHC is given, with particular attention given to the outstanding issues to be addressed, rather than the successes of the machine protection system from the 2009 run. In particular, the issues of Safe Machine Parameter system, collimation and beam cleaning, the beam dump system and abort gap cleaning, injection and dump protection, and the overall machine protection program for the upcoming run are summarised.

  12. A multibiometric face recognition fusion framework with template protection

    Science.gov (United States)

    Chindaro, S.; Deravi, F.; Zhou, Z.; Ng, M. W. R.; Castro Neves, M.; Zhou, X.; Kelkboom, E.

    2010-04-01

    In this work we present a multibiometric face recognition framework based on combining information from 2D with 3D facial features. The 3D biometrics channel is protected by a privacy enhancing technology, which uses error correcting codes and cryptographic primitives to safeguard the privacy of the users of the biometric system at the same time enabling accurate matching through fusion with 2D. Experiments are conducted to compare the matching performance of such multibiometric systems with the individual biometric channels working alone and with unprotected multibiometric systems. The results show that the proposed hybrid system incorporating template protection, match and in some cases exceed the performance of corresponding unprotected equivalents, in addition to offering the additional privacy protection.

  13. Radiation protection in medicine: Ethical framework revisited

    International Nuclear Information System (INIS)

    Malone, J. F.

    2009-01-01

    The ethical framework within which medicine operates has changed radically over the last two decades. This has been stimulated by events leading to controversy, such as the infant organ retention scandals; concerns about blood products; self regulation of medical practice in the wake of the Harold Shipman Enquiry in the UK; and many other events. It has become obvious following investigations and/or public enquiries that a gap has opened up between what is acceptable to the public on the one hand, and what appears reasonable to, or is at least accepted by, the professionals involved on the other. This paper reviews these issues and some conclusions of a workshop held to consider them. It places the developments in the context of the idea that the approach to problems and communication in a group of people/professionals such as doctors, radiologists, radiation protection specialists, or even the general public may be regarded as a 'culture'. Current practice of radiation protection in medicine is examined in the light of these considerations. (authors)

  14. Using the 'protective environment' framework to analyse children's protection needs in Darfur.

    Science.gov (United States)

    Ager, Alastair; Boothby, Neil; Bremer, Megan

    2009-10-01

    A major humanitarian concern during the continuing crisis in Darfur, Sudan, has been the protection of children, although there has been little in the way of comprehensive analysis to guide intervention. Founded on a situational analysis conducted between October 2005 and March 2006, this paper documents the significant threats to children's well-being directly linked to the political conflict. It demonstrates the role of non-conflict factors in exacerbating these dangers and in promoting additional protection violations, and it uses the 'protective environment' framework (UNICEF Sudan, 2006a) to identify systematic features of the current environment that put children at risk. This framework is shown to provide a coherent basis for assessment and planning, prompting broad, multidisciplinary analysis, concentrating on preventive and protective action, and fostering a systemic approach (rather than placing an undue focus on the discrete needs of 'vulnerable groups'). Constraints on its present utility in emergency settings are also noted.

  15. Extensible Systems Dynamics Framework

    National Research Council Canada - National Science Library

    Brooks, Christopher; Lee, Edward A

    2008-01-01

    .... The Pedigree Management and Assessment Framework (PMAF) enables the publisher of information to record standard pedigree, such as information about the source, manner of collection, and the chain of modification of that information...

  16. PERSONA : a personalized data protection framework

    NARCIS (Netherlands)

    Egea, M.; Paci, F.; Petrocchi, M.; Zannone, N.; Fernández-Gago, C.; Martinelli, F.; Pearson, S.; Agudo, I.

    2013-01-01

    The European Directive on Data Protection recognizes the right of data subjects to control the usage of their information. However, to date there are no data protection solutions that involve data subjects in the definition and enforcement of data protection policies. In this paper we present the

  17. Smart cathodic protection systems

    NARCIS (Netherlands)

    Polder, R.B.; Leggedoor, J.; Schuten, G.; Sajna, S.; Kranjc, A.

    2010-01-01

    Cathodic protection delivers corrosion protection in concrete structures exposed to aggressive environments, e.g. in de-icing salt and marine climates. Working lives of a large number of CP systems are at least more than 13 years and probably more than 25 years, provided a minimum level of

  18. Framework for systems engineering research

    CSIR Research Space (South Africa)

    Erasmus, L

    2013-08-01

    Full Text Available In this paper a framework is proposed to perform systems engineering research within South Africa. It is proposed that within the reference of the National Research Foundation (NRF) classification of research, systems engineering is a Field...

  19. Buffer moisture protection system

    International Nuclear Information System (INIS)

    Ritola, J.; Peura, J.

    2013-11-01

    With the present knowledge, bentonite blocks have to be protected from the air relative humidity and from any moisture leakages in the environment that might cause swelling of the bentonite blocks during the 'open' installation phase before backfilling. The purpose of this work was to design the structural reference solution both for the bottom of the deposition hole and for the buffer moisture protection and dewatering system with their integrated equipment needed in the deposition hole. This report describes the Posiva's reference solution for the buffer moisture protection system and the bottom plate on basis of the demands and functional requirements set by long-term safety. The reference solution with structural details has been developed in research work made 2010-2011. The structural solution of the moisture protection system has not yet been tested in practice. On the bottom of the deposition hole a copper plate which protects the lowest bentonite block from the gathered water is installed straight to machined and even rock surface. The moisture protection sheet made of EPDM rubber is attached to the copper plate with an inflatable seal. The upper part of the moisture protection sheet is fixed to the collar structures of the lid which protects the deposition hole in the disposal tunnel. The main function of the moisture protection sheet is to protect bentonite blocks from the leaking water and from the influence of the air humidity at their installation stage. The leaking water is controlled by the dewatering and alarm system which has been integrated into the moisture protection liner. (orig.)

  20. System level ESD protection

    CERN Document Server

    Vashchenko, Vladislav

    2014-01-01

    This book addresses key aspects of analog integrated circuits and systems design related to system level electrostatic discharge (ESD) protection.  It is an invaluable reference for anyone developing systems-on-chip (SoC) and systems-on-package (SoP), integrated with system-level ESD protection. The book focuses on both the design of semiconductor integrated circuit (IC) components with embedded, on-chip system level protection and IC-system co-design. The readers will be enabled to bring the system level ESD protection solutions to the level of integrated circuits, thereby reducing or completely eliminating the need for additional, discrete components on the printed circuit board (PCB) and meeting system-level ESD requirements. The authors take a systematic approach, based on IC-system ESD protection co-design. A detailed description of the available IC-level ESD testing methods is provided, together with a discussion of the correlation between IC-level and system-level ESD testing methods. The IC-level ESD...

  1. Power system protection

    International Nuclear Information System (INIS)

    Venkata, S.S.; Damborg, M.J.; Jampala, A.K.

    1991-01-01

    Power systems of the 21st century will be more modern, and complex, utilizing the latest available technologies. At the same time, generating plants will have to operate with minimal spinning margins and energy transportation has to take place at critical levels due to environmental and economical constraints. These factors dictate that the power systems be protected with optimum sensitivity, selectivity and time of operation to assure maximum reliability, and security at minimal cost. With an increasing role played by digital computers in every aspect of protection, it is important to take a critical and fresh look at the art and science of relaying and protection. The main objective of this paper is to review the past, present and future of power system protection from a software point of view

  2. Depth protection system

    International Nuclear Information System (INIS)

    Arita, Setsuo; Izumi, Shigeru; Suzuki, Satoru; Noguchi, Atomi.

    1988-01-01

    Purpose: To previously set a nuclear reactor toward safety side by the reactor scram if an emergency core cooling system is failed to operate. Constitution If abnormality occurs in an emergency core cooling system or an aqueous boric acid injection system, a reactor protection system is operated and, if the reactor protection system shows an abnormal state, a control rod withdrawal inhibition system is operated as a fundamental way. For instance, when the driving power source voltage for the emergency core cooling system is detected and, if it is lower than a predetermined value, the reactor protection system is operated. Alternatively, if the voltage goes lower than the predetermined value, the control rod withdrawal is inhibited. In addition, stopping for the feedwater system is inhibited. Further, integrity of the driving means for the emergency core cooling system is positively checked and the protection function is operated depending on the result of check. Since the nuclear reactor can be set toward the safety side even if the voltage for the driving power source of the aqueous boric acid injection system is lower than a predetermined value, the reactor safety can further be improved. (Horiuchi, T.)

  3. Advanced Worker Protection System

    International Nuclear Information System (INIS)

    1996-04-01

    The Advanced Worker Protection System (AWPS) is a liquid-air-based, self-contained breathing and cooling system with a duration of 2 hrs. AWPS employs a patented system developed by Oceaneering Space Systems (OSS), and was demonstrated at their facility in Houston, TX as well as at Kansas State University, Manhattan. The heart of the system is the life-support backpack that uses liquid air to provide cooling as well as breathing gas to the worker. The backpack is combined with advanced protective garments, an advanced liquid cooling garment (LCG), a respirator, and communications and support equipment. The prototype unit development and testing under Phase 1 has demonstrated that AWPS has the ability to meet performance criteria. These criteria were developed with an understanding of both the AWPS capabilities and the DOE decontamination and decommissioning (D and D) activities protection needs

  4. A Data Protection Framework for Learning Analytics

    Science.gov (United States)

    Cormack, Andrew

    2016-01-01

    Most studies on the use of digital student data adopt an ethical framework derived from human-subject research, based on the informed consent of the experimental subject. However, consent gives universities little guidance on using learning analytics as a routine part of educational provision: which purposes are legitimate and which analyses…

  5. Reactor protection system

    International Nuclear Information System (INIS)

    Fairbrother, D.B.; Lesniak, L.M.; Orgera, E.G.

    1977-10-01

    The report describes the reactor protection system (RPS-II) designed for use on Babcock and Wilcox 145-, later 177-, and 205-fuel assembly pressurized water reactors. In this system, relays in the trip logic have been replaced by solid state devices. A calculating module for the low DNBR, pump status, and offset trip functions has replaced the overpower trip (based on flow and imbalance), the power/RC pump trip, and the variable low-pressure trip. Included is a description of the changes from the present Oconee-type reactor protection system (RPS-I), a functional and hardware description of the calculating module, a description of the software programmed in the calculating module, and a discussion of the qualification program conducted to ensure that the degree of protection provided by RPS-II is not less than that provided by previously licensed systems supplied by B and W

  6. Smart Machine Protection System

    International Nuclear Information System (INIS)

    Clark, S.; Nelson, D.; Grillo, A.; Spencer, N.; Hutchinson, D.; Olsen, J.; Millsom, D.; White, G.; Gromme, T.; Allison, S.; Underwood, K.; Zelazny, M.; Kang, H.

    1991-11-01

    A Machine Protection System implemented on the SLC automatically controls the beam repetition rates in the accelerator so that radiation or temperature faults slow the repetition rate to bring the fault within tolerance without shutting down the machine. This process allows the accelerator to aid in the fault diagnostic process, and the protection system automatically restores the beams back to normal rates when the fault is diagnosed and corrected. The user interface includes facilities to monitor the performance of the system, and track rate limits, faults, and recoveries. There is an edit facility to define the devices to be included in the protection system, along with their set points, limits, and trip points. This set point and limit data is downloaded into the CAMAC modules, and the configuration data is compiled into a logical decision tree for the 68030 processor. 3 figs

  7. Smart machine protection system

    International Nuclear Information System (INIS)

    Clark, S.; Nelson, D.; Grillo, A.

    1992-01-01

    A Machine Protection System implemented on the SLC automatically controls the beam repetition rates in the accelerator so that radiation or temperature faults slow the repetition rate to bring the fault within tolerance without shutting down the machine. This process allows the accelerators to aid in the fault diagnostic process, and the protection system automatically restores the beams back to normal rates when the fault is diagnosed and corrected. The user interface includes facilities to monitor the performance of the system, and track rate limits, faults, and recoveries. There is an edit facility to define the devices to be included in the protection system, along with their set points, limits, and trip points. This set point and limit data is downloaded into the CAMAC modules, and the configuration data is complied into a logical decision tree for the 68030 processor. (author)

  8. Temporary physical protection systems

    International Nuclear Information System (INIS)

    Williams, J.D.; Gangel, D.J.; Madsen, R.W.

    1991-01-01

    Terrorism and other aspects of world political instability have created a high demand for temporary physical protection systems within the nuclear materials management community. They can be used when vehicles carrying important assets are away from their permanent fixed site location, around areas where experiments are being temporarily conducted, around construction areas and one portions of a fixed site physical security system which is temporarily inoperable. Physical security systems can be grouped into four categories: tactical, portable, semi-permanent, and fixed. The resources and experience gained at Sandia National Laboratories in over forty years of developing and implementing security systems for protecting nuclear weapons and fixed nuclear facilities is now being applied to temporary physical security systems. This paper emphasizes temporary physical security systems and their component parts that are presently available and identify additional system-subsystem objectives, requirements, and concepts

  9. Normative framework for the protection against genetic discrimination in Serbia

    Directory of Open Access Journals (Sweden)

    Petrušić Nevena

    2015-01-01

    Full Text Available The paper is devoted to a normative framework of protection against genetic discrimination in the legal system of the Republic of Serbia, contained in the Law on Patients Rights, as of 2013 and in the Law on Prevention and diagnostics of genetic disorders, genetically conditioned anomalies and rare diseases, as of 2015. The analysis has shown that the rules on protection of the genetic data and the use of genetic samples, which are crucially important for prevention of genetic discrimination, have not been harmonized with contemporary ethical and legal standards. The contents of the Article 9 of the Law on Prevention and diagnostics of genetic disorders, genetically conditioned anomalies and rare diseases reduces the scope and level of protection against genetic discrimination in relation to the protection, given by the General Antidiscrimination Law. The legal definition of the genetic discrimination notion is not comprehensive, clear or precise, either, so it causes confusions, which, additionally, make the application of anti-discrimination regulations more difficult. Having in mind the harmful effects caused by the genetic discrimination, there is a need to eliminate the observed normative failures in due time and enable people to enjoy the benefits, provided by genetic investigations, without the fear from discrimination. In order to prevent the genetic discrimination, it is necessary to work on both information providing and raising awareness about the genetic privacy and the genetic discrimination problem, but also on promotion of the social justice and development of sensibility for bioethical challenges brought by the new age.

  10. Framework for control system development

    International Nuclear Information System (INIS)

    Cork, C.; Nishimura, Hiroshi

    1992-01-01

    Control systems being developed for the present generation of accelerators will need to adapt to changing machine and operating state conditions. Such systems must also be capable of evolving over the life of the accelerator operation. In this paper we present a framework for the development of adaptive control systems

  11. Framework for control system development

    International Nuclear Information System (INIS)

    Cork, C.; Nishimura, Hiroshi.

    1991-11-01

    Control systems being developed for the present generation of accelerators will need to adapt to changing machine and operating state conditions. Such systems must also be capable of evolving over the life of the accelerator operation. In this paper we present a framework for the development of adaptive control systems

  12. Advanced worker protection system

    International Nuclear Information System (INIS)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-01-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D ampersand D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D ampersand D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D ampersand D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project will result in the development of an Advanced Worker Protection System (AWPS). The AWPS will be built around a life support backpack that uses liquid air to provide cooling as well as breathing gas to the worker. The backpack will be combined with advanced protective garments, advanced liquid cooling garment, respirator, communications, and support equipment to provide improved worker protection, simplified system maintenance, and dramatically improve worker productivity through longer duration work cycles. Phase I of the project has resulted in a full scale prototype Advanced Worker Protection Ensemble (AWPE, everything the worker will wear), with sub-scale support equipment, suitable for integrated testing and preliminary evaluation. Phase II will culminate in a full scale, certified, pre-production AWPS and a site demonstration

  13. Advanced worker protection system

    Energy Technology Data Exchange (ETDEWEB)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-12-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D&D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D&D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D&D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project will result in the development of an Advanced Worker Protection System (AWPS). The AWPS will be built around a life support backpack that uses liquid air to provide cooling as well as breathing gas to the worker. The backpack will be combined with advanced protective garments, advanced liquid cooling garment, respirator, communications, and support equipment to provide improved worker protection, simplified system maintenance, and dramatically improve worker productivity through longer duration work cycles. Phase I of the project has resulted in a full scale prototype Advanced Worker Protection Ensemble (AWPE, everything the worker will wear), with sub-scale support equipment, suitable for integrated testing and preliminary evaluation. Phase II will culminate in a full scale, certified, pre-production AWPS and a site demonstration.

  14. Digital integrated protection system

    International Nuclear Information System (INIS)

    Savornin, M.; Furet, M.

    1978-01-01

    As a result of technological progress it is now possible to achieve more elaborate protection functions able to follow more closely the phenomena to be supervised. For this reason the CEA, Framatome and Merlin/Gerin/CERCI have undertaken in commonn to develop a Digital Integrated Protection System (D.I.P.S.). This system is designed with the following aims: to improve the safety of the station, . to improve its availability, . to facilitate installation, . to facilitate tests and maintenance. The main characteristics adopted are: . possibilities of obtaining more elaborate monitoring and protection algorithm treatments, . order 4 redundancy of transducers, associated instruments and signal processing, . possibility of inhibiting part of the protection system, . standardisation of equipment, physical and electrical separation of redundant units, . use of multiplexed connections, . automation of tests. Four flow charts are presented: - DIPS with four APUP (Acquisition and Processing Unit for Protection) - APUP - LSU (Logic Safeguard Unit), number LSU corresponding to number fluidic safeguard circuits, - structure of a function unit, - main functions of the APUP [fr

  15. Advanced worker protection system

    Energy Technology Data Exchange (ETDEWEB)

    Caldwell, B.; Duncan, P.; Myers, J. [Oceaneering Space Systems, Houston, TX (United States)

    1995-10-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D&D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D&D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D&D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project describes the development of an Advanced Worker Protection System (AWPS) which will include a life-support backpack with liquid air for cooling and as a supply of breathing gas, protective clothing, respirators, communications, and support equipment.

  16. Advanced worker protection system

    International Nuclear Information System (INIS)

    Caldwell, B.; Duncan, P.; Myers, J.

    1995-01-01

    The Department of Energy (DOE) is in the process of defining the magnitude and diversity of Decontamination and Decommissioning (D ampersand D) obligations at its numerous sites. The DOE believes that existing technologies are inadequate to solve many challenging problems such as how to decontaminate structures and equipment cost effectively, what to do with materials and wastes generated, and how to adequately protect workers and the environment. Preliminary estimates show a tremendous need for effective use of resources over a relatively long period (over 30 years). Several technologies are being investigated which can potentially reduce D ampersand D costs while providing appropriate protection to DOE workers. The DOE recognizes that traditional methods used by the EPA in hazardous waste site clean up activities are insufficient to provide the needed protection and worker productivity demanded by DOE D ampersand D programs. As a consequence, new clothing and equipment which can adequately protect workers while providing increases in worker productivity are being sought for implementation at DOE sites. This project describes the development of an Advanced Worker Protection System (AWPS) which will include a life-support backpack with liquid air for cooling and as a supply of breathing gas, protective clothing, respirators, communications, and support equipment

  17. The Guided System Development Framework

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.; Nielson, Flemming

    2011-01-01

    The Service-Oriented Computing paradigm has had significant influence on the Internet. With the emergence of this paradigm, it is important to provide tools that help developers designing and verifying such systems. In this article, we present the Guided System Development (GSD) Framework that aids...

  18. Protective garment ventilation system

    Science.gov (United States)

    Lang, R. (Inventor)

    1970-01-01

    A method and apparatus for ventilating a protective garment, space suit system, and/or pressure suits to maintain a comfortable and nontoxic atmosphere within is described. The direction of flow of a ventilating and purging gas in portions of the garment may be reversed in order to compensate for changes in environment and activity of the wearer. The entire flow of the ventilating gas can also be directed first to the helmet associated with the garment.

  19. Framework for teleoperated microassembly systems

    Science.gov (United States)

    Reinhart, Gunther; Anton, Oliver; Ehrenstrasser, Michael; Patron, Christian; Petzold, Bernd

    2002-02-01

    Manual assembly of minute parts is currently done using simple devices such as tweezers or magnifying glasses. The operator therefore requires a great deal of concentration for successful assembly. Teleoperated micro-assembly systems are a promising method for overcoming the scaling barrier. However, most of today's telepresence systems are based on proprietary and one-of-a-kind solutions. Frameworks which supply the basic functions of a telepresence system, e.g. to establish flexible communication links that depend on bandwidth requirements or to synchronize distributed components, are not currently available. Large amounts of time and money have to be invested in order to create task-specific teleoperated micro-assembly systems from scratch. For this reason, an object-oriented framework for telepresence systems that is based on CORBA as a common middleware was developed at the Institute for Machine Tools and Industrial Management (iwb). The framework is based on a distributed architectural concept and is realized in C++. External hardware components such as haptic, video or sensor devices are coupled to the system by means of defined software interfaces. In this case, the special requirements of teleoperation systems have to be considered, e.g. dynamic parameter settings for sensors during operation. Consequently, an architectural concept based on logical sensors has been developed to achieve maximum flexibility and to enable a task-oriented integration of hardware components.

  20. Layers of protection analysis in the framework of possibility theory.

    Science.gov (United States)

    Ouazraoui, N; Nait-Said, R; Bourareche, M; Sellami, I

    2013-11-15

    An important issue faced by risk analysts is how to deal with uncertainties associated with accident scenarios. In industry, one often uses single values derived from historical data or literature to estimate events probability or their frequency. However, both dynamic environments of systems and the need to consider rare component failures may make unrealistic this kind of data. In this paper, uncertainty encountered in Layers Of Protection Analysis (LOPA) is considered in the framework of possibility theory. Data provided by reliability databases and/or experts judgments are represented by fuzzy quantities (possibilities). The fuzzy outcome frequency is calculated by extended multiplication using α-cuts method. The fuzzy outcome is compared to a scenario risk tolerance criteria and the required reduction is obtained by resolving a possibilistic decision-making problem under necessity constraint. In order to validate the proposed model, a case study concerning the protection layers of an operational heater is carried out. Copyright © 2013 Elsevier B.V. All rights reserved.

  1. A Framework for Systemic Design

    Directory of Open Access Journals (Sweden)

    Alex Ryan

    2014-12-01

    Full Text Available As designers move upstream from traditional product and service design to engage with challenges characterised by complexity, uniqueness, value conflict, and ambiguity over objectives, they have increasingly integrated systems approaches into their practice. This synthesis of systems thinking with design thinking is forming a distinct new field of systemic design. This paper presents a framework for systemic design as a mindset, methodology, and set of methods that together enable teams to learn, innovate, and adapt to a complex and dynamic environment. We suggest that a systemic design mindset is inquiring, open, integrative, collaborative, and centred. We propose a systemic design methodology composed of six main activities: framing, formulating, generating, reflecting, inquiring, and facilitating. We view systemic design methods as a flexible and open-ended set of procedures for facilitating group collaboration that are both systemic and designerly.  

  2. ADVANCED WORKER PROTECTION SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Judson Hedgehock

    2001-03-16

    From 1993 to 2000, OSS worked under a cost share contract from the Department of Energy (DOE) to develop an Advanced Worker Protection System (AWPS). The AWPS is a protective ensemble that provides the user with both breathing air and cooling for a NIOSH-rated duration of two hours. The ensemble consists of a liquid air based backpack, a Liquid Cooling Garment (LCG), and an outer protective garment. The AWPS project was divided into two phases. During Phase 1, OSS developed and tested a full-scale prototype AWPS. The testing showed that workers using the AWPS could work twice as long as workers using a standard SCBA. The testing also provided performance data on the AWPS in different environments that was used during Phase 2 to optimize the design. During Phase 1, OSS also performed a life-cycle cost analysis on a representative clean up effort. The analysis indicated that the AWPS could save the DOE millions of dollars on D and D activities and improve the health and safety of their workers. During Phase 2, OSS worked to optimize the AWPS design to increase system reliability, to improve system performance and comfort, and to reduce the backpack weight and manufacturing costs. To support this design effort, OSS developed and tested several different generations of prototype units. Two separate successful evaluations of the ensemble were performed by the International Union of Operation Engineers (IUOE). The results of these evaluations were used to drive the design. During Phase 2, OSS also pursued certifying the AWPS with the applicable government agencies. The initial intent during Phase 2 was to finalize the design and then to certify the system. OSS and Scott Health and Safety Products teamed to optimize the AWPS design and then certify the system with the National Institute of Occupational Health and Safety (NIOSH). Unfortunately, technical and programmatic difficulties prevented us from obtaining NIOSH certification. Despite the inability of NIOSH to certify

  3. ADVANCED WORKER PROTECTION SYSTEM

    International Nuclear Information System (INIS)

    Judson Hedgehock

    2001-01-01

    From 1993 to 2000, OSS worked under a cost share contract from the Department of Energy (DOE) to develop an Advanced Worker Protection System (AWPS). The AWPS is a protective ensemble that provides the user with both breathing air and cooling for a NIOSH-rated duration of two hours. The ensemble consists of a liquid air based backpack, a Liquid Cooling Garment (LCG), and an outer protective garment. The AWPS project was divided into two phases. During Phase 1, OSS developed and tested a full-scale prototype AWPS. The testing showed that workers using the AWPS could work twice as long as workers using a standard SCBA. The testing also provided performance data on the AWPS in different environments that was used during Phase 2 to optimize the design. During Phase 1, OSS also performed a life-cycle cost analysis on a representative clean up effort. The analysis indicated that the AWPS could save the DOE millions of dollars on D and D activities and improve the health and safety of their workers. During Phase 2, OSS worked to optimize the AWPS design to increase system reliability, to improve system performance and comfort, and to reduce the backpack weight and manufacturing costs. To support this design effort, OSS developed and tested several different generations of prototype units. Two separate successful evaluations of the ensemble were performed by the International Union of Operation Engineers (IUOE). The results of these evaluations were used to drive the design. During Phase 2, OSS also pursued certifying the AWPS with the applicable government agencies. The initial intent during Phase 2 was to finalize the design and then to certify the system. OSS and Scott Health and Safety Products teamed to optimize the AWPS design and then certify the system with the National Institute of Occupational Health and Safety (NIOSH). Unfortunately, technical and programmatic difficulties prevented us from obtaining NIOSH certification. Despite the inability of NIOSH to certify

  4. A comparative analysis of protected area planning and management frameworks

    Science.gov (United States)

    Per Nilsen; Grant Tayler

    1997-01-01

    A comparative analysis of the Recreation Opportunity Spectrum (ROS), Limits of Acceptable Change (LAC), a Process for Visitor Impact Management (VIM), Visitor Experience and Resource Protection (VERP), and the Management Process for Visitor Activities (known as VAMP) decision frameworks examines their origins; methodology; use of factors, indicators, and standards;...

  5. Systems approach to tamper protection

    International Nuclear Information System (INIS)

    Myre, W.C.; Eaton, M.J.

    1980-01-01

    Tamper-protection is a fundamental requirement of effective containment and surveillance systems. Cost effective designs require that the tamper protection requirements be considered early in the design phase and at the system level. A discussion of tamper protection alternatives as well as an illustrative example system is presented

  6. Ablative thermal protection systems

    International Nuclear Information System (INIS)

    Vaniman, J.; Fisher, R.; Wojciechowski, C.; Dean, W.

    1983-01-01

    The procedures used to establish the TPS (thermal protection system) design of the SRB (solid rocket booster) element of the Space Shuttle vehicle are discussed. A final evaluation of the adequacy of this design will be made from data obtained from the first five Shuttle flights. Temperature sensors installed at selected locations on the SRB structure covered by the TPS give information as a function of time throughout the flight. Anomalies are to be investigated and computer design thermal models adjusted if required. In addition, the actual TPS ablator material loss is to be measured after each flight and compared with analytically determined losses. The analytical methods of predicting ablator performance are surveyed. 5 references

  7. Framework for Proliferation Resistance and Physical Protection for Nonproliferation Impact Assessments

    International Nuclear Information System (INIS)

    Bari, R.

    2008-01-01

    This report describes a framework for proliferation resistance and physical protection evaluation for the fuel cycle systems envisioned in the expansion of nuclear power for electricity generation. The methodology is based on an approach developed as part of the Generation IV technical evaluation framework and on a qualitative evaluation approach to policy factors similar to those that were introduced in previous Nonproliferation Impact Assessments performed by DOE

  8. Adaptive protection algorithm and system

    Science.gov (United States)

    Hedrick, Paul [Pittsburgh, PA; Toms, Helen L [Irwin, PA; Miller, Roger M [Mars, PA

    2009-04-28

    An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

  9. Analyzing risks to protected areas using the human modification framework: a Colorado case study

    Science.gov (United States)

    David M. Theobald; Alisa Wade; Grant Wilcox; Nate. Peterson

    2010-01-01

    A framework that organizes natural and protected areas is often used to help understand the potential risks to natural areas and aspects of their ecological and human dimensions. The spatial (or landscape) context of these dynamics is also a critical, but, rarely considered, factor. Common classification systems include the U.S. Geological (USGS) Gap Analysis Program...

  10. A Framework for Enterprise Operating Systems Based on Zachman Framework

    Science.gov (United States)

    Ostadzadeh, S. Shervin; Rahmani, Amir Masoud

    Nowadays, the Operating System (OS) isn't only the software that runs your computer. In the typical information-driven organization, the operating system is part of a much larger platform for applications and data that extends across the LAN, WAN and Internet. An OS cannot be an island unto itself; it must work with the rest of the enterprise. Enterprise wide applications require an Enterprise Operating System (EOS). Enterprise operating systems used in an enterprise have brought about an inevitable tendency to lunge towards organizing their information activities in a comprehensive way. In this respect, Enterprise Architecture (EA) has proven to be the leading option for development and maintenance of enterprise operating systems. EA clearly provides a thorough outline of the whole information system comprising an enterprise. To establish such an outline, a logical framework needs to be laid upon the entire information system. Zachman Framework (ZF) has been widely accepted as a standard scheme for identifying and organizing descriptive representations that have prominent roles in enterprise-wide system development. In this paper, we propose a framework based on ZF for enterprise operating systems. The presented framework helps developers to design and justify completely integrated business, IT systems, and operating systems which results in improved project success rate.

  11. Protection of industrial power systems

    CERN Document Server

    DAVIES, T

    2006-01-01

    The protection which is installed on an industrial power system is likely to be subjected to more difficult conditions than the protection on any other kind of power system. Starting with the many simple devices which are employed and covering the whole area of industrial power system protection, this book aims to help achieve a thorough understanding of the protection necessary.Vital aspects such as the modern cartridge fuse, types of relays, and the role of the current transformer are covered and the widely used inverse definite-minimum time overcurrent relay, the theory of the M

  12. Development of a radiation protection competency framework, a consultancies perspective

    International Nuclear Information System (INIS)

    Bryant, P A

    2016-01-01

    The UK nuclear industry is suffering heightened concerns of a skills gap. This has led to companies, and in particular consultancies recruiting increasing numbers of graduates and less experienced staff. The following paper provides an overview of an approach to developing a radiation protection based competency framework within a consultancy with the aim of supporting the identification of the required initiatives to support the development of staff, their careers, and the profession. It is hoped this will provide useful guidance for organisations that are embarking on establishing a training and development programme. (paper)

  13. 78 FR 30870 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Science.gov (United States)

    2013-05-23

    ... Marine Protected Areas to the National System of Marine Protected Areas AGENCY: National Marine Protected...) invited federal, state, commonwealth, and territorial marine protected area (MPA) programs with... of Marine Protected Areas of the United States (Framework), developed in response to Executive Order...

  14. Economic framework for information system evaluation

    International Nuclear Information System (INIS)

    King, D.W.; Roderer, N.K.

    1979-01-01

    In the evaluation of complex information systems, it is useful to work within a generalized economic framework. This framework is based on consideration of four evaluation levels, including those associated with the overall system, system functions, products and services, and activities. Measures of cost and output can be defined at each level, with output measures related to volume of activity, performance, effectiveness, and benefit. The description of this framework includes definitions of the terminology used. Examples of the application of the framework to specific information system evaluations are also given. 4 figures

  15. Integrated Systems Engineering Framework (ISEF)

    Data.gov (United States)

    Federal Laboratory Consortium — The ISEF is an integrated SE framework built to create and capture knowledge using a decision-centric method, high-quality data visualizations, intuitive navigation...

  16. Developmental framework to validate future designs of ballistic neck protection.

    Science.gov (United States)

    Breeze, J; Midwinter, M J; Pope, D; Porter, K; Hepper, A E; Clasper, J

    2013-01-01

    The number of neck injuries has increased during the war in Afghanistan, and they have become an appreciable source of mortality and long-term morbidity for UK servicemen. A three-dimensional numerical model of the neck is necessary to allow simulation of penetrating injury from explosive fragments so that the design of body armour can be optimal, and a framework is required to validate and describe the individual components of this program. An interdisciplinary consensus group consisting of military maxillofacial surgeons, and biomedical, physical, and material scientists was convened to generate the components of the framework, and as a result it incorporates the following components: analysis of deaths and long-term morbidity, assessment of critical cervical structures for incorporation into the model, characterisation of explosive fragments, evaluation of the material of which the body armour is made, and mapping of the entry sites of fragments. The resulting numerical model will simulate the wound tract produced by fragments of differing masses and velocities, and illustrate the effects of temporary cavities on cervical neurovascular structures. Using this framework, a new shirt to be worn under body armour that incorporates ballistic cervical protection has been developed for use in Afghanistan. New designs of the collar validated by human factors and assessment of coverage are currently being incorporated into early versions of the numerical model. The aim of this paper is to describe this developmental framework and provide an update on the current progress of its individual components. Crown Copyright © 2012. Published by Elsevier Ltd. All rights reserved.

  17. A Hyperknowledge Framework of Decision Support Systems.

    Science.gov (United States)

    Chang, Ai-Mei; And Others

    1994-01-01

    Presents a hyperknowledge framework of decision support systems (DSS). This framework formalizes specifics about system functionality, representation of knowledge, navigation of the knowledge system, and user-interface traits as elements of a DSS environment that conforms closely to human cognitive processes in decision making. (Contains 52…

  18. SMART core protection system design

    International Nuclear Information System (INIS)

    Lee, J. K.; Park, H. Y.; Koo, I. S.; Park, H. S.; Kim, J. S.; Son, C. H.

    2003-01-01

    SMART COre Protection System(SCOPS) is designed with real-tims Digital Signal Processor(DSP) board and Network Interface Card(NIC) board. SCOPS has a Control Rod POSition (CRPOS) software module while Core Protection Calculator System(CPCS) consists of Core Protection Calculators(CPCs) and Control Element Assembly(CEA) Calculators(CEACs) in the commercial nuclear plant. It's not necessary to have a independent cabinets for SCOPS because SCOPS is physically very small. Then SCOPS is designed to share the cabinets with Plant Protection System(PPS) of SMART. Therefor it's very easy to maintain the system because CRPOS module is used instead of the computer with operating system

  19. Distributed Supervisory Protection Interlock System

    International Nuclear Information System (INIS)

    Walz, H.V.; Agostini, R.C.; Barker, L.; Cherkassky, R.; Constant, T.; Matheson, R.

    1989-03-01

    The Distributed Supervisory Protection Interlock System, DSPI, is under development at the Stanford Linear Accelerator Center for requirements in the areas of personnel protection, beam containment and equipment protection interlocks. The DSPI system, distributed over the application site, consists of segments with microprocessor-based controller and I/O modules, local area networks for communication, and a global supervisor computer. Segments are implemented with commercially available controller and I/O modules arranged in local interlock clusters, and associated software. Segments provide local interlock data acquisition, processing and control. Local area networks provide the communication backbone between segments and a global supervisor processor. The supervisor processor monitors the overall system, reports detail status and provides human interfaces. Details of an R and D test system, which will implement the requirements for personnel protection of 4 typical linear accelerator sectors, will be described. 4 refs., 2 figs

  20. The EURATOM legal framework in health protection and nuclear safety

    International Nuclear Information System (INIS)

    Mondoloni, F.

    2010-01-01

    The EURATOM treaty and its derived legislation constitute a standardised base to support the development of nuclear power throughout the European Union. Health protection against the effects of radioactivity and nuclear safety are a key component of this system. For 50 years, common obligations have been gradually defined and updated to guarantee radiological protection of the peoples and the environment of Europe. At a time when increasing numbers of countries are looking to switch to or strengthen the position of nuclear power in their energy mix, health protection issues are once again topical. The Commission is taking advantage of this particular context to propose new standards, while at the same time internationally promoting the idea of a European regulatory model. Europe, whose technological expertise in the nuclear field is undisputed, has everything to gain from disseminating its radiation protection and nuclear safety values worldwide. However, while exploring new areas for community harmonization in these fields, a necessary balance needs to be retained with national systems which have proven their worth, while taking account of the respective competence of the Community and the Member States. It is by defending national positions with the community institutions that it is possible to contribute to this balance. The General Secretariat for European Affairs (SGAE), the EURATOM technical committee (CTE) and France's Permanent Representation in Brussels, form an effective system for formulating and defending these positions, thus helping to orient community work on nuclear issues. (author)

  1. Power system protection 3 application

    CERN Document Server

    1995-01-01

    The worldwide growth in demand for electricity has forced the pace of developments in electrical power system design to meet consumer needs for reliable, secure and cheap supplies. Power system protection, as a technology essential to high quality supply, is widely recognised as a specialism of growing and often critical importance, in which power system needs and technological progress have combined to result in rapid developments in policy and practice in recent years. In the United Kingdom, the need for appropriate training in power system protection was recognised in the early 1960s with t

  2. A framework for systems engineering research

    CSIR Research Space (South Africa)

    Erasmus, L

    2013-08-01

    Full Text Available This presentation discusses a framework which is proposed to perform systems engineering research within South Africa and the necessity for hybrid research methods in systems engineering....

  3. Reactor protection system. Revision 1

    International Nuclear Information System (INIS)

    Fairbrother, D.B.; Vincent, D.R.; Lesniak, L.M.

    1975-04-01

    The reactor protection system-II (RPS-II) designed for use on Babcock and Wilcox 145- and 205-fuel assembly pressurized water reactors is described. In this system, relays in the trip logic have been replaced by solid state devices. A calculating module for the low DNBR, pump status, and offset trip functions has replaced the overpower trip (based on flow and imbalance), the power/RC pump trip, and the variable low pressure trip. Included is a description of the changes from the present Oconee-type reactor protection system (RPS-I), a functional and hardware description of the calculating module, and a discussion of the qualification program conducted to ensure that the degree of protection provided by RPS-II is not less than that provided by previously licensed systems supplied by B and W. (U.S.)

  4. Modern thyratron crowbar protection systems

    International Nuclear Information System (INIS)

    Judd, D.A.; Kettle, L.J.; Menown, H.; Newton, B.P.; Nicholls, N.S.; Sheldrake, R.

    1992-01-01

    Two thyratron crowbar systems for high-power klystrons used in linear accelerators are described. The first, contained in an oil filled tank, is a complete system to protect a klystron powered from a 100-kV, 20-A d.c. supply. In the second system a CX1722 glass thyratron, operating in air, has been retrofitted to a test equipment, in place of a spark gap, to protect an Inductive Output Tube (IOT). An important parameter in the choice of the crowbar thyratron is the total coulombs to be switched. Measurements of these follow-on currents are presented. (R.P.) 4 refs.; 10 figs

  5. Sandia Laboratories plutonium protection system

    International Nuclear Information System (INIS)

    Bernard, E.A.; Miyoshi, D.S.; Gutierrez, F.D.

    1977-01-01

    Sandia Laboratories is developing an improved plutonium protection system (PPS) to demonstrate new concepts for enhancing special nuclear materials safeguards. PPS concepts include separation of functions, real-time item accountability and improved means for control of materials, activities and personnel access. Physical barriers and a secure communications network are designed into the system to offer greater protection against sabotage, diversion and theft attempts. Prototype systems are being constructed at Hanford, Washington and Albuquerque, New Mexico and will be subjected to a comprehensive testing and evaluation program

  6. A New Protection Orientation and Framework for Refugees and Other Forced Migrants

    OpenAIRE

    James C. Simeon

    2017-01-01

    The unprecedented current “refugee crisis,” with its 65 million plus uprooted people, demands a new protection orientation and framework for refugees and other forced migrants that are focused on the “root causes” of refugeehood, non-international protracted armed conflict or civil war. It is argued that four essential reforms are required to the international refugee protection system to respond to the “root causes” of refugees in the world today. The first calls for broadening the definitio...

  7. Standpipe systems for fire protection

    CERN Document Server

    Isman, Kenneth E

    2017-01-01

    This important new manual goes beyond the published NFPA standards on installation of standpipe systems to include the rules in the International Building Code, municipal fire codes, the National Fire Code of Canada, and information on inspection, testing, and maintenance of standpipe systems. Also covered are the interactions between standpipe and sprinkler systems, since these important fire protection systems are so frequently installed together. Illustrated with design examples and practical applications to reinforce the learning experience, this is the go-to reference for engineers, architects, design technicians, building inspectors, fire inspectors, and anyone that inspects, tests or maintains fire protection systems. Fire marshals and plan review authorities that have the responsibility for reviewing and accepting plans and hydraulic calculations for standpipe systems are also an important audience, as are firefighters who actually use standpipe systems. As a member of the committees responsible for s...

  8. A general framework for intelligent recommender systems

    Directory of Open Access Journals (Sweden)

    Jose Aguilar

    2017-07-01

    Full Text Available In this paper, we propose a general framework for an intelligent recommender system that extends the concept of a knowledge-based recommender system. The intelligent recommender system exploits knowledge, learns, discovers new information, infers preferences and criticisms, among other things. For that, the framework of an intelligent recommender system is defined by the following components: knowledge representation paradigm, learning methods, and reasoning mechanisms. Additionally, it has five knowledge models about the different aspects that we can consider during a recommendation: users, items, domain, context and criticisms. The mix of the components exploits the knowledge, updates it and infers, among other things. In this work, we implement one intelligent recommender system based on this framework, using Fuzzy Cognitive Maps (FCMs. Next, we test the performance of the intelligent recommender system with specialized criteria linked to the utilization of the knowledge in order to test the versatility and performance of the framework.

  9. The Diamond machine protection system

    International Nuclear Information System (INIS)

    Heron, M.T.; Lay, S.; Chernousko, Y.; Hamadyk, P.; Rotolo, N.

    2012-01-01

    The Diamond Light Source Machine Protection System (MPS) manages the hazards from high power photon beams and other hazards to ensure equipment protection on the booster synchrotron and storage ring. The system has a shutdown requirement, on a beam mis-steer of under 1 msec and has to manage in excess of a thousand interlocks. This is realised using a combination of bespoke hardware and programmable logic controllers. The MPS monitors a large number of interlock signals from diagnostics instrumentation, vacuum instrumentation, photon front ends and plant monitoring subsystems. Based on logic it can then remove the source of the energy to ensure protection of equipment. Depending on requirements, interlocks are managed on a Local or a Global basis. The Global system is structured as two layers, and supports fast- and slow-response-time interlock requirements. A Global MPS module takes the interlock permits for a given interlock circuit from each of the cells of the accelerator, and, subject to all interlocks being good, produces a permit to operate the source of energy: the RF amplifier for vessel protection and the PSU for magnet protection. The Local MPS module takes fast Interlock inputs from one cell of the Storage Ring or one quadrant of the Booster. Fast interlocks are those that must drop the beam in under 400 μsec (the maximum speed of the interlock) in the event of failure. EPIC provides the user interface to the MPS system

  10. Conceptual Framework for Physical Protection Against Sabotage Considering Plant-specific Radiological Consequences

    International Nuclear Information System (INIS)

    Lee, Joung Hoon; Yu, Dong Han

    2010-01-01

    According to the Generation IV (Gen IV) Technology Roadmap, Gen IV nuclear energy systems (NESs) should highlight proliferation resistance and physical protection (PR and PP) as one of the four goals along with sustainability, safety and reliability, and economics. Especially, physical protection (PP) is the typical important characteristic of an NES that impedes the theft of materials suitable for nuclear explosives or radiation dispersal devices (RDD) and the sabotage of facilities and transportation by subnation entities and other non-Host State adversaries. These two subjects have been studied separately. Proliferation is commonly considered as an international concern and the past work on the PR assessments can be found. On the other hands, PP is regarded as a State security concern, much of which is classified and facility-dependent. Recently, more concern has been focused on the PP design and regulation because of rapid environment changes including radiological consequences by internal sabotage and nuclear terrorism by RDDs. The current PP Regulation has been applied intensively to the existing nuclear facilities and could be a possible guidance for the future GEN-IV NESs. This paper first reviews the IAEA guide document, INFCIRC/225, which was accepted as the standard international guideline in the physical protection area. It has been updated several times up to now, and is undergoing another revision. The paper introduces current substantial changes in the document regarding PP including the national nuclear security and sabotage in the nuclear facilities. Then, it presents a conceptual framework for physical protection against sabotage considering plant-specific radiological consequence after malicious acts within certain vital areas. The framework combines the newly developed method of vital area identification, the current PSA level 2 works, and physical protection concepts. This would help to improve a design concept of new physical protection

  11. Conceptual Framework for Physical Protection Against Sabotage Considering Plant-specific Radiological Consequences

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Joung Hoon; Yu, Dong Han [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2010-10-15

    According to the Generation IV (Gen IV) Technology Roadmap, Gen IV nuclear energy systems (NESs) should highlight proliferation resistance and physical protection (PR and PP) as one of the four goals along with sustainability, safety and reliability, and economics. Especially, physical protection (PP) is the typical important characteristic of an NES that impedes the theft of materials suitable for nuclear explosives or radiation dispersal devices (RDD) and the sabotage of facilities and transportation by subnation entities and other non-Host State adversaries. These two subjects have been studied separately. Proliferation is commonly considered as an international concern and the past work on the PR assessments can be found. On the other hands, PP is regarded as a State security concern, much of which is classified and facility-dependent. Recently, more concern has been focused on the PP design and regulation because of rapid environment changes including radiological consequences by internal sabotage and nuclear terrorism by RDDs. The current PP Regulation has been applied intensively to the existing nuclear facilities and could be a possible guidance for the future GEN-IV NESs. This paper first reviews the IAEA guide document, INFCIRC/225, which was accepted as the standard international guideline in the physical protection area. It has been updated several times up to now, and is undergoing another revision. The paper introduces current substantial changes in the document regarding PP including the national nuclear security and sabotage in the nuclear facilities. Then, it presents a conceptual framework for physical protection against sabotage considering plant-specific radiological consequence after malicious acts within certain vital areas. The framework combines the newly developed method of vital area identification, the current PSA level 2 works, and physical protection concepts. This would help to improve a design concept of new physical protection

  12. Controls and Machine Protection Systems

    CERN Document Server

    Carrone, E.

    2016-01-01

    Machine protection, as part of accelerator control systems, can be managed with a 'functional safety' approach, which takes into account product life cycle, processes, quality, industrial standards and cybersafety. This paper will discuss strategies to manage such complexity and the related risks, with particular attention to fail-safe design and safety integrity levels, software and hardware standards, testing, and verification philosophy. It will also discuss an implementation of a machine protection system at the SLAC National Accelerator Laboratory's Linac Coherent Light Source (LCLS).

  13. Regulatory Framework and Radiation Protection as Basis for Evaluation

    International Nuclear Information System (INIS)

    Elegba, S.B.

    2010-01-01

    Regulatory Framework for Nuclear Safety and Radiation Protection International Instruments: Conventions; Safety Fundamentals; Codes of Conduct; Safety Requirements and Guide, and National Instruments:-Legislation; Regulations; Guidance Documents. The Sustainable Development Principle recognizes a duty to prevent undue burden and degradation of the environment for future generations. The prime responsibility for safety must rest with the person or organization responsible for facilities…that give rise to radiation risks” (IAEA Safety Fundamentals – SF-1). Compliance with regulations and requirements imposed by the Regulatory Body shall not relieve the organization of its prime responsibility for safety. The regulatory body shall establish and implement appropriate arrangements for a systematic approach to quality management which extend throughout the range of responsibilities and functions undertaken.”. The IAEA self-assessment model for a Regulatory Body is based on a three tier approach. This model is modular and can be used and adopted for implementation by any regulator at any stage of maturity “Start up”, “On the way”, “Mature” Small, medium size, big. The IAEA is required by its Statute to promote international cooperation while regulating safety is a national responsibility. However, radiation risks may transcend national borders and international cooperation that serves to promote and enhance safety globally by exchanging experience and by improving capabilities to control hazards, to prevent accidents, to respond to emergencies and to mitigate any harmful consequences

  14. Power system protection 2 systems and methods

    CERN Document Server

    1995-01-01

    The worldwide growth in demand for electricity has forced the pace of developments in electrical power system design to meet consumer needs for reliable, secure and cheap supplies. Power system protection, as a technology essential to high quality supply, is widely recognised as a specialism of growing and often critical importance, in which power system needs and technological progress have combined to result in rapid developments in policy and practice in recent years. In the United Kingdom, the need for appropriate training in power system protection was recognised in the early 1960s with t

  15. The LHC quench protection system

    CERN Multimedia

    2009-01-01

    The new quench protection system (QPS) has the crucial roles of providing an early warning for any part of the superconducting coils and busbars that develop high resistance, as well as triggering the switch-off of the machine. Over 2000 new detectors will be installed around the LHC to make sure every busbar segment between magnets is monitored and protected. One of the major consolidation activities for the LHC is the addition of two new detectors to the quench protection system. A magnet quench occurs when part of the superconducting cable becomes normally-conducting. When the protection system detects an increased resistance the huge amount of energy stored in the magnet chains is safely extracted and ‘dumped’ into specially designed resistors. In the case of the main dipole chain, the stored energy in a single LHC sector is roughly the same as the kinetic energy of a passenger jet at cruising speed. The first new detector is designed to monitor the superconducting...

  16. NSTX-U Digital Coil Protection System Software Detailed Design

    Energy Technology Data Exchange (ETDEWEB)

    None

    2014-06-01

    The National Spherical Torus Experiment (NSTX) currently uses a collection of analog signal processing solutions for coil protection. Part of the NSTX Upgrade (NSTX-U) entails replacing these analog systems with a software solution running on a conventional computing platform. The new Digital Coil Protection System (DCPS) will replace the old systems entirely, while also providing an extensible framework that allows adding new functionality as desired.

  17. Evaluation of mobile systems: an integrative framework.

    NARCIS (Netherlands)

    Högler, T.; Versendaal, J.; Batenburg, R.

    2015-01-01

    This work presents an integrative framework for the evaluation of mobile systems. In comparison to stationary systems, mobile systems have a bundle of specific singularities that should be considered for evaluation. Further analysis of existing approaches clarifies that an integrative approach for

  18. Managing for climate change on protected areas: An adaptive management decision making framework.

    Science.gov (United States)

    Tanner-McAllister, Sherri L; Rhodes, Jonathan; Hockings, Marc

    2017-12-15

    Current protected area management is becoming more challenging with advancing climate change and current park management techniques may not be adequate to adapt for effective management into the future. The framework presented here provides an adaptive management decision making process to assist protected area managers with adapting on-park management to climate change. The framework sets out a 4 step process. One, a good understanding of the park's context within climate change. Secondly, a thorough understanding of the park management systems including governance, planning and management systems. Thirdly, a series of management options set out as an accept/prevent change style structure, including a systematic assessment of those options. The adaptive approaches are defined as acceptance of anthropogenic climate change impact and attempt to adapt to a new climatic environment or prevention of change and attempt to maintain current systems under new climatic variations. Last, implementation and monitoring of long term trends in response to ecological responses to management interventions and assessing management effectiveness. The framework addresses many issues currently with park management in dealing with climate change including the considerable amount of research focussing on 'off-reserve' strategies, and threats and stress focused in situ park management. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. A Study on Developing a Framework for Sabotage Protection of Nuclear Facilities

    International Nuclear Information System (INIS)

    Kim, Kilyoo; Jung, WooSik

    2007-01-01

    A methodology related to physical protection of nuclear facilities against sabotage is preparing by IAEA. However, the framework of IAEA is somewhat superficial and it seems not to reflect the risk concept since IAEA prefers a proven technology. In this paper, a framework for sabotage protection of nuclear facilities using risk assessment is described

  20. Visualization framework for CAVE virtual reality systems

    OpenAIRE

    Kageyama, Akira; Tomiyama, Asako

    2016-01-01

    We have developed a software framework for scientific visualization in immersive-type, room-sized virtual reality (VR) systems, or Cave automatic virtual environment (CAVEs). This program, called Multiverse, allows users to select and invoke visualization programs without leaving CAVE’s VR space. Multiverse is a kind of immersive “desktop environment” for users, with a three-dimensional graphical user interface. For application developers, Multiverse is a software framework with useful class ...

  1. The Protection of Classified Information: The Legal Framework

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2006-01-01

    Recent incidents involving leaks of classified information have heightened interest in the legal framework that governs security classification, access to classified information, and penalties for improper disclosure...

  2. Planetary protection in the framework of the Aurora exploration program

    Science.gov (United States)

    Kminek, G.

    The Aurora Exploration Program will give ESA new responsibilities in the field of planetary protection. Until now, ESA had only limited exposure to planetary protection from its own missions. With the proposed ExoMars and MSR missions, however, ESA will enter the realm of the highest planetary protection categories. As a consequence, the Aurora Exploration Program has initiated a number of activities in the field of planetary protection. The first and most important step was to establish a Planetary Protection Working Group (PPWG) that is advising the Exploration Program Advisory Committee (EPAC) on all matters concerning planetary protection. The main task of the PPWG is to provide recommendations regarding: Planetary protection for robotic missions to Mars; Planetary protection for a potential human mission to Mars; Review/evaluate standards & procedures for planetary protection; Identify research needs in the field of planetary protection. As a result of the PPWG deliberations, a number of activities have been initiated: Evaluation of the Microbial Diversity in SC Facilities; Working paper on legal issues of planetary protection and astrobiology; Feasibility study on a Mars Sample Return Containment Facility; Research activities on sterilization procedures; Training course on planetary protection (May, 2004); Workshop on sterilization techniques (fall 2004). In parallel to the PPWG, the Aurora Exploration Program has established an Ethical Working Group (EWG). This working group will address ethical issues related to astrobiology, planetary protection, and manned interplanetary missions. The recommendations of the working groups and the results of the R&D activities form the basis for defining planetary protection specification for Aurora mission studies, and for proposing modification and new inputs to the COSPAR planetary protection policy. Close cooperation and free exchange of relevant information with the NASA planetary protection program is strongly

  3. X-framework: Space system failure analysis framework

    Science.gov (United States)

    Newman, John Steven

    Space program and space systems failures result in financial losses in the multi-hundred million dollar range every year. In addition to financial loss, space system failures may also represent the loss of opportunity, loss of critical scientific, commercial and/or national defense capabilities, as well as loss of public confidence. The need exists to improve learning and expand the scope of lessons documented and offered to the space industry project team. One of the barriers to incorporating lessons learned include the way in which space system failures are documented. Multiple classes of space system failure information are identified, ranging from "sound bite" summaries in space insurance compendia, to articles in journals, lengthy data-oriented (what happened) reports, and in some rare cases, reports that treat not only the what, but also the why. In addition there are periodically published "corporate crisis" reports, typically issued after multiple or highly visible failures that explore management roles in the failure, often within a politically oriented context. Given the general lack of consistency, it is clear that a good multi-level space system/program failure framework with analytical and predictive capability is needed. This research effort set out to develop such a model. The X-Framework (x-fw) is proposed as an innovative forensic failure analysis approach, providing a multi-level understanding of the space system failure event beginning with the proximate cause, extending to the directly related work or operational processes and upward through successive management layers. The x-fw focus is on capability and control at the process level and examines: (1) management accountability and control, (2) resource and requirement allocation, and (3) planning, analysis, and risk management at each level of management. The x-fw model provides an innovative failure analysis approach for acquiring a multi-level perspective, direct and indirect causation of

  4. Large thermal protection system panel

    Science.gov (United States)

    Weinberg, David J. (Inventor); Myers, Franklin K. (Inventor); Tran, Tu T. (Inventor)

    2003-01-01

    A protective panel for a reusable launch vehicle provides enhanced moisture protection, simplified maintenance, and increased temperature resistance. The protective panel includes an outer ceramic matrix composite (CMC) panel, and an insulative bag assembly coupled to the outer CMC panel for isolating the launch vehicle from elevated temperatures and moisture. A standoff attachment system attaches the outer CMC panel and the bag assembly to the primary structure of the launch vehicle. The insulative bag assembly includes a foil bag having a first opening shrink fitted to the outer CMC panel such that the first opening and the outer CMC panel form a water tight seal at temperatures below a desired temperature threshold. Fibrous insulation is contained within the foil bag for protecting the launch vehicle from elevated temperatures. The insulative bag assembly further includes a back panel coupled to a second opening of the foil bag such that the fibrous insulation is encapsulated by the back panel, the foil bag, and the outer CMC panel. The use of a CMC material for the outer panel in conjunction with the insulative bag assembly eliminates the need for waterproofing processes, and ultimately allows for more efficient reentry profiles.

  5. An Agent Framework of Tourism Recommender System

    Directory of Open Access Journals (Sweden)

    Jia Zhi Yang

    2016-01-01

    Full Text Available This paper proposes the development of an Agent framework for tourism recommender system. The recommender system can be featured as an online web application which is capable of generating a personalized list of preference attractions for tourists. Traditional technologies of classical recommender system application domains, such as collaborative filtering, content-based filtering and content-based filtering are effectively adopted in the framework. In the framework they are constructed as Agents that can generate recommendations respectively. Recommender Agent can generate recommender information by integrating the recommendations of Content-based Agent, collaborative filtering-based Agent and constraint-based Agent. In order to make the performance more effective, linear combination method of data fusion is applied. User interface is provided by the tourist Agent in form of webpages and mobile app.

  6. A framework to protect mobile agents by using reference states

    OpenAIRE

    Hohl, Fritz

    2000-01-01

    To protect mobile agents from attacks by their execution environments, or hosts, one class of protection mechanisms uses 'reference states' to detect modification attacks. Reference states are agent states that have been produced by non-attacking, or reference hosts. This paper examines this class of mechanisms and present the bandwidth of the achieved protection. First, a new general definition of attacks against mobile agents is presented. As this general definition does not lead to a pract...

  7. A security framework for systems of systems

    NARCIS (Netherlands)

    Trivellato, D.; Zannone, N.; Etalle, S.

    2011-01-01

    Systems of systems consist of a wide variety of dynamic, distributed coalitions of autonomous and heterogeneous systems that collaborate to achieve a common goal. While offering several advantages in terms of scalability and flexibility, this new paradigm has a strong impact on system

  8. A Security Framework for Systems of Systems

    NARCIS (Netherlands)

    Trivellato, Daniel; Zannone, Nicola; Etalle, Sandro

    2011-01-01

    Systems of systems consist of a wide variety of dynamic, distributed coalitions of autonomous and heterogeneous systems that collaborate to achieve a common goal. While offering several advantages in terms of scalability and flexibility, this new paradigm has a strong impact on system

  9. ETHIOPIAN WITNESS PROTECTION SYSTEM: COMPARATIVE ...

    African Journals Online (AJOL)

    witness protection involves social cohesion of the protected person. Scholars ..... interests' need to balance an accused right to know and confront prosecution ..... was reduced to 2.5 years through the fast tracking of witness protection cases.

  10. A Security Audit Framework to Manage Information System Security

    Science.gov (United States)

    Pereira, Teresa; Santos, Henrique

    The widespread adoption of information and communication technology have promoted an increase dependency of organizations in the performance of their Information Systems. As a result, adequate security procedures to properly manage information security must be established by the organizations, in order to protect their valued or critical resources from accidental or intentional attacks, and ensure their normal activity. A conceptual security framework to manage and audit Information System Security is proposed and discussed. The proposed framework intends to assist organizations firstly to understand what they precisely need to protect assets and what are their weaknesses (vulnerabilities), enabling to perform an adequate security management. Secondly, enabling a security audit framework to support the organization to assess the efficiency of the controls and policy adopted to prevent or mitigate attacks, threats and vulnerabilities, promoted by the advances of new technologies and new Internet-enabled services, that the organizations are subject of. The presented framework is based on a conceptual model approach, which contains the semantic description of the concepts defined in information security domain, based on the ISO/IEC_JCT1 standards.

  11. The primary protection system software

    International Nuclear Information System (INIS)

    Tooley, P.A.

    1992-01-01

    This paper continues the detailed description of the Primary Protection System for Sizewell-B by providing an overview of design and implementation of the software, including the features of the design process which ensure that quality is delivered by the contractor. The Nuclear Electric software assessment activities are also described. The argument for the excellence of the software is made on the basis of a quality product delivered by the equipment supplier's design process, and the confirmation of this provided by the Nuclear Electric assessment process, which is as searching and complete an examination as is reasonably practicable to achieve. (author)

  12. A systems approach framework for coastal zones

    DEFF Research Database (Denmark)

    Hopkins, Tom Sawyer; Bailly, Denis; Støttrup, Josianne

    2011-01-01

    This Special Feature Volume examines the potential value of the Systems Approach Framework (SAF) as a methodological framework for the transition to sustainable development in coastal zones. This article provides insight on the Systems Approach, the theory behind it, and how its practical...... application to coastal zone systems (CZSs) was developed. The SAF is about information for management through a focus on how to generate a higher, dynamic level of information about complex CZSs and how to render this information more useful to end users through a participatory suite of communication methods....... The SAF is an open research methodology that investigates the function of systems in order to simulate specific issues or questions concerning their function. The research articles that are included in this Volume demonstrate examples of coupled multidisciplinary methods integrated into SAF simulations...

  13. System architecture for microprocessor based protection system

    International Nuclear Information System (INIS)

    Gallagher, J.M. Jr.; Lilly, G.M.

    1976-01-01

    This paper discusses the architectural design features to be employed by Westinghouse in the application of distributed digital processing techniques to the protection system. While the title of the paper makes specific reference to microprocessors, this is only one (and the newest) of the building blocks which constitutes a distributed digital processing system. The actual system structure (as realized through utilization of the various building blocks) is established through considerations of reliability, licensability, and cost. It is the intent of the paper to address these considerations licenstions as they relate to the architectural design features. (orig.) [de

  14. The ngdp framework for data acquisition systems

    OpenAIRE

    Isupov, A. Yu.

    2010-01-01

    The ngdp framework is intended to provide a base for the data acquisition (DAQ) system software. The ngdp's design key features are: high modularity and scalability; usage of the kernel context (particularly kernel threads) of the operating systems (OS), which allows to avoid preemptive scheduling and unnecessary memory--to--memory copying between contexts; elimination of intermediate data storages on the media slower than the operating memory like hard disks, etc. The ngdp, having the above ...

  15. SCORPIO: a framework for core surveillance systems

    International Nuclear Information System (INIS)

    Berg, Oe.; Tsuiki, Makoto

    1999-01-01

    The first version of the core surveillance system SCORPIO was installed at Unit 2, Ringhals, in 1984. It was implemented on Norsk Data mini-computers with a fully graphical user-interface. The main purpose was to provide a practical tool for reactor operators and reactor physicists for on-line monitoring and predictive analysis of core behaviour. A second version of SCORPIO was developed in 1993-1995 and implemented on Unix workstations. In addition to upgrading the system at Ringhals, the system was installed by Duke Power, USA, on 7 reactors. SCORPIO was also installed on the Sizewell B reactor. Recently a new framework has been developed which further enhances the flexibility and capabilities for implementing core surveillance systems in different types of nuclear power plants. Modules can be added and replaced in an easy manner. It allows fast and reliable communication of data between modules based on the Software Bus tool developed by IFE. Further, the Picasso-3 user interface management system supports efficient implementation of different user interfaces. Both Unix and Windows NT platforms are supported. The new framework has been applied in development and installation of a SCORPIO-VVER version for the Dukovany NPP, Czech Republic. Here it was of particular importance to provide a flexible system for integration of modules originating from different companies. Development of a BWR version is now in progress. This means that SCORPIO will be available for all the major reactor types, and synergy is obtained by application of a common framework both with respect to system implementation and maintenance. By using the SCORPIO framework, the development time is reduced and the maintenance work is carried out more efficiently, compared to developing systems with lower-level tools. For instance, the MMI can be developed and tested independently of the physics modules

  16. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  17. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  18. Wind turbine with lightning protection system

    DEFF Research Database (Denmark)

    2016-01-01

    The present invention relates to a wind turbine comprising a lightning protection system comprising a waveguide interconnecting a communication device and a signal-carrying structure. In other aspects, the present invention relates to the use of a waveguide in a lightning protection system...... of a wind turbine, a power splitter and its use in a lightning protection system of a wind turbine....

  19. The international safeguards system and physical protection

    International Nuclear Information System (INIS)

    Canty, M.J.; Lauppe, W.D.; Richter, B.; Stein, G.

    1990-02-01

    The report summarizes and explains facts and aspects of the IAEA safeguards performed within the framework of the Non-Proliferation Treaty, and shows perspectives to be discussed by the NPT Review Conferences in 1990 and 1995. The technical background of potential misuse of nuclear materials for military purposes is explained in connection with the physical protection regime of the international safeguards, referring to recent developments for improvement of technical measures for material containment and surveillance. Most attention is given to the peaceful uses of nuclear energy and their surveillance by the IAEA safeguards, including such new technologies and applications as controlled nuclear fusion, laser techniques for uranium enrichment, and particle accelerators. The report's concluding analyses of the current situation show potentials for improvement and desirable or necessary consequences to be drawn for the international safeguards system, also taking into account recent discussions on the parliamentary level. (orig./HP) [de

  20. Automating occupational protection records systems

    International Nuclear Information System (INIS)

    Lyon, M.; Martin, J.B.

    1991-10-01

    Occupational protection records have traditionally been generated by field and laboratory personnel, assembled into files in the safety office, and eventually stored in a warehouse or other facility. Until recently, these records have been primarily paper copies, often handwritten. Sometimes, the paper is microfilmed for storage. However, electronic records are beginning to replace these traditional methods. The purpose of this paper is to provide guidance for making the transition to automated record keeping and retrieval using modern computer equipment. This paper describes the types of records most readily converted to electronic record keeping and a methodology for implementing an automated record system. The process of conversion is based on a requirements analysis to assess program needs and a high level of user involvement during the development. The importance of indexing the hard copy records for easy retrieval is also discussed. The concept of linkage between related records and its importance relative to reporting, research, and litigation will be addressed. 2 figs

  1. An Advanced Private Social Activity Invitation Framework with Friendship Protection

    Directory of Open Access Journals (Sweden)

    Weitian Tong

    2017-01-01

    Full Text Available Due to the popularity of social networks and human-carried/human-affiliated devices with sensing abilities, like smartphones and smart wearable devices, a novel application was necessitated recently to organize group activities by learning historical data gathered from smart devices and choosing invitees carefully based on their personal interests. We proposed a private and efficient social activity invitation framework. Our main contributions are (1 defining a novel friendship to reduce the communication/update cost within the social network and enhance the privacy guarantee at the same time; (2 designing a strong privacy-preserving algorithm for graph publication, which addresses an open concern proposed recently; (3 presenting an efficient invitee-selection algorithm, which outperforms the existing ones. Our simulation results show that the proposed framework has good performance. In our framework, the server is assumed to be untrustworthy but can nonetheless help users organize group activities intelligently and efficiently. Moreover, the new definition of the friendship allows the social network to be described by a directed graph. To the best of our knowledge, it is the first work to publish a directed graph in a differentially private manner with an untrustworthy server.

  2. FPGA-Based Plant Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yoon Hee; Ha, Jae Hong; Kim, Hang Bae [KEPCO E and C, Daejeon (Korea, Republic of)

    2011-08-15

    This paper relates to a plant protection system which detects non-permissible conditions and determines initiation of protective actions for nuclear power plants (NPPs). Conventional plant protection systems were designed based on analog technologies. It is well known that existing protection systems for NPPs contain many components which are becoming obsolete at an increasing rate. Nowadays maintenance and repair for analog-based plant protection systems may be difficult as analog parts become obsolete or difficult to obtain. Accordingly, as an alternative to the analog technology, the digitalisation of the plant protection system was required. Recently digital plant protection systems which include programmable logic controllers (PLCs) and/or computers have been introduced. However PLC or computer-based plant protection systems use an operating system and application software, and so they may result in a common mode failure when a problem occurs in the operating system or application software. Field Programmable Gate Arrays (FPGAs) are highlighted as an alternative to conventional protection or control systems. The paper presents the design of a four-channel plant protection system whose protection functions are implemented in FPGAs without any central processing unit or operating system.

  3. FPGA-Based Plant Protection System

    International Nuclear Information System (INIS)

    Lee, Yoon Hee; Ha, Jae Hong; Kim, Hang Bae

    2011-01-01

    This paper relates to a plant protection system which detects non-permissible conditions and determines initiation of protective actions for nuclear power plants (NPPs). Conventional plant protection systems were designed based on analog technologies. It is well known that existing protection systems for NPPs contain many components which are becoming obsolete at an increasing rate. Nowadays maintenance and repair for analog-based plant protection systems may be difficult as analog parts become obsolete or difficult to obtain. Accordingly, as an alternative to the analog technology, the digitalisation of the plant protection system was required. Recently digital plant protection systems which include programmable logic controllers (PLCs) and/or computers have been introduced. However PLC or computer-based plant protection systems use an operating system and application software, and so they may result in a common mode failure when a problem occurs in the operating system or application software. Field Programmable Gate Arrays (FPGAs) are highlighted as an alternative to conventional protection or control systems. The paper presents the design of a four-channel plant protection system whose protection functions are implemented in FPGAs without any central processing unit or operating system

  4. Deficiencies in radiation protection record systems

    International Nuclear Information System (INIS)

    Martin, J.B.; Lyon, M.

    1991-01-01

    Radiation protection records are a fundamental part of any program for protecting radiation workers. Records are essential to epidemiological studies of radiation workers and are becoming increasingly important as the number of radiation exposure litigation cases increases. Ready retrievability of comprehensive records is also essential to the adequate defense of a radiation protection program. Appraisals of numerous radiation protection programs have revealed that few record-keeping systems comply with American National Standards Institute, Standard Practice N13.6-1972. Record-keeping requirements and types of deficiencies in radiation protection records systems are presented in this paper, followed by general recommendations for implementing a comprehensive radiation protection records system

  5. Deficiencies in radiation protection record systems

    International Nuclear Information System (INIS)

    Martin, J.B.; Lyon, M.

    1991-01-01

    Radiation protection records are a fundamental part of any program for protecting radiation workers. Records are essential to epidemiological studies of radiation workers and are becoming increasingly important as the number of radiation exposure litigation cases increases. Ready retrievability of comprehensive records is also essential to the adequate defense of a radiation protection program. Appraisals of numerous radiation protection programs have revealed that few record-keeping systems comply with American National Standards Institute, Standard Practice N13.6-1972. Record-keeping requirements and types of deficiencies in radiation protection records systems are presented in this paper, followed by general recommendations for implementing a comprehensive radiation protection records system. 8 refs

  6. System architecture of a mixed reality framework

    OpenAIRE

    Seibert, Helmut; Dähne, Patrick

    2006-01-01

    In this paper the software architecture of a framework which simplifies the development of applications in the area of Virtual and Augmented Reality is presented. It is based on VRML/X3D to enable rendering of audio-visual information. We extended our VRML rendering system by a device management system that is based on the concept of a data-flow graph. The aim of the system is to create Mixed Reality (MR) applications simply by plugging together small prefabricated software components, instea...

  7. The ngdp framework for data acquisition systems

    International Nuclear Information System (INIS)

    Isupov, A.Yu.

    2010-01-01

    The ngdp framework is intended to provide a base for the data acquisition (DAQ) system software. The ngdp's design key features are: high modularity and scalability; usage of the kernel context (particularly kernel threads) of the operating systems (OS), which allows one to avoid preemptive scheduling and unnecessary memory-to-memory copying between contexts; elimination of intermediate data storages on the media slower than the operating memory like hard disks, etc. The ngdp, having the above properties, is suitable to organize and manage data transportation and processing for needs of essentially distributed DAQ systems

  8. A Framework for Concrete Reputation-Systems

    DEFF Research Database (Denmark)

    Krukow, Karl Kristian; Nielsen, Mogens; Sassone, Vladimiro

    2005-01-01

    -based trust-management systems aim to provide any formal security-guarantees. We provide a mathematical framework for a class of simple reputation-based systems. In these systems, decisions about interaction are taken based on policies that are exact requirements on agents' past histories. We present a basic...... declarative language, based on pure-past linear temporal logic, intended for writing simple policies. While the basic language is reasonably expressive, we extend it to encompass more practical policies, including several known from the literature. A naturally occurring problem becomes how to efficiently re...

  9. Mission-Critical Systems Design Framework

    Directory of Open Access Journals (Sweden)

    Kyriakos Houliotis

    2018-03-01

    Full Text Available Safety-critical systems are well documented and standardized (e.g. IEC 61508, RTCA DO-178B within system design cycles. However in Defence and Security, systems that are critical to the success of a Mission are not defined within the literature nor are there any guidelines in defining criticality in their design or operational capabilities. When it comes to Vetronics (Vehicle Electronics, a mission-critical system, is a system with much complexity and mixed criticality levels that is a part of the overall platform (military vehicle offering integrated system capabilities. In this paper, a framework is presented, providing guidelines in designing efficiently and effectively mission-critical systems considering principles of Interoperable Open Architectures (IOA, mission-critical integrity levels and following new standardization activities such as NATO Generic Vehicle Architecture (NGVA. A Defensive Aid Suite (DAS system is used as a case study to illustrate how this framework can be exploited. The indention of this extension is to provide an approach to precisely estimate threats in order to de-risk missions in the very early stages.

  10. Digital protection in power plants. Electrical unit and line protection. Digital protection systems for NPP

    International Nuclear Information System (INIS)

    Kaczmarek, A.

    2000-01-01

    In this presentation author deals with the digital protection systems for nuclear power plants. The evolution of protection devices, protection concept for power plants, concept of functional redundancy, references for digital protection, benefits for the customer well as concept fault recorder are presented. (author)

  11. Distributed radiation protection console system

    International Nuclear Information System (INIS)

    Chhokra, R.S.; Deshpande, V.K.; Mishra, H.; Rajeev, K.P.; Thakur, Bipla B.; Munj, Niket

    2004-01-01

    Radiation exposure control is one of the most important aspects in any nuclear facility . It encompasses continuous monitoring of the various areas of the facility to detect any increase in the radiation level and/or the air activity level beyond preset limits and alarm the O and M personnel working in these areas. Detection and measurement of radiation level and the air activity level is carried out by a number of monitors installed in the areas. These monitors include Area Gamma Monitors, Continuous Air Monitors, Pu-In-Air Monitors, Criticality Monitors etc. Traditionally, these measurements are displayed and recorded on a Central Radiation Protection Console(CRPC), which is located in the central control room of the facility. This methodology suffers from the shortcoming that any worker required to enter a work area will have to inquire about the radiation status of the area either from the CRPC or will get to know the same directly from the installed only after entering the area. This shortcoming can lead to avoidable delays in attending to the work or to unwanted exposure. The authors have designed and developed a system called Distributed Radiation Protection Console (DRPC) to overcome this shortcoming. A DRPC is a console which is located outside the entrance of a given area and displays the radiation status of the area. It presents to health physicist and the plant operators a graphic over-view of the radiation and air activity levels in the particular area of the plant. It also provides audio visual annunciation of the alarm status. Each radioactive area in a nuclear facility will have its own DRPC, which will receive as its inputs the analog and digital signals from radiation monitoring instruments installed in the area and would not only show those readings on its video graphic screen but will also provide warning messages and instructions to the personnel entering the active areas. The various DRPCs can be integrated into a Local Area Network, where the

  12. Model-based version management system framework

    International Nuclear Information System (INIS)

    Mehmood, W.

    2016-01-01

    In this paper we present a model-based version management system. Version Management System (VMS) a branch of software configuration management (SCM) aims to provide a controlling mechanism for evolution of software artifacts created during software development process. Controlling the evolution requires many activities to perform, such as, construction and creation of versions, identification of differences between versions, conflict detection and merging. Traditional VMS systems are file-based and consider software systems as a set of text files. File based VMS systems are not adequate for performing software configuration management activities such as, version control on software artifacts produced in earlier phases of the software life cycle. New challenges of model differencing, merge, and evolution control arise while using models as central artifact. The goal of this work is to present a generic framework model-based VMS which can be used to overcome the problem of tradition file-based VMS systems and provide model versioning services. (author)

  13. IMPORTANCE OF THE AGRI-ENVIRONMENTAL AND CLIMATE SCHEME WITHIN THE FRAMEWORK OF THE ENVIRONMENTAL PROTECTION SYSTEM (IN THE LIGHT OF THE POLISH RURAL DEVELOPMENT PROGRAMME 2014–2020

    Directory of Open Access Journals (Sweden)

    Bartosz Mickiewicz

    2015-12-01

    Full Text Available The study discusses the agri-environment scheme, which gained a high position in the process of integration of environmental protection in the framework of the CAP. The purpose of the payments was to encourage farmers to protect and improve the environment. The farmers were required to apply environmentally friendly techniques and practices for a period of fi ve years. Received payments had additional reimbursement of extra costs and decreased income resulting from the application of environment-friendly practices. Agrienvironmental scheme was realized through packages and variants, whose number diff ered in time. In 2004–2006, agrienvironmental scheme included approximately 70 thousand of agricultural holdings, which labored on the surface of the 1.4 million ha. In the next programming period (2007–2013 the benefi ciaries submitted 448,6 thousand applications, and the level of payment amounted to PLN 6.7 billion. The program of the current fi nancial perspective (2014–2020 includes 2058,9 thousand ha of agricultural land, as compared to the total area of agricultural land in the country in the amount of 14609 ha of agricultural land represents 14.1%

  14. Framework for the Protection of the Environment from Ionising Radiation (invited paper)

    Energy Technology Data Exchange (ETDEWEB)

    Strand, P.; Brown, J.E.; Larsson, M

    2000-07-01

    A framework is proposed for the protection of the environment from ionising radiation. Key components include the assessment of the environmental transfer of radionuclides and uptake of radionuclides by organisms, the adaptation of existing dosimetric models to calculate absorbed doses and studies concerning dose-effects relationships for selected organisms. The proposed framework will also make use of 'reference' organisms, selection of which will be based on a number of criteria, e.g. radiosensitivity, ubiquity, and will involve the development of standardised biota exposure units which might integrate the Relative Biological Effect (RBE) of the radiation under consideration. In the second part of the study, initial efforts have been made to develop a computerised system in order to provide a simple example of how components of this framework may be formulated. An equilibrium absorbed dose constant model has been used for high LET (Linear Energy Transfer) radionuclides combined with the application of an absorbed fraction for {gamma}-emitting radionuclides. Generalised specific activity information for selected radionuclides from Norwegian marine environments have been used as model input data. For the radionuclides considered, total doses for marine organisms (lobster, mussels, seaweed) ranged between 1.35-2.5 mGy.y{sup -1}, mainly attributable to {sup 40}K and {sup 210}Po. Such levels are well below those where observable effects might be expected. (author)

  15. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  16. Identity management and witness protection system

    OpenAIRE

    Paunović, Saša; Starčević, Dušan; Nešić, Lazar

    2013-01-01

    The protection of participants in criminal proceedings is one of the most important tools for prosecution of war crimes and organized crime cases. The paper presents the basic characteristics and the importance of implementing the Program of protection in criminal proceedings, with emphasis on the protection system and management of identity. Special attention was paid to challenges facing the protection system in criminal proceedings and the management of identities, which are caused by the ...

  17. Reactor protection and shut-down system

    International Nuclear Information System (INIS)

    Klar

    1980-01-01

    The reactor protection system being a part of the reactor safety system. The requirements on the reactor protection system are: high safety with regard to signal processing, high availability, self-reporting of faults etc. The functional sections of the reactor protection system are the analog section, the logic section and the generating of output signals. Description of the operation characteristics and of the extension of function. (orig.)

  18. Physical protection system design and evaluation

    International Nuclear Information System (INIS)

    Williams, J.D.

    1997-01-01

    The design of an effective physical protection system includes the determination of physical protection system objectives, initial design of a physical protection system, design evaluation, and probably a redesign or refinement. To develop the objectives, the designer must begin by gathering information about facility operation and conditions, such as a comprehensive description of the facility, operating conditions, and the physical protection requirements. The designer then needs to define the threat. This involves considering factors about potential adversaries: class of adversary, adversary's capabilities, and range of adversary's tactics. Next, the designer should identify targets. Determination of whether or not the materials being protected are attractive targets is based mainly on the ease or difficulty of acquisition and desirability of the material. The designer now knows the objectives of the physical protection system, that is, open-quotes what to protect against whom.close quotes The next step is to design the system by determining how best to combine such elements as fences, vaults, sensors and assessment devices, entry control elements, procedures, communication devices, and protective forces personnel to meet the objectives of the system. Once a physical protection system is designed, it must be analyzed and evaluated to ensure it meets the physical protection objectives. Evaluation must allow for features working together to ensure protection rather than regarding each feature separately. Due to the complexity of the protection systems, an evaluation usually requires modeling techniques. If any vulnerabilities are found, the initial system must be redesigned to correct the vulnerabilities and a reevaluation conducted. This paper reviews the physical protection system design and methodology mentioned above. Examples of the steps required and a brief introduction to some of the technologies used in modem physical protections system are given

  19. Radiological protection of patients: conceptual framework and new international recommendations

    International Nuclear Information System (INIS)

    Gisone, Pablo A.; Perez, Maria del R.

    2005-01-01

    Medical exposures represent the largest man-made source of radiation exposure. Within the concept medical exposures includes different kind of exposure: of patients as part of their own medical diagnosis or treatment; of individuals as part of occupational health surveillance; of individuals as part of health screening programs; of volunteers participating in biomedical research programs; of individuals as part of medico-legal procedures and of voluntary patient caregivers (relatives or friends). Radiological protection of patients (RPP) is founded on two basic principles: justification and optimization. The justification of a medical exposure is founded in the consideration that it will give a sufficient net benefit, including the direct health benefits to the patients and the potential benefits to society, against the individual detriment that the exposure might cause, taking into account the efficacy, benefits and risks of available alternative techniques having the same objective but involving no or less exposure to ionizing radiation. Concerning optimization in diagnosis, the radiological protection objective is to keep doses as low as reasonably achievable while obtaining the necessary diagnostic information. In therapy, the objective is to ensure that the target tissue is given the prescribed dose while minimizing the dose to surrounding healthy tissue. In this presentation we analyze new international recommendations concerning RPP, with emphasis in the Directive 97/43/EURATOM. The importance of referral guidelines to help physicians during the process of justification and use of diagnostic reference levels (to help in optimization) is discussed. (author)

  20. Biorepository regulatory frameworks: building parallel resources that both promote scientific investigation and protect human subjects.

    Science.gov (United States)

    Marko-Varga, György; Baker, Mark S; Boja, Emily S; Rodriguez, Henry; Fehniger, Thomas E

    2014-12-05

    Clinical samples contained in biorepositories represent an important resource for investigating the many factors that drive human biology. The biological and chemical markers contained in clinical samples provide important measures of health and disease that when combined with such medical evaluation data can aid in decision making by physicians. Nearly all disciplines in medicine and every "omic" depend upon the readouts obtained from such samples, whether the measured analyte is a gene, a protein, a lipid, or a metabolite. There are many steps in sample processing, storage, and management that need to understood by the researchers who utilize biorepositories in their own work. These include not only the preservation of the desired analytes in the sample but also good understanding of the moral and legal framework required for subject protection irrespective of where the samples have been collected. Today there is a great deal of effort in the community to align and standardize both the methodology of sample collection and storage performed in different locations and the necessary frameworks of subject protection including informed consent and institutional review of the studies being performed. There is a growing trend in developing biorepositories around the focus of large population-based studies that address both active and silent nonsymptomatic disease. Logistically these studies generate large numbers of clinical samples and practically place increasing demand upon health care systems to provide uniform sample handling, processing, storage, and documentation of both the sample and the subject as well to ensure that safeguards exist to protect the rights of the study subjects for deciding upon the fates of their samples. Currently the authority to regulate the entire scope of biorepository usage exists as national practice in law in only a few countries. Such legal protection is a necessary component within the framework of biorepositories, both now and in

  1. A Systems Approach Framework for Coastal Zones

    Directory of Open Access Journals (Sweden)

    Tom S. Hopkins

    2011-12-01

    Full Text Available This Special Feature Volume examines the potential value of the Systems Approach Framework (SAF as a methodological framework for the transition to sustainable development in coastal zones. This article provides insight on the Systems Approach, the theory behind it, and how its practical application to coastal zone systems (CZSs was developed. The SAF is about information for management through a focus on how to generate a higher, dynamic level of information about complex CZSs and how to render this information more useful to end users through a participatory suite of communication methods. The SAF is an open research methodology that investigates the function of systems in order to simulate specific issues or questions concerning their function. The research articles that are included in this Volume demonstrate examples of coupled multidisciplinary methods integrated into SAF simulations appropriate to a selected policy issue and to the social-environmental conditions of each Study Site Application. Their findings are not the result of funded research projects; instead, they are by-products of pilot applications conducted to develop and improve the SAF methodology. The final article of this Volume synthesizes these results in the context of the SAF as a higher level instrument for integrated coastal zone management.

  2. LHC magnet quench protection system

    Science.gov (United States)

    Coull, L.; Hagedorn, D.; Remondino, V.; Rodriguez-Mateos, F.

    1994-07-01

    The quench protection system for the superconducting magnets of the CERN Large Hadron Collider (LHC) is described. The system is based on the so called 'cold diode' concept. In a group of series connected magnets if one magnet quenches then the magnetic energy of all the magnets will be dissipated in the quenched magnet so destroying it. This is avoided by by-passing the quenched magnet and then rapidly de-exciting the unquenched magnets. For the LHC machine it is foreseen to use silicon diodes situated inside the cryostat as by-pass elements - so called 'cold diodes'. The diodes are exposed to some 50 kGray of radiation during a 10 year operation life-time. The high energy density of the LHC magnets (500 kJ/m) coupled with the relatively slow propagation speed of a 'natural' quench (10 to 20 m/s) can lead to excessive heating of the zone where the quench started and to high internal voltages. It is therefore necessary to detect quickly the incipient quench and fire strip heaters which spread the quench out more quickly over a large volume of the magnet. After a quench the magnet chain must be de-excited rapidly to avoid spreading the quench to other magnets and over-heating the by-pass diode. This is done by switching high-power energy-dump resistors in series with the magnets. The LHC main ring magnet will be divided into 16 electrically separated units which has important advantages.

  3. LHC magnet quench protection system

    International Nuclear Information System (INIS)

    Coull, L.; Hagedorn, D.; Remondino, V.; Rodriguez-Mateos, F.

    1994-01-01

    The quench protection system for the superconducting magnets of the CERN Large Hadron Collider (LHC) is described. The system is based on the so called ''cold diode'' concept. In a group of series connected magnets if one magnet quenches then the magnetic energy of all the magnets will be dissipated in the quenched magnet so destroying it. This is avoided by by-passing the quenched magnet and then rapidly de-exciting the unquenched magnets. For the LHC machine it is foreseen to use silicon diodes situated inside the cryostat as by-pass elements--so called ''cold diodes''. The diodes are exposed to some 50 kGray of radiation during a 10 year operation life-time. The high energy density of the LHC magnets (500 kJ/m) coupled with the relatively slow propagation speed of a ''natural'' quench (10 to 20 m/s) can lead to excessive heating of the zone where the quench started and to high internal voltages. It is therefore necessary to detect quickly the incipient quench and fire strip heaters which spread the quench out more quickly over a large volume of the magnet. After a quench the magnet chain must be de-excited rapidly to avoid spreading the quench to other magnets and over-heating the by-pass diode. This is done by switching high-power energy-dump resistors in series with the magnets. The LHC main ring magnet will be divided into 16 electrically separated units which has important advantages

  4. Protective and Catching Safety Systems In Construction

    Directory of Open Access Journals (Sweden)

    Kuzhin Marat

    2017-01-01

    Full Text Available In the article is described application of protective and catching systems in construction. Classification of similar systems, their types and purpose are listed. Dangerous zones on construction site and events to for limiting their influence or protection from the factors. Protective and catching systems is one of the most effective technical equipment, applied in recent time. Protective fences and catching systems are important part in the problem solution. Protective fences protect workers from falling from height. Protective and catching systems allows avoid injuries by workers, also catch debris, fallen from constructing buildings. In regard with continuing development in technical and technological solutions, protective and catching systems require adaptation to a new requirements of construction industry and requirements of normative documents. Technical regulations in the appliance sphere of protective and catching systems requires actualization and aligning with modern normatives. Important role should be given to developing organizational and technological documentation for application of the systems. Scientific studying of technical parameters of fences and protective catching nets also has great interest.

  5. RIVER PROTECTION PROJECT SYSTEM PLAN

    Energy Technology Data Exchange (ETDEWEB)

    CERTA PJ

    2008-07-10

    The U.S. Department of Energy (DOE), Office of River Protection (ORP) manages the River Protection Project (RPP). The RPP mission is to retrieve and treat Hanford's tank waste and close the tank farms to protect the Columbia River. As a result, the ORP is responsible for the retrieval, treatment, and disposal of the approximately 57 million gallons of radioactive waste contained in the Hanford Site waste tanks and closure of all the tanks and associated facilities. The previous revision of the System Plan was issued in September 2003. ORP has approved a number of changes to the tank waste treatment strategy and plans since the last revision of this document, and additional changes are under consideration. The ORP has established contracts to implement this strategy to establish a basic capability to complete the overall mission. The current strategy for completion of the mission uses a number of interrelated activities. The ORP will reduce risk to the environment posed by tank wastes by: (1) Retrieving the waste from the single-shell tanks (SST) to double-shell tanks (DST) for treatment and disposal; (2) Constructing and operating the WTP, which will safely treat all of the high-level waste (HLW) and about half of the low-activity waste (LAW) contained in the tank farms, and maximizing its capability and capacity; (3) Developing and deploying supplemental treatment capability or a second WTP LAW Facility that can safely treat about half of the LAW contained in the tank farms; (4) Developing and deploying treatment and packaging capability for transuranic (TRU) tank waste for shipment to and disposal at the Waste Isolation Pilot Plant (WIPP); (5) Deploying interim storage capacity for the immobilized HLW and shipping that waste to Yucca Mountain for disposal; (6) Operating the Integrated Disposal Facility for the disposal of immobilized LAW, along with the associated secondary waste, (7) Closing the SST and DST tank farms, ancillary facilities, and al1 waste

  6. RIVER PROTECTION PROJECT SYSTEM PLAN

    International Nuclear Information System (INIS)

    CERTA PJ

    2008-01-01

    The U.S. Department of Energy (DOE), Office of River Protection (ORP) manages the River Protection Project (RPP). The RPP mission is to retrieve and treat Hanford's tank waste and close the tank farms to protect the Columbia River. As a result, the ORP is responsible for the retrieval, treatment, and disposal of the approximately 57 million gallons of radioactive waste contained in the Hanford Site waste tanks and closure of all the tanks and associated facilities. The previous revision of the System Plan was issued in September 2003. ORP has approved a number of changes to the tank waste treatment strategy and plans since the last revision of this document, and additional changes are under consideration. The ORP has established contracts to implement this strategy to establish a basic capability to complete the overall mission. The current strategy for completion of the mission uses a number of interrelated activities. The ORP will reduce risk to the environment posed by tank wastes by: (1) Retrieving the waste from the single-shell tanks (SST) to double-shell tanks (DST) for treatment and disposal; (2) Constructing and operating the WTP, which will safely treat all of the high-level waste (HLW) and about half of the low-activity waste (LAW) contained in the tank farms, and maximizing its capability and capacity; (3) Developing and deploying supplemental treatment capability or a second WTP LAW Facility that can safely treat about half of the LAW contained in the tank farms; (4) Developing and deploying treatment and packaging capability for transuranic (TRU) tank waste for shipment to and disposal at the Waste Isolation Pilot Plant (WIPP); (5) Deploying interim storage capacity for the immobilized HLW and shipping that waste to Yucca Mountain for disposal; (6) Operating the Integrated Disposal Facility for the disposal of immobilized LAW, along with the associated secondary waste, (7) Closing the SST and DST tank farms, ancillary facilities, and al1 waste

  7. The information protection level assessment system implementation

    Science.gov (United States)

    Trapeznikov, E. V.

    2018-04-01

    Currently, the threat of various attacks increases significantly as automated systems become more widespread. On the basis of the conducted analysis the information protection level assessment system establishing objective was identified. The paper presents the information protection level assessment software implementation in the information system by applying the programming language C #. In conclusions the software features are identified and experimental results are represented.

  8. An Integrating Framework for Mixed Systems

    Science.gov (United States)

    Coutrix, Céline; Nigay, Laurence

    Technological advances in hardware manufacturing led to an extended range of possibilities for designing physical-digital objects involved in a mixed system. Mixed systems can take various forms and include augmented reality, augmented virtuality, and tangible systems. In this very dynamic context, it is difficult to compare existing mixed systems and to systematically explore the design space. Addressing this design problem, this chapter presents a unified point of view on mixed systems by focusing on mixed objects involved in interaction, i.e., hybrid physical-digital objects straddling physical and digital worlds. Our integrating framework is made of two complementary facets of a mixed object: we define intrinsic as well as extrinsic characteristics of an object by considering its role in the interaction. Such characteristics of an object are useful for comparing existing mixed systems at a fine-grain level. The taxonomic power of these characteristics is discussed in the context of existing mixed systems from the literature. Their generative power is illustrated by considering a system, Roam, which we designed and developed.

  9. Regulatory control of physical protection systems

    International Nuclear Information System (INIS)

    Rajdeep; Mayya, Y.S.

    2017-01-01

    The safety of facilities in BARC is under the regulatory oversight of BSC. The security architecture for these facilities incorporates multiple layers of Physical Protection Systems. The demands of safety may sometimes conflict with the needs of security. Realizing the need to identify these interfaces and extend the regulatory coverage to Physical Protection Systems, a Standing Committee named Physical Protection System Review Committee (PPSRC) has been constituted as a 2"n"d tier entity of BSC. PPSRC includes experts from various domains concerned with nuclear security, viz. physical protection systems, cyber security, radiation safety, security operations, technical services and security administration

  10. RIVER PROTECTION PROJECT SYSTEM PLAN

    International Nuclear Information System (INIS)

    Certa, P.J.; Kirkbride, R.A.; Hohl, T.M.; Empey, P.A.; Wells, M.N.

    2009-01-01

    The U.S. Department of Energy (DOE), Office of River Protection (ORP) manages the River Protection Project (RPP). The RPP mission is to retrieve and treat Hanford's tank waste and close the tank farms to protect the Columbia River. As a result, ORP is responsible for the retrieval, treatment, and disposal of approximately 57 million gallons 1 of radioactive waste contained in the Hanford Site waste tanks and closure2 of all the tanks and associated facilities. The previous revision of the System Plan was issued in May 2008. ORP has made a number of changes to the tank waste treatment strategy and plans since the last revision of this document, and additional changes are under consideration. ORP has contracts in place to implement the strategy for completion of the mission and establish the capability to complete the overall mission. The current strategl involves a number of interrelated activities. ORP will reduce risk to the environment posed by tank wastes by the following: (1) Retrieving the waste from the single-shell tanks (SST) to double-shell tanks (DST) and delivering the waste to the Waste Treatment and Immobilization Plant (WTP). (2) Constructing and operating the WTP, which will safely treat all of the high-level waste (HLW) fraction contained in the tank farms. About one-third of the low-activity waste (LAW) fraction separated from the HLW fraction in the WTP will be immobilized in the WTP LAW Vitrification Facility. (3) Developing and deploying supplemental treatment capability assumed to be a second LAW vitrification facility that can safely treat about two-thirds of the LAW contained in the tank farms. (4) Developing and deploying supplemental pretreatment capability currently assumed to be an Aluminum Removal Facility (ARF) using a lithium hydrotalcite process to mitigate sodium management issues. (5) Developing and deploying treatment and packaging capability for contact-handled transuranic (CH-TRU) tank waste for possible shipment to and disposal

  11. RIVER PROTECTION PROJECT SYSTEM PLAN

    Energy Technology Data Exchange (ETDEWEB)

    CERTA PJ; KIRKBRIDE RA; HOHL TM; EMPEY PA; WELLS MN

    2009-09-15

    The U.S. Department of Energy (DOE), Office of River Protection (ORP) manages the River Protection Project (RPP). The RPP mission is to retrieve and treat Hanford's tank waste and close the tank farms to protect the Columbia River. As a result, ORP is responsible for the retrieval, treatment, and disposal of approximately 57 million gallons 1 of radioactive waste contained in the Hanford Site waste tanks and closure2 of all the tanks and associated facilities. The previous revision of the System Plan was issued in May 2008. ORP has made a number of changes to the tank waste treatment strategy and plans since the last revision of this document, and additional changes are under consideration. ORP has contracts in place to implement the strategy for completion of the mission and establish the capability to complete the overall mission. The current strategl involves a number of interrelated activities. ORP will reduce risk to the environment posed by tank wastes by the following: (1) Retrieving the waste from the single-shell tanks (SST) to double-shell tanks (DST) and delivering the waste to the Waste Treatment and Immobilization Plant (WTP). (2) Constructing and operating the WTP, which will safely treat all of the high-level waste (HLW) fraction contained in the tank farms. About one-third of the low-activity waste (LAW) fraction separated from the HLW fraction in the WTP will be immobilized in the WTP LAW Vitrification Facility. (3) Developing and deploying supplemental treatment capability assumed to be a second LAW vitrification facility that can safely treat about two-thirds of the LAW contained in the tank farms. (4) Developing and deploying supplemental pretreatment capability currently assumed to be an Aluminum Removal Facility (ARF) using a lithium hydrotalcite process to mitigate sodium management issues. (5) Developing and deploying treatment and packaging capability for contact-handled transuranic (CH-TRU) tank waste for possible shipment to and

  12. Design Of Photovoltaic Powered Cathodic Protection System

    Directory of Open Access Journals (Sweden)

    Golina Samir Adly

    2017-07-01

    Full Text Available The corrosion caused by chemical reaction between metallic structures and surrounding mediums such as soil or water .the CP cathodic protection system is used to protect metallic structure against corrosion. Cathodic protection CP used to minimize corrosion by utilizing an external source of electrical current which forces the entire structure to become a cathode. There are two Types of cathodic protection system Galvanic current Impressed current.the Galvanic current is called a sacrificial anode is connected to the protected structure cathode through a DC power supply. In Galvanic current system a current passes from the sacrificing anode to the protected structure .the sacrificial anode is corroded rather than causing the protected structure corrosion .protected structure requires a constant current to stop the corrosion which determined by area structure metal and the surrounding medium. The rains humidity are decrease soil resistivity and increase the DC current .The corrosion and over protection resulting from increase in the DC current is harmful for the metallic structure. This problem can be solved by conventional cathodic protection system by manual adjustment of DC voltage periodically to obtain a constant current .the manual adjustment of DC voltage depends on experience of the technician and using the accuracy of the measuring equipment. The errors of measuring current depend on error from the technician or error from the measuring equipment. the corrosion of structure may occur when the interval between two successive adjustment is long .An automatically regulated cathodic protection system is used to overcome problems from conventional cathodic protection system .the regulated cathodic protection system adjust the DC voltage of the system automatically when it senses the variations of surrounding medium resistivity so the DC current is constant at the required level.

  13. CCS - environmental protection framework for an emerging technology. Background

    Energy Technology Data Exchange (ETDEWEB)

    Becker, Ralf; Boehringer, Alexander; Charisse, Thomas (and others)

    2009-10-15

    With this paper, the German Federal Environment Agency (Umweltbundesamt, UBA) updates1 its position paper of 20062 on the technical capture and geological storage3 of carbon dioxide (CCS: carbon capture and storage). After a brief description of the development status of the process steps of capture, transport and geological storage of carbon dioxide (CO2) in Chapter 1, we look into the possible risks for human health and the environment (Chapter 2), which up to now have been little discussed or researched. These risks will largely depend on the integrity of storage sites. On the assumption of functioning capture technology at cost-effective conditions, the capacity of available and secure storage sites will decisively determine the scale of possible greenhouse gas emission reductions through CCS (Chapter 3). In examining storage capacity, it has always to be considered that the geological storage of CO2 can compete with other uses of underground geological formations, such as geothermics or compressed-air and natural-gas storage (Chapter 4). The Federal Environment Agency takes the view that these factors determine the role that CCS can play as an additional climate protection measure (Chapter 5). In Chapter 6 we show how CCS, in its application, should be integrated into emissions trading. CO2 emission reduction should in our view only be acknowledged when it is effectively and demonstrably ensured through permanent storage. Chapter 7 deals with necessary reforms of liability law, which legislators should undertake in order to assign the dangers and risks of CCS to those responsible for them. In Chapter 8, we summarize the fundamental demands on legislators, while Chapter 9 is devoted to issues concerning the source and application of funds for research and development. (orig.)

  14. Advanced physical protection systems for nuclear materials

    International Nuclear Information System (INIS)

    Jones, O.E.

    1975-10-01

    Because of the increasing incidence of terrorism, there is growing concern that nuclear materials and facilities need improved physical protection against theft, diversion, or sabotage. Physical protection systems for facilities or transportation which have balanced effectiveness include information systems, access denial systems, adequate and timely response, recovery capability, and use denial methods for despoiling special nuclear materials (SNM). The role of these elements in reducing societal risk is described; however, it is noted that, similar to nuclear war, the absolute risks of nuclear theft and sabotage are basically unquantifiable. Sandia Laboratories has a major Energy Research and Development Administration (ERDA) role in developing advanced physical protection systems for improving the security of both SNM and facilities. These activities are surveyed. A computer simulation model is being developed to assess the cost-effectiveness of alternative physical protection systems under various levels of threat. Improved physical protection equipment such as perimeter and interior alarms, secure portals, and fixed and remotely-activated barriers is being developed and tested. In addition, complete prototype protection systems are being developed for representative nuclear facilities. An example is shown for a plutonium storage vault. The ERDA safe-secure transportation system for highway shipments of all significant quantities of government-owned SNM is described. Adversary simulation as a tool for testing and evaluating physical protection systems is discussed. A list of measures is given for assessing overall physical protection system performance. (auth)

  15. Advanced physical protection systems for nuclear materials

    International Nuclear Information System (INIS)

    Jones, O.E.

    1976-01-01

    Because of the increasing incidence of terrorism, there is growing concern that nuclear materials and facilities need improved physical protection against theft, diversion, or sabotage. Physical protection systems for facilities or transportation which have balanced effectiveness include information systems, access denial systems, adequate and timely response, recovery capability, and use denial methods for despoiling special nuclear materials (SNM). The role of these elements in reducing societal risk is described; however, it is noted that, similar to nuclear war, the absolute risks of nuclear theft and sabotage are basically unquantifiable. Sandia Laboratories has a major US Energy Research and Development Administration (ERDA) role in developing advanced physical protection systems for improving the security of both SNM and facilities. These activities are surveyed in this paper. A computer simulation model is being developed to assess the cost-effectiveness of alternative physical protection systems under various levels of threat. Improved physical protection equipment such as perimeter and interior alarms, secure portals, and fixed and remotely activated barriers is being developed and tested. In addition, complete prototype protection systems are being developed for representative nuclear facilities. An example is shown for a plutonium storage vault. The ERDA safe-secure transportation system for highway shipments of all significant quantities of government-owned SNM is described. Adversary simulation as a tool for testing and evaluating physical protection systems is discussed. Finally, a list of measures is given for assessing overall physical protection system performance. (author)

  16. HCI^2 Framework: A software framework for multimodal human-computer interaction systems

    NARCIS (Netherlands)

    Shen, Jie; Pantic, Maja

    2013-01-01

    This paper presents a novel software framework for the development and research in the area of multimodal human-computer interface (MHCI) systems. The proposed software framework, which is called the HCI∧2 Framework, is built upon publish/subscribe (P/S) architecture. It implements a

  17. Programmed system for nuclear power plant protection

    International Nuclear Information System (INIS)

    Jover, Pierre.

    1980-06-01

    The progress in the field of microprocessors and large scale integration circuits, have incited to introduce this new technologies into nuclear power plant protection system. The hardware and software design principles are briefly listed; then, a quad-redundant protection system for 1300 MWe PWR, developed in France is described [fr

  18. Availability analysis of supervised protective systems

    International Nuclear Information System (INIS)

    Kontoleon, N.; Kontoleon, J.M.; Chrysochoides, N.G.

    1975-01-01

    The behaviour in time of a nuclear reactor supervised protective system is modelled mathematically by a Markov process, continuous in time and with three discrete states. Failure and repair rates are assumed to be exponentially distributed. An analytical expression of system availability as a function of failure and repair rates as well as the inspection intervals and duration is derived. An optimization problem is then discussed in order to maximize system availability with respect to imposed cost constraints. Finally, an example of a supervised protective system with short inactive times is given, which may be found in many practical situations of modern protective systems. (author)

  19. Orphan Sources. Extending Radiological Protection outside the Regulatory Framework

    Energy Technology Data Exchange (ETDEWEB)

    Eugenio Gil [Deputy Director for Emergency, Spanish Nuclear Safety Council (Spain)

    2006-07-01

    Radioactive sources that are not under appropriate regulatory control-Orphan sources- can result in a number of undesirable consequences including human health impacts, socio-psychological impacts, political and economic impacts, as well as environmental impacts. Many countries are now in the process of introducing the necessary measures to regain an appropriate level of control over them. For a variety of historical and economic reasons, there could already be sources in any specific country that are not within the usual regulatory system. Some of these may be known about, others may not. Therefore a national strategy is needed to ascertain the likelihood and magnitude of the issue of radioactive source control problem within a country and the priorities necessary to address the problems identified. A well-developed plan for improving control over all relevant radioactive sources tailored to the national situation will ensure optimum use of resources such as time, money and personnel. It will allow these limited resources to be allocated appropriately to ensure that control is first regained over those sources presenting the highest risks. This lecture shows a way to develop an appropriate national strategy for regaining control over orphan sources. The methodology described in this lecture is basically based in the IAEA Recommendations. (author)

  20. Orphan Sources. Extending Radiological Protection outside the Regulatory Framework

    International Nuclear Information System (INIS)

    Eugenio Gil

    2006-01-01

    Radioactive sources that are not under appropriate regulatory control-Orphan sources- can result in a number of undesirable consequences including human health impacts, socio-psychological impacts, political and economic impacts, as well as environmental impacts. Many countries are now in the process of introducing the necessary measures to regain an appropriate level of control over them. For a variety of historical and economic reasons, there could already be sources in any specific country that are not within the usual regulatory system. Some of these may be known about, others may not. Therefore a national strategy is needed to ascertain the likelihood and magnitude of the issue of radioactive source control problem within a country and the priorities necessary to address the problems identified. A well-developed plan for improving control over all relevant radioactive sources tailored to the national situation will ensure optimum use of resources such as time, money and personnel. It will allow these limited resources to be allocated appropriately to ensure that control is first regained over those sources presenting the highest risks. This lecture shows a way to develop an appropriate national strategy for regaining control over orphan sources. The methodology described in this lecture is basically based in the IAEA Recommendations. (author)

  1. The role of privacy protection in healthcare information systems adoption.

    Science.gov (United States)

    Hsu, Chien-Lung; Lee, Ming-Ren; Su, Chien-Hui

    2013-10-01

    Privacy protection is an important issue and challenge in healthcare information systems (HISs). Recently, some privacy-enhanced HISs are proposed. Users' privacy perception, intention, and attitude might affect the adoption of such systems. This paper aims to propose a privacy-enhanced HIS framework and investigate the role of privacy protection in HISs adoption. In the proposed framework, privacy protection, access control, and secure transmission modules are designed to enhance the privacy protection of a HIS. An experimental privacy-enhanced HIS is also implemented. Furthermore, we proposed a research model extending the unified theory of acceptance and use of technology by considering perceived security and information security literacy and then investigate user adoption of a privacy-enhanced HIS. The experimental results and analyses showed that user adoption of a privacy-enhanced HIS is directly affected by social influence, performance expectancy, facilitating conditions, and perceived security. Perceived security has a mediating effect between information security literacy and user adoption. This study proposes several implications for research and practice to improve designing, development, and promotion of a good healthcare information system with privacy protection.

  2. A New Protection Orientation and Framework for Refugees and Other Forced Migrants

    Directory of Open Access Journals (Sweden)

    James C. Simeon

    2017-12-01

    Full Text Available The unprecedented current “refugee crisis,” with its 65 million plus uprooted people, demands a new protection orientation and framework for refugees and other forced migrants that are focused on the “root causes” of refugeehood, non-international protracted armed conflict or civil war. It is argued that four essential reforms are required to the international refugee protection system to respond to the “root causes” of refugees in the world today. The first calls for broadening the definition of who is a refugee to include “war refugees” as found in the 1984 Cartagena Declaration and the 1969 Organization of African Unity (OAU Convention. The 1984 Cartagena Declaration is preferred because it has the most progressive and broadest legal definition of who is a refugee and, therefore, should be emulated by all regions and the UNHCR internationally. The second reform would be the adoption of the Cartagena Declaration decennial consultation process and its comprehensive Plan of Action by the UNHCR on a global basis. This process has proven to be a success in Latin America and ought to be adopted internationally to develop and to realize the progressive advancement of international protection for all persons who are fleeing persecution and armed conflict. The third major reform is to develop the capacity of the UN to be able to operate in the midst of an armed conflict situation in order to broker a ceasefire and, then, negotiate a peace agreement, particularly, in those situations where massed forced displacement has taken place or potentially could take place. The fourth reform calls for the UN to expand the Responsibility to Protect (R2P doctrine to incorporate massed forced displacement, in addition to, war crimes, crimes against humanity, ethnic cleansing, and, genocide. This further implies that mass forced displacement ought to be criminalized and made a serious international crime, not simply in the international humanitarian

  3. An integrated system for physical protection

    International Nuclear Information System (INIS)

    Kumar, Ranajit

    2001-01-01

    An Integrated Physical Protection System (IPPS) was developed for the consolidation of all sub systems, sensors and elements related to physical protection for an efficient and effective security environment of a facility. An effective physical protection system discharges the functions of detection, delay, communication, response, access control etc. IPPS performs, controls and monitors all the above functionality and helps in taking quick action on occurrence of unusual incidents by instantly reporting the incident in easily understandable audio, video, graphical and textual format and also by initiating automatic interactions among sub-systems

  4. Aging assessment for active fire protection systems

    International Nuclear Information System (INIS)

    Ross, S.B.; Nowlen, S.P.; Tanaka, T.

    1995-06-01

    This study assessed the impact of aging on the performance and reliability of active fire protection systems including both fixed fire suppression and fixed fire detection systems. The experience base shows that most nuclear power plants have an aggressive maintenance and testing program and are finding degraded fire protection system components before a failure occurs. Also, from the data reviewed it is clear that the risk impact of fire protection system aging is low. However, it is assumed that a more aggressive maintenance and testing program involving preventive diagnostics may reduce the risk impact even further

  5. Outer skin protection of columbium Thermal Protection System (TPS) panels

    Science.gov (United States)

    Culp, J. D.

    1973-01-01

    A coated columbium alloy material system 0.04 centimeter thick was developed which provides for increased reliability to the load bearing character of the system in the event of physical damage to and loss of the exterior protective coating. The increased reliability to the load bearing columbium alloy (FS-85) was achieved by interposing an oxidation resistant columbium alloy (B-1) between the FS-85 alloy and a fused slurry silicide coating. The B-1 alloy was applied as a cladding to the FS-85 and the composite was fused slurry silicide coated. Results of material evaluation testing included cyclic oxidation testing of specimens with intentional coating defects, tensile testing of several material combinations exposed to reentry profile conditions, and emittance testing after cycling of up to 100 simulated reentries. The clad material, which was shown to provide greater reliability than unclad materials, holds significant promise for use in the thermal protection system of hypersonic reentry vehicles.

  6. On line protection systems for induction motors

    International Nuclear Information System (INIS)

    Colak, I.; Celik, H.; Sefa, I.; Demirbas, S.

    2005-01-01

    Protection of induction motors is very important since they are widely used in industry for many applications due to their high robustness, reliability, low cost and maintenance, high efficiency and long service life. So, protecting these motors is crucial for operations. This paper presents a combined protection approach for induction motors. To achieve this, the electrical values of the induction motor were measured with sensitivity ±1% through a data acquisition card and processed with software developed in Visual C++. An on line protection system for induction motors was achieved easily and effectively. The experimental results have shown that the induction motor was protected against the possible problems faced during the operation. The software developed for this protection provides flexible and reliable media for operators and their motors. It is expected that the motor protection achieved in this study might be faster than the classical techniques and also may be applied to larger motors easily after small modifications of the software

  7. A critical review of the system of radiation protection

    International Nuclear Information System (INIS)

    2000-01-01

    Our modern, information society is increasingly interested in transparency and participation in many aspects of government, and this is particularly true in areas involving public health and environmental protection. Radiation protection is no exception to this trend. Scientific rationale that was once sufficient to explain radiation protection theory and practice is no longer adequate. The need to address and communicate theory, practice and the decision-making process to a wider audience has given rise to numerous debates and led the radiation protection community to revisit the framework of the system of radiation protection. The very fundamentals of the system of radiation protection continue to be questioned in a healthy fashion, and many aspects have been identified which could better serve stakeholders given some additional thought in the light of modern societal needs. This report is the summary of the NEA's first reflections in this area, and describes those aspects of the current international system of radiation protection that could be improved. Suggested directions for improvement are provided. (author)

  8. The Guided System Development Framework: Modeling and Verifying Communication Systems

    DEFF Research Database (Denmark)

    Carvalho Quaresma, Jose Nuno; Probst, Christian W.; Nielson, Flemming

    2014-01-01

    the verified specification. The refinement process carries thus security properties from the model to the implementation. Our approach also supports verification of systems previously developed and deployed. Internally, the reasoning in our framework is based on the Beliefs and Knowledge tool, a verification...... tool based on belief logics and explicit attacker knowledge....

  9. An Architectural Framework for Integrating COTS/GOTS/Legacy Systems

    National Research Council Canada - National Science Library

    Gee, Karen

    2000-01-01

    .... To fully realize the DoD's goal, a new architectural framework is needed. This thesis proposes an architectural framework suitable for integrating COTS/GOTS/legacy systems in a distributed, heterogeneous environment...

  10. Cost-benefit analysis in optimising the radiological protection of the public: a provisional framework

    International Nuclear Information System (INIS)

    1981-07-01

    The advice given is concerned solely with the application of a quantitative framework to the optimisation of protection of members of the public, exposed as a result of routine releases of radionuclides to the environment or emissions of radiation in normal operating conditions. (author)

  11. Testing Digital Electronic Protection Systems

    CERN Document Server

    Gabourin, S

    2011-01-01

    This paper outlines the core concepts and realisation of the Safe Machine Parameters Controller (SMPC) testbench, based on a VME crate and LabVIEW program. Its main goal is to ensure the correct function of the SMPC for the protection of the CERN accelerator complex. To achieve this, the tester has been built to replicate the machine environment and operation, in order to ensure that the chassis under test is completely exercised. The complexity of the task increases with the number of input combinations. This paper also outlines the benefits and weaknesses of developing a test suite independently of the hardware being tested, using the “V” approach.

  12. Integrated crop protection as a system approach

    OpenAIRE

    Haan, de, J.J.; Wijnands, F.G.; Sukkel, W.

    2005-01-01

    New farming systems in vegetable production are required as demands for high quality products that do not pollute the environment are rising, and production risks are large and incomes low. The methodology of prototyping new systems is described, especially the themes, parameters and target values connected to integrated crop protection. The role of integrated crop protection in prototyping new systems is discussed. The results of twenty years working with this prototyping methodology are pre...

  13. A protection system for picosecond accelerator

    International Nuclear Information System (INIS)

    Cao Hongping; Chinese Academy of Sciences, Beijing; Chen Huanguang; Xu Ruinian; Tang Junlong; Li Deming

    2006-01-01

    A personnel and machine protection system for the picosecond accelerator has been built. The key of the system is to send on/off of three triggering signals which are those of electron gun, 2856 MHz and 476 MHz, respectively, to ensure the safety of users and the accelerator. This paper describes the emergencies interlocked by ADAM5511 and timing trigger processor, and some secondary functions which improve the efficiency of the protection system completed in upper layer software. (authors)

  14. Framework for computer-aided systems design

    International Nuclear Information System (INIS)

    Esselman, W.H.

    1992-01-01

    Advanced computer technology, analytical methods, graphics capabilities, and expert systems contribute to significant changes in the design process. Continued progress is expected. Achieving the ultimate benefits of these computer-based design tools depends on successful research and development on a number of key issues. A fundamental understanding of the design process is a prerequisite to developing these computer-based tools. In this paper a hierarchical systems design approach is described, and methods by which computers can assist the designer are examined. A framework is presented for developing computer-based design tools for power plant design. These tools include expert experience bases, tutorials, aids in decision making, and tools to develop the requirements, constraints, and interactions among subsystems and components. Early consideration of the functional tasks is encouraged. Methods of acquiring an expert's experience base is a fundamental research problem. Computer-based guidance should be provided in a manner that supports the creativity, heuristic approaches, decision making, and meticulousness of a good designer

  15. Explosion-protected electric heating systems

    Energy Technology Data Exchange (ETDEWEB)

    Elsner, H

    1984-02-01

    Different constructions of explosion-protected heating systems are described concerning the different types of protection, the service conditions, the installation and the surveillance devices. Interpretations and regulations derived from the VDE Standards are discussed and their relation to the European Standards EN 50014 ... 50020 is considered in a survey.

  16. Microsoft System Center Data Protection Manager 2012

    CERN Document Server

    Buchannan, Steve; Gomaa, Islam

    2013-01-01

    This book is a Packt tutorial, walking the administrator through the steps needed to create real solutions to the problems and tasks faced when ensuring that their data is protected. This book is for network administrators, system administrators, backup administrators, or IT consultants who are looking to expand their knowledge on how to utilize DPM to protect their organization's data.

  17. Analog subsystem for the plutonium protection system

    International Nuclear Information System (INIS)

    Arlowe, H.D.

    1978-12-01

    An analog subsystem is described which monitors certain functions in the Plutonium Protection System. Rotary and linear potentiometer output signals are digitized, as are the outputs from thermistors and container ''bulge'' sensors. This work was sponsored by the Department of Energy/Office of Safeguards and Security (DOE/OSS) as part of the overall Sandia Fixed Facility Physical Protection Program

  18. Systems and methods for photovoltaic string protection

    Science.gov (United States)

    Krein, Philip T.; Kim, Katherine A.; Pilawa-Podgurski, Robert C. N.

    2017-10-25

    A system and method includes a circuit for protecting a photovoltaic string. A bypass switch connects in parallel to the photovoltaic string and a hot spot protection switch connects in series with the photovoltaic string. A first control signal controls opening and closing of the bypass switch and a second control signal controls opening and closing of the hot spot protection switch. Upon detection of a hot spot condition the first control signal closes the bypass switch and after the bypass switch is closed the second control signal opens the hot spot protection switch.

  19. Relay protection coordination with generator capability curve, excitation system limiters and power system relay protections settings

    Directory of Open Access Journals (Sweden)

    Buha Danilo

    2016-01-01

    Full Text Available The relay protection settings performed in the largest thermal powerplant (TE "Nikola Tesla B" are reffered and explained in this paper. The first calculation step is related to the coordination of the maximum stator current limiter settings, the overcurrent protection with inverse characteristics settings and the permitted overload of the generator stator B1. In the second calculation step the settings of impedance generator protection are determined, and the methods and criteria according to which the calculations are done are described. Criteria used to provide the protection to fulfill the backup protection role in the event of malfunction of the main protection of the transmission system. are clarified. The calculation of all protection functions (32 functions of generator B1 were performed in the project "Coordination of relay protection blocks B1 and B2 with the system of excitation and power system protections -TENT B".

  20. Reactor protection systems of 500 MWe PHWRs

    Energy Technology Data Exchange (ETDEWEB)

    Mallik, G; Kelkar, M G; Apte, Ravindra [C and I Group, Nuclear Power Corporation, Mumbai (India)

    1997-03-01

    The 500 MWe PHWR has two totally independent, diverse, fast acting shutdown system called Shutdown System 1 (SDS 1) and Shutdown System 2 (SDS 2). The trip generation circuitry of SDS 1 and SDS 2 are known as Reactor Protection System 1 (RPS 1) and Reactor Protection System 2 (RPS 2) respectively. Some of the features specific to 500 MWe reactors are Core Over Power Protection System (COPPS) based upon in core Self Powered Neutron Detector (SPND) signals, use of local two out of three coincidence logic and adoption of overlap testing for RPS 2, use of Fine Impulse Testing (FIT) in RPS 2, testing of the final control elements namely electro-magnetic clutch of individual Shutoff Rods (SRs) of SDS 1 and all the fast acting valves of SDS 2, etc. The two shutdown systems have totally separate sets of sensors and associated signal processing circuitry as well as physical arrangements. A separate computerised test and monitoring unit is used for each of the two shutdown systems. Use of Programmable Digital Comparator (PDC) unit exclusively for reactor protection systems, has been adopted. The capability of PDC unit is enhanced and communication links are provided for its integration in over all system. The paper describes the design features of reactor protection systems. (author). 3 refs., 7 figs., 3 tabs.

  1. Evolution of the radiation protection system; L'evolution du systeme de protection radiologique

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, R.H. [International Commission on Radiological Protection, Stockholm (Sweden); Schieber, C.; Cordoliani, Y.S. [Societe Francaise de Radioprotection, 92 - Fontenay aux Roses (France); Brechignac, F. [CEA Cadarache, Institut de Radioprotection et de Surete Nucleaire, Dept. de Protection de l' Environnement, 13 - Saint Paul Lez Durance (France)

    2003-07-01

    The evolution of the system of radiological protection: justification for new ICRP recommendations, thoughts of the SFRP work group about the evolution of the system of radiation protection proposed by the ICRP, protection of environment against ionizing radiations seen by the ICRP are the three parts of this chapter. (N.C.)

  2. Utilization of information communication technology (ICT) - Based training / learning for capacity building in radiation protection framework

    International Nuclear Information System (INIS)

    Oluyemi, I.O.D.

    2008-01-01

    Full text: Radiation protection is the science of protecting people and the environment from the harmful effects of ionizing radiation, which includes both particle radiation and high energy electromagnetic radiation. It includes occupational radiation protection, which is the protection of workers; medical radiation protection, which is the protection of patients; and public radiation protection, which is about protection of individual members of the public, and of the population as a whole. ICT has made possible the development of e-learning and several Virtual Learning Environments (VLEs) which can support a wide range of capacity building requirements, ranging from under-graduate and post-graduate programmes, continuing professional development courses, right through to short subject specific and research courses, thereby eliminating the problems of conventional forms of training / learning, some of which are: limited access, cost effectiveness and language / cultural barriers. This paper focuses on the utilization of these ICT-based training / learning for capacity building in radiation protection framework and concludes with suggestions on implementation strategies. (author)

  3. Protecting information in systems of systems

    NARCIS (Netherlands)

    Trivellato, D.

    2012-01-01

    Systems of systems are coalitions of autonomous and heterogeneous systems that collaborate to achieve a common goal. The component systems of a system of systems often belong to different security domains, which are governed by different authorities (hereafter called parties). Furthermore, systems

  4. Distribution system protection with communication technologies

    DEFF Research Database (Denmark)

    Wei, Mu; Chen, Zhe

    2010-01-01

    Due to the communication technologies’ involvement in the distribution power system, the time-critical protection function may be implemented more accurately, therefore distribution power systems’ stability, reliability and security could be improved. This paper presents an active distribution...

  5. Selected aspects of proposed new EU general data protection legal framework and the Croatian perspective

    Directory of Open Access Journals (Sweden)

    Nina GUMZEJ

    2013-12-01

    Full Text Available Proposed new EU general data protection legal framework profoundly affects a large number of day-to-day business operations of organizations processing personal data and calls for significant effort on their part toward the necessary legal-regulatory compliance. In this paper the author examines key legislative developments towards this new EU frame and impact for the Republic of Croatia as the youngest EU Member State. Following introductory overview, legal analysis of draft EU General Data Protection Regulation as proposed by the European Commission and recently adopted amendments by the European Parliament mainly focuses on selected solutions impacting national data protection supervisory authorities. This is complemented with examination of relevant sources of EU law, including the case law of the Court of Justice of the European Union. Assessment of results of this research is next made with respect to prospects of the data protection legal framework of the Republic of Croatia. The paper is concluded with the author’s critical overview of analyzed EU proposals impacting national data protection supervisory authorities in light of EU pivotal goals, and de lege ferenda proposals to timely address identified obstacles towards more adequate enforcement of data protection legislation in Croatia.

  6. Control rod blow out protection system

    International Nuclear Information System (INIS)

    Dietrich, J.R.; Flinn, W.S.; Groves, M.D.

    1979-01-01

    An absorber element blow-out protection system for a nuclear reactor having a pressure vessel through which a coolant is circulated. The blow-out protection system includes devices which hydraulically couple groups of guide tubes in which the absorber elements move, the coupling devices limiting coolant lift flow rate to a level commensurate with the raising of individual absorber elements but insufficient to raise a plurality of absorber elements simultaneously

  7. Machine Protection System response in 2011

    CERN Document Server

    Zerlauth, M; Wenninger, J

    2012-01-01

    The performance of the machine protection system during the 2011 run is summarized in this paper. Following an analysis of the beam dump causes in comparison to the previous 2010 run, special emphasis will be given to analyse events which risked to exposed parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems as well as in the change management will be evaluated along with their impact on the 2012 run. The role of the restricted Machine Protection Panel ( rMPP ) during the various operational phases such as commissioning, the intensity ramp up and Machine Developments is being discussed.

  8. European Provisions for the Protection of Dissenting Shareholders within the Framework of Cross-border Mergers

    Directory of Open Access Journals (Sweden)

    Hamed Alavi

    2016-09-01

    Full Text Available The European legislative framework of cross-border mergers is a result of a long process of identifying the needs of the common market, domestic laws and national businesses and bringing them closer together. From virtual impossibility of merging across national borders, to a transfer of seat, to the Cross-Border Mergers Directive private and public limited companies can now engage in a cross-border merger transaction under best harmonised rules to date. However, the diversity of national company laws leaves gaps that are not resolved on a European level - there is no harmonising instrument in the area of creditor protection and the protection of dissenting minority shareholders, among others. The CBM Directive contains a framework provision referencing the need of protection of minority members, whereas specific mechanisms are left for the Member States to implement. The question that arises is whether the status quo of minority protection is sufficient to ensure smooth functioning of the cross-border mergers framework or whether further harmonisation is required.

  9. A Framework for Photovoltaic and Thermosiphon Systems

    Directory of Open Access Journals (Sweden)

    Gustavo Guidoni

    2011-01-01

    Full Text Available Pessimistic forecasts are growing in the Brazilian energy scenario demanding the use of renewable sources of energy such as the solar one. As metropolitan regions have become more populous, private and public companies have developed new technologies based on renewable energy sources. In order to supply such demand, new computer techniques have to be developed. This paper presents a framework to assist the developer to model new components and simulate solar energy applications. By applying the framework concepts, such as source code reuse, one can create a complete environment to evaluate solar energy data. The framework supports software development and tool implementation to be used in photovoltaic and thermosiphon processes.

  10. Autonomous systems for plant protection

    DEFF Research Database (Denmark)

    Griepentrog, Hans W.; Ruckelhausen, Arno; Jørgensen, Rasmus N.

    2010-01-01

    Advances in automation are demanded by the market mainly as a response to high labor costs. Robotic outdoor systems are ready to allow not only economically viable operations but also increased efficiency in agriculture, horticulture and forestry. The aim of this chapter is to give examples of au...

  11. Physical protection system design and evaluation

    International Nuclear Information System (INIS)

    Williams, J.D.

    1997-11-01

    The design of an effective physical protection system (PPS) includes the determination of the PPS objectives, the initial design of a PPS, the evaluation of the design, and probably, the redesign or refinement of the system. To develop the objectives, the designer must begin by gathering information about facility operation and conditions, such as a comprehensive description of the facility, operating conditions, and the physical protection requirements. The designer then needs to define the threat. This involves considering factors about potential adversaries: class of adversary, adversary's capabilities, and range of adversary's tactics. Next, the designer should identify targets. Determination of whether or not the materials being protected are attractive targets is based mainly on the ease or difficulty of acquisition and desirability of the material. The designer now knows the objectives of the PPS, that is, ''what to protect against whom.'' The next step is to design the system by determining how best to combine such elements as fences, vaults, sensors and assessment devices, entry control devices, communication devices, procedures, and protective force personnel to meet the objectives of the system. Once a PPS is designed, it must be analyzed and evaluated to ensure it meets the PPS objectives. Evaluation must allow for features working together to ensure protection rather than regarding each feature separately. Due to the complexity of the protection systems, an evaluation usually requires modeling techniques. If any vulnerabilities are found, the initial system must be redesigned to correct the vulnerabilities and a reevaluation conducted. After the system is installed, the threat and system parameters may change with time. If they do, the analysis must be performed periodically to ensure the system objectives are still being met

  12. The APS machine protection system (MPS)

    International Nuclear Information System (INIS)

    Fuja, R.; Berg, B.; Arnold, N.

    1996-01-01

    The machine protection system (MPS) that protects the APS storage ring vacuum chamber from x-ray beams, is active. There are over 650 sensors monitored and networked through the MPS system. About the same number of other process variables are monitored by the much slower EPICS control system, which also has an input to the rf abort chain. The MPS network is still growing with the beam position limits detection system coming on-line. The network configuration, along with a limited description of individual subsystems, is presented

  13. The APS machine protection system (MPS)

    Energy Technology Data Exchange (ETDEWEB)

    Fuja, R.; Berg, B.; Arnold, N. [and others

    1996-08-01

    The machine protection system (MPS) that protects the APS storage ring vacuum chamber from x-ray beams, is active. There are over 650 sensors monitored and networked through the MPS system. About the same number of other process variables are monitored by the much slower EPICS control system, which also has an input to the rf abort chain. The MPS network is still growing with the beam position limits detection system coming on-line. The network configuration, along with a limited description of individual subsystems, is presented.

  14. Power system protection 1 principles and components

    CERN Document Server

    Association, Electricity Training

    1995-01-01

    The worldwide growth in demand for electricity has forced the pace of developments in electrical power system design to meet consumer needs for reliable, secure and cheap supplies. Power system protection, as a technology essential to high quality supply, is widely recognised as a specialism of growing and often critical importance, in which power system needs and technological progress have combined to result in rapid developments in policy and practice in recent years. In the United Kingdom, the need for appropriate training in power system protection was recognised in the early 1960s with t

  15. Distributed systems for protecting nuclear power stations

    International Nuclear Information System (INIS)

    Jover, P.

    1980-05-01

    The advantages of distributed control systems for the control of nuclear power stations are obviously of great interest. Some years ago, EPRI, (Electric Power Research Institute) showed that multiplexing the signals is technically feasible, that it enables the availability specifications to be met and costs to be reduced. Since then, many distributed control systems have been proposed by the manufacturers. This note offers some comments on the application of the distribution concept to protection systems -what should be distributed- and ends with a brief description of a protection system based on microprocessors for the pressurized power stations now being built in France [fr

  16. Pattern-based framework for data acquisition systems

    International Nuclear Information System (INIS)

    Padmini, S.; Diwakar, M.P.; Nair, Preetha; Mathew, R.

    2004-01-01

    The data acquisition framework implements a reusable abstract architectural design for use in the development of data acquisition systems. The framework is being used to build Flux Mapping system (FMs) for TAPS III-IV and RRS Data Acquisition System for Dhruva reactor

  17. A Conceptual Framework for Evolving, Recommender Online Learning Systems

    Science.gov (United States)

    Peiris, K. Dharini Amitha; Gallupe, R. Brent

    2012-01-01

    A comprehensive conceptual framework is developed and described for evolving recommender-driven online learning systems (ROLS). This framework describes how such systems can support students, course authors, course instructors, systems administrators, and policy makers in developing and using these ROLS. The design science information systems…

  18. PCIe40 temperature protection system

    CERN Document Server

    Romero Aguilar, Angel

    2017-01-01

    PCIe40 is a high-throughput data-acquisition card based on PCI Express that is currently under development for the next upgrade of the LHCb experiment readout system. As part of this development, SMBus is intended to be used as a lightweight, out-of-band protocol to monitor the health of each data acquisition board. Starting from a simple prototype, the student will work on enabling SMBus communication between a COTS linux host and various on-board sensors, on top of existing linux facilities.

  19. The radiation protection research within the fourth Framework Program of the European Union (1994-1998)

    International Nuclear Information System (INIS)

    Siunaeve, J.; Mingot, F.; Arranz, L.; Cancio, D.

    1995-01-01

    The next research program on Radiation Protection within the Fourth Framework Program of the European Union has been approved by the Council last December (O.I.N L 361, 12/31/94). The program includes important changes in its structure as well as in the way for implementation in Europe. The most important change is that the main activities concerning Nuclear Safety, Waste Management and Radiation Protection have been included in a single program called Nuclear Fission Safety. The program also includes specific work with CIS countries for the management of Chernobyl consequences as well as other significative contaminations in other areas of the former Soviet Union. (Author)

  20. [Artificial intelligence] AI for protection systems

    Energy Technology Data Exchange (ETDEWEB)

    Aggarwal, R.; Johns, A.

    1997-12-31

    The reliable operation of large power systems with small stability margins is highly dependent on control systems and protection devices. Progress in the field of microprocessor systems and demanding requirements in respect of the performance of protective relays are the reasons for digital device applications to power system protection. The superiority of numeric protection over its analogue alternatives is attributed to such factors as accurate extraction of the fundamental voltage and current components through filtering, functional benefits resulting from multi-processor design and extensive self-monitoring, etc. However, all these reasons have not led to a major impact on speed, sensitivity and selectivity of primary protective relays, and the gains are only marginal; this is so because conventional digital relays still rely on deterministic signal models and a heuristic approach for decision making, so that only a fraction of the information contained within voltage and current signals as well as knowledge about the plant to be protected is used. The performance of digital relays may be substantially improved if the decision making is based on elements of artificial intelligence (AI). (Author)

  1. Protecting Information in Systems of Systems

    NARCIS (Netherlands)

    Trivellato, Daniel; Zannone, Nicola; Etalle, Sandro

    2011-01-01

    Systems of Systems (SoS) are dynamic, distributed coalitions of autonomous and heterogeneous systems that collaborate to achieve a common goal. While offering several advantages in terms of scalability and flexibility, the SoS paradigm has a strong impact on system interoperability and on the

  2. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....

  3. Advanced Protection & Service Restoration for FREEDM Systems

    Science.gov (United States)

    Singh, Urvir

    A smart electric power distribution system (FREEDM system) that incorporates DERs (Distributed Energy Resources), SSTs (Solid State Transformers - that can limit the fault current to two times of the rated current) & RSC (Reliable & Secure Communication) capabilities has been studied in this work in order to develop its appropriate protection & service restoration techniques. First, a solution is proposed that can make conventional protective devices be able to provide effective protection for FREEDM systems. Results show that although this scheme can provide required protection but it can be quite slow. Using the FREEDM system's communication capabilities, a communication assisted Overcurrent (O/C) protection scheme is proposed & results show that by using communication (blocking signals) very fast operating times are achieved thereby, mitigating the problem of conventional O/C scheme. Using the FREEDM System's DGI (Distributed Grid Intelligence) capability, an automated FLISR (Fault Location, Isolation & Service Restoration) scheme is proposed that is based on the concept of 'software agents' & uses lesser data (than conventional centralized approaches). Test results illustrated that this scheme is able to provide a global optimal system reconfiguration for service restoration.

  4. Power system EMP protection. Final report

    International Nuclear Information System (INIS)

    Marable, J.H.; Barnes, P.R.; Nelson, D.B.

    1975-05-01

    Voltage transients induced in electric power lines and control circuits by the electromagnetic pulse (EMP) from high-altitude nuclear detonations may cause widespread power failure and damage in electric power systems. This report contains a parametric study of EMP power line surges and discusses protective measures to minimize their effects. Since EMP surges have considerably greater rates of rise than lightning surges, recommended standards and test procedures are given to assure that surge arresters protect equipment from damage by EMP. Expected disturbances and damage to power systems are reviewed, and actions are presented which distribution companies can take to counter them. These include backup communications methods, stockpiling of vulnerable parts, repair procedures, and dispatcher actions to prevent blackout from EMP-caused instabilities. A long-range program is presented for improving distributors' protection against EMP. This involves employee training, hardware protection for power and control circuits, and improvement of plans for emergency action. (U.S.)

  5. Heartbeat-based error diagnosis framework for distributed embedded systems

    Science.gov (United States)

    Mishra, Swagat; Khilar, Pabitra Mohan

    2012-01-01

    Distributed Embedded Systems have significant applications in automobile industry as steer-by-wire, fly-by-wire and brake-by-wire systems. In this paper, we provide a general framework for fault detection in a distributed embedded real time system. We use heartbeat monitoring, check pointing and model based redundancy to design a scalable framework that takes care of task scheduling, temperature control and diagnosis of faulty nodes in a distributed embedded system. This helps in diagnosis and shutting down of faulty actuators before the system becomes unsafe. The framework is designed and tested using a new simulation model consisting of virtual nodes working on a message passing system.

  6. The protection system to Brazilian Nuclear Program

    International Nuclear Information System (INIS)

    Andreuzza, Mario Giussepp Santezzi Bertottelli

    1997-01-01

    The Sistema de Protecao ao Programa Nuclear Brasileiro-SIPRON (Protection System to Brazilian Nuclear Program) was established in 1980. It is intended to accomplish in only one system, all the actions related to security and protection for Nuclear Facilities in Brazil. The author presents in detail the protection system SIPRON, describing the system structure and organization, the functions and obligations of the system involved main organizations, as well as, the system operation and behaviour during an postulated occurrence of a nuclear emergency. It is also described an Exercise that happened in June of 1997 at the Nuclear Power Plant (NPP) Angra I, after two simulated tests in December of 1996 and April of 1997. The NPP Angra I Emergency Plan Exercise was a good opportunity to test the SIPRON structure and preparedness program. It was verified, included by International Atomic Energy Agency observers, the system involved organizations effectiveness and the procedures efficacy to protect the public and the environmental. Finally, it is shown the SIPRON activities of routine, the system obstacles and the expected future performances. (author)

  7. DLP-systems: Protection from Insiders

    Directory of Open Access Journals (Sweden)

    Ivan Sergeevich Boridko

    2013-02-01

    Full Text Available In the paper the necessity of further introduction of modern systems of information protection against internal leaks, including DLP-systems, is justified. The issues of development of training specialists in the field of information security is considered.

  8. Renovation of the cathodic protection system

    NARCIS (Netherlands)

    Schuten, G.; Leggedoor, J.; Polder, R.B.; Peelen, W.H.A.

    2003-01-01

    The first system for Cathodic Protection of concrete in the Netherlands was applied to a one bicycle lane of a bridge suffering corrosion due to de-icing salt penetration in 1986. This CP system was based on the Ferex 100S conducting polymer cable anode in a cementitious overlay. Its functioning was

  9. Future Interoperability of Camp Protection Systems (FICAPS)

    Science.gov (United States)

    Caron, Sylvie; Gündisch, Rainer; Marchand, Alain; Stahl, Karl-Hermann

    2013-05-01

    The FICAPS Project has been established as a Project of the European Defence Agency based on an initiative of Germany and France. Goal of this Project was to derive Guidelines, which by a proper implementation in future developments improve Camp Protection Systems (CPS) by enabling and improving interoperability between Camp Protection Systems and its Equipments of different Nations involved in multinational missions. These Guidelines shall allow for: • Real-time information exchange between equipments and systems of different suppliers and nations (even via SatCom), • Quick and easy replacement of equipments (even of different Nations) at run-time in the field by means of plug and play capability, thus lowering the operational and logistic costs and making the system highly available, • Enhancement of system capabilities (open and modular systems) by adding new equipment with new capabilities (just plug-in, automatic adjustment of the HMI Human Machine Interface) without costly and time consuming validation and test on system level (validation and test can be done on Equipment level), Four scenarios have been identified to summarize the interoperability requirements from an operational viewpoint. To prove the definitions given in the Guideline Document, a French and a German Demonstration System, based on existing national assets, were realized. Demonstrations, showing the capabilities given by the defined interoperability requirements with respect to the operational scenarios, were performed. Demonstrations included remote control of a CPS by another CPS, remote sensor control (Electro-Optic/InfraRed EO/IR) and remote effector control. This capability can be applied to extend the protection area or to protect distant infrastructural assets Demonstrations have been performed. The required interoperability functionality was shown successfully. Even if the focus of the FICAPS project was on camp protection, the solution found is also appropriate for other

  10. New framework of NGN web-based management system

    Science.gov (United States)

    Nian, Zhou; Jie, Yin; Qian, Mao

    2007-11-01

    This paper introduces the basic conceptions and key technology of the Ajax and some popular frameworks in the J2EE architecture, try to integrate all the frameworks into a new framework. The developers can develop web applications much more convenient by using this framework and the web application can provide a more friendly and interactive platform to the end users. At last an example is given to explain how to use the new framework to build a web-based management system of the softswitch network.

  11. Improved core protection calculator system algorithm

    International Nuclear Information System (INIS)

    Yoon, Tae Young; Park, Young Ho; In, Wang Kee; Bae, Jong Sik; Baeg, Seung Yeob

    2009-01-01

    Core Protection Calculator System (CPCS) is a digitized core protection system which provides core protection functions based on two reactor core operation parameters, Departure from Nucleate Boiling Ratio (DNBR) and Local Power Density (LPD). It generates a reactor trip signal when the core condition exceeds the DNBR or LPD design limit. It consists of four independent channels which adapted a two out of four trip logic. CPCS algorithm improvement for the newly designed core protection calculator system, RCOPS (Reactor COre Protection System), is described in this paper. New features include the improvement of DNBR algorithm for thermal margin, the addition of pre trip alarm generation for auxiliary trip function, VOPT (Variable Over Power Trip) prevention during RPCS (Reactor Power Cutback System) actuation and the improvement of CEA (Control Element Assembly) signal checking algorithm. To verify the improved CPCS algorithm, CPCS algorithm verification tests, 'Module Test' and 'Unit Test', would be performed on RCOPS single channel facility. It is expected that the improved CPCS algorithm will increase DNBR margin and enhance the plant availability by reducing unnecessary reactor trips

  12. Management information system on radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Grossi, Pablo Andrade; Souza, Leonardo Soares de; Figueiredo, Geraldo Magela, E-mail: pabloag@cdtn.b, E-mail: lss@cdtn.b, E-mail: gmf@cdtn.b [Centro de Desenvolvimento da Tecnologia Nuclear (CDTN/CNEN-MG), Belo Horizonte, MG (Brazil)

    2011-07-01

    Considering the flux complexity and the multi source information of all radiation protection activities on nuclear organizations, an effective management information system based on technology, information and people is necessary to improve the safety on all processes and operations subjected to radiation risks. An effective management information system is an essential tool to highlight the strengths and weaknesses and identify behaviors and trends on the activities requiring radiation protection programs. Such kind of distinct knowledge is useful to reach an effective management and support the human decision-making on nuclear organization. This paper presents a management information system based on Brazilian directives and regulations on radiation protection. Due to its generic characteristics, this radiation protection control system can be implemented on any nuclear organization by reediting the non restricted parameters which could differ considering all facilities and laboratories expected on-site with diverse technologies applications. This system can be considered as a powerful tool applied on the continuous management of radiation protection activities on nuclear organizations and research institutes as well as for long term planning, not only indicating how the safety activities are going, but why they are not going as well as planned where that is the case. (author)

  13. Management information system on radiation protection

    International Nuclear Information System (INIS)

    Grossi, Pablo Andrade; Souza, Leonardo Soares de; Figueiredo, Geraldo Magela

    2011-01-01

    Considering the flux complexity and the multi source information of all radiation protection activities on nuclear organizations, an effective management information system based on technology, information and people is necessary to improve the safety on all processes and operations subjected to radiation risks. An effective management information system is an essential tool to highlight the strengths and weaknesses and identify behaviors and trends on the activities requiring radiation protection programs. Such kind of distinct knowledge is useful to reach an effective management and support the human decision-making on nuclear organization. This paper presents a management information system based on Brazilian directives and regulations on radiation protection. Due to its generic characteristics, this radiation protection control system can be implemented on any nuclear organization by reediting the non restricted parameters which could differ considering all facilities and laboratories expected on-site with diverse technologies applications. This system can be considered as a powerful tool applied on the continuous management of radiation protection activities on nuclear organizations and research institutes as well as for long term planning, not only indicating how the safety activities are going, but why they are not going as well as planned where that is the case. (author)

  14. Architectural notes: a framework for distributed systems development

    NARCIS (Netherlands)

    Pires, L.F.; Ferreira Pires, Luis

    1994-01-01

    This thesis develops a framework of methods and techniques for distributed systems development. This framework consists of two related domains in which design concepts for distributed systems are defined: the entity domain and the behaviour domain. In the entity domain we consider structures of

  15. Primer Control System Cyber Security Framework and Technical Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  16. Televison assessment and identification system for the plutonium protection system

    International Nuclear Information System (INIS)

    Greenwoll, D.A.

    1979-02-01

    This report covers the selection, description, and use of the components comprising the Television Assessment and Identification System in the Hanford Plutonium Protection System. This work was sponsored by the Department of Energy/Office of Safeguards and Security (DOE/OSS) as part of the overall Sandia Fixed Facility Physical Protection Program

  17. Distance Protection for Microgrids in Distribution System

    DEFF Research Database (Denmark)

    Lin, Hengwei; Liu, Chengxi; Guerrero, Josep M.

    2015-01-01

    protection decreased. This paper adopts distance protection for one mid-voltage level microgrid in Aalborg, Denmark. Different operation modes of the network are analyzed and tested in the paper. The simulation results show that the variations of the fault currents seen by the forward relays are much larger...... than the backward relays. Meanwhile, the fault currents change little with the randomness of renewable energy except the intermittence. Finally, it shows that the designed distance protection has satisfactory performance to clear the various faults.......Owing to the increasing penetration of distributed generation, there are some challenges for the conventional protection in distribution system. Bidirectional power flow and variable fault current because of the various operation modes may lead to the selectivity and sensitivity of the overcurrent...

  18. Additional Safeguards for Children Using Biometric Technologies in the European Union Multilevel System from the Perspective of Fundamental Rights Protection

    OpenAIRE

    Sarrión Esteve, Joaquín

    2015-01-01

    I. Motivation. II. Methodology III. The advances of biometric technologies. A particular focus on DNA technology. IV. DNA technology legal framework V. Fundamental rights protection in EU Multilevel System VI. Additional Safeguards for Children Conclusions? I. Motivation. II. Methodology III. The advances of biometric technologies. A particular focus on DNA technology. IV. DNA technology legal framework V. Fundamental rights protection in EU Multileve...

  19. Dependability Evaluation of Advanced Diverse Protection System

    International Nuclear Information System (INIS)

    Oh, Yang Gyun; Lee, Yoon Hee; Sohn, Se Do; Baek, Seung Min; Lee, Sang Jeong

    2014-01-01

    For the mitigation of anticipated transients without scram (ATWS) as well as common cause failure (CCF) within the plant protection system (PPS) and the emergency safety feature . component control system (ESF-CCS), the diverse protection system (DPS) has been designed by KEPCO Engineering and Construction Company. Recently KEPCO E and C has developed the advanced diverse protection system (ADPS), which has four redundant channels, in an attempt to enhance a fault-tolerant capability of the system. For the evaluation of overall system improvement effects of the ADPS compared with the DPS, the dependability evaluation results are described herein. For all dependability attributes, this paper suggests a practical dependability evaluation method which uses quantitative dependability scores and indices. An overall dependability evaluation index (DEI) for the ADPS is evaluated with the average value of reliability/ security/maintainability/safety indices (i.e., RID, SID, MID, and SID') for dependability. The evaluation results show that the DEI value of ADPS can be improved by approximately 23% compared with that of the DPS, thanks to its fault-tolerant system architecture, software design changes, and external interface design features. Several suggestions have been made, in this paper, of an overall quantitative dependability evaluation method for the nuclear instrumentation and control (I and C) systems including the DPS and ADPS, and the usefulness of dependability evaluation on nuclear I and C systems has been confirmed

  20. Theoretical framework of integrated strategic performance management system

    OpenAIRE

    Mitrović, Zorica; Todorović, Marija; Bjelica, Dragan

    2015-01-01

    The aim of this paper is to present a conceptual model of the integrated strategic performance management system. This model is conceptual framework designed as a result of research that shows significant benefits of integrated application of strategic management and performance management in organizations. The framework consists of five steps: establishing a planning system, establishing of performance measurement system, establishing an accountability system, establishing of the knowledge m...

  1. Assessment of physical protection systems: EVA method

    International Nuclear Information System (INIS)

    Bernard, J.-L.; Lamotte, C.; Jorda, A.

    2001-01-01

    CEA's missions in various sectors of activity such as nuclear, defence, industrial contracts and the associated regulatory requirements, make it necessary to develop a strategy in the field of physical protection. In particular, firms having nuclear materials are subject to the July 25, 1980 law no.80-572 on the protection and control of nuclear materials. A holding permit delivered by the regulatory authority is conditioned to the protection by the operator of the nuclear materials used. In France it is the nuclear operator who must demonstrate, in the form of a security study, that potential aggressors would be neutralised before they could escape with the material. To meet these requirements, we have developed methods to assess the vulnerability of our facilities. The EVA method, the French acronym for 'Evaluation de la vulnerabilite des Acces' (access vulnerability system) allows dealing with internal and external threats involving brutal actions. In scenarios relating to external threat, the intruders get past the various barriers of our protection system, attempting to steal a large volume of material in one swoop and then escape. In the case of internal threat, the goal is the same. However, as the intruder usually has access to the material in the scope of his activities, the action begins at the level of the target. Our protection system is based on in-depth defense where the intruders are detected and then delayed in their advance towards their target to allow time for intervention forces to intercept them

  2. Evolution of the system of radiological protection

    International Nuclear Information System (INIS)

    2005-11-01

    One of the main challenges facing radiological protection experts is how to integrate radiological protection within modern concepts of and approaches to risk governance. It is within this context that the International Commission on Radiological Protection (ICRP) decided to develop new general recommendations to replace its Publication 60 recommendations of 1990. In the process of developing these new recommendations, the views of the ICRP have evolved significantly, largely due to stakeholder involvement that has been actively solicited by the ICRP. In this regard, it was upheld during the First Asian Regional Conference organised by the NEA in October 2002 that the implementation of the new system must allow for regional, societal and cultural differences. In order to ensure appropriate consideration of these differences, the NEA organised the Second Asian Regional Conference on the Evolution of the System of Radiological Protection. Held in Tokyo on 28-29 July 2004, the conference included presentations by the ICRP Chair as well as by radiological experts from Australia, China, Japan and Korea. Within their specific cultural and socio-political milieu, Asia-Pacific and western ways of thought on how to improve the current system of radiological protection were presented and discussed. These ways of thinking, along with a summary of the conference results, are described in these proceedings. (author)

  3. A behavioral framework for compositionality: linear systems, discrete event systems and hybrid systems

    NARCIS (Netherlands)

    Anak Agung Julius, A.A.J.; van der Schaft, Arjan

    2004-01-01

    In this paper we formulate a general framework based on the behavioral approach to dynamical systems, in which various issues regarding interconnection of systems can be addressed. The main part of the framework is that interconnections or compositions of systems can be modelled with interconnection

  4. An integrated numerical protection system (SPIN)

    International Nuclear Information System (INIS)

    Savornin, J.L.; Bouchet, J.M.; Furet, J.L.; Jover, P.; Sala, A.

    1978-01-01

    Developments in technology have now made it possible to perform more sophisticated protection functions which follow more closely the physical phenomena to be monitored. For this reason the Commissariat a l'energie atomique, Merlin-Gerin, Cerci and Framatome have embarked on the joint development of an Integrated Numerical Protection System (SPIN) which will fulfil this objective and will improve the safety and availability of power stations. The system described involves the use of programmed numerical techniques and a structure based on multiprocessors. The architecture has a redundancy of four. Throughout the development of the project the validity of the studies was confirmed by experiments. A first numerical model of a protection function was tested in the laboratory and is now in operation in a power station. A set of models was then introduced for checking the main components of the equipment finally chosen prior to building and testing a prototype. (author)

  5. A Classification Framework for Large-Scale Face Recognition Systems

    OpenAIRE

    Zhou, Ziheng; Deravi, Farzin

    2009-01-01

    This paper presents a generic classification framework for large-scale face recognition systems. Within the framework, a data sampling strategy is proposed to tackle the data imbalance when image pairs are sampled from thousands of face images for preparing a training dataset. A modified kernel Fisher discriminant classifier is proposed to make it computationally feasible to train the kernel-based classification method using tens of thousands of training samples. The framework is tested in an...

  6. Protecting group and switchable pore-discriminating adsorption properties of a hydrophilic-hydrophobic metal-organic framework.

    Science.gov (United States)

    Mohideen, M Infas H; Xiao, Bo; Wheatley, Paul S; McKinlay, Alistair C; Li, Yang; Slawin, Alexandra M Z; Aldous, David W; Cessford, Naomi F; Düren, Tina; Zhao, Xuebo; Gill, Rachel; Thomas, K Mark; Griffin, John M; Ashbrook, Sharon E; Morris, Russell E

    2011-04-01

    Formed by linking metals or metal clusters through organic linkers, metal-organic frameworks are a class of solids with structural and chemical properties that mark them out as candidates for many emerging gas storage, separation, catalysis and biomedical applications. Important features of these materials include their high porosity and their flexibility in response to chemical or physical stimuli. Here, a copper-based metal-organic framework has been prepared in which the starting linker (benzene-1,3,5-tricarboxylic acid) undergoes selective monoesterification during synthesis to produce a solid with two different channel systems, lined by hydrophilic and hydrophobic surfaces, respectively. The material reacts differently to gases or vapours of dissimilar chemistry, some stimulating subtle framework flexibility or showing kinetic adsorption effects. Adsorption can be switched between the two channels by judicious choice of the conditions. The monoesterified linker is recoverable in quantitative yield, demonstrating possible uses of metal-organic frameworks in molecular synthetic chemistry as 'protecting groups' to accomplish selective transformations that are difficult using standard chemistry techniques.

  7. Evolution of the system of radiological protection

    International Nuclear Information System (INIS)

    2004-01-01

    The development of new radiological protection recommendations by the International Commission on Radiological Protection (ICRP) continues to be a strategically important undertaking, both nationally and internationally. With the growing recognition of the importance of stakeholder aspects in radiological protection decision making, regional and cultural aspects have also emerged as having potentially significant influence on how protection of the public, workers and the environment are viewed. Differing cultural aspects should therefore be considered by the ICRP in its development of new recommendations. Based on this assumption, the NEA organised the Asian Regional Conference on the Evolution of the System of Radiological Protection to express and explore views from the Far East. Held in Tokyo on 24-25 October 2002, the conference included presentations by the ICRP Chair as well as by radiological protection experts from Japan, the Republic of Korea, China and Australia. The distinct views and needs of these countries were discussed in the context of their regional and cultural heritages. These views, along with a summary of the conference results, are presented in these proceedings. (author)

  8. 78 FR 77574 - Protection System Maintenance Reliability Standard

    Science.gov (United States)

    2013-12-24

    ... commissioning of power system protection systems.\\55\\ NERC commits in its Comments to keep the Commission... commissioning of power system protection systems.\\62\\ As explained in the NOPR, our concern is with a protection... protection system, ``resulting in line relays being placed in service with the incorrect transformer ratio...

  9. Additional reactor protection system of RBMK-1500

    International Nuclear Information System (INIS)

    1999-01-01

    Analysis of anticipated transients without scram of RBMK-1500 reactor showed that additional reactor protection system is required. Data of accident analysis in the case of loose of external electric power and loose of vacuum in condensers of turbines are provided

  10. Validation of reactor core protection system

    International Nuclear Information System (INIS)

    Lee, Sang-Hoon; Bae, Jong-Sik; Baeg, Seung-Yeob; Cho, Chang-Ho; Kim, Chang-Ho; Kim, Sung-Ho; Kim, Hang-Bae; In, Wang-Kee; Park, Young-Ho

    2008-01-01

    Reactor COre Protection System (RCOPS), an advanced core protection calculator system, is a digitized one which provides core protection function based on two reactor core operation parameters, Departure from Nucleate Boiling Ratio (DNBR) and Local Power Density (LPD). It generates a reactor trip signal when the core condition exceeds the DNBR or LPD design limit. It consists of four independent channels adapted a two-out-of-four trip logic. System configuration, hardware platform and an improved algorithm of the newly designed core protection calculator system are described in this paper. One channel of RCOPS was implemented as a single channel facility for this R and D project where we performed final integration software testing. To implement custom function blocks, pSET is used. Software test is performed by two methods. The first method is a 'Software Module Test' and the second method is a 'Software Unit Test'. New features include improvement of core thermal margin through a revised on-line DNBR algorithm, resolution of the latching problem of control element assembly signal and addition of the pre-trip alarm generation. The change of the on-line DNBR calculation algorithm is considered to improve the DNBR net margin by 2.5%-3.3%. (author)

  11. New evaluation system for antisabotage physical protection

    International Nuclear Information System (INIS)

    Itakura, Shuichiro; Nakagome, Yoshihiro

    2008-01-01

    The discussion on an appropriate level of physical protection has not been elaborated so far because of the confidentiality of its nature, thus resulting in a lack of consensus on this issue. In view of this context, a new system for the evaluation of antisabotage physical protection systems is proposed in this paper, in which we introduce openness to a certain extent in the process of the evaluation. The proposed system is composed of the following three elements; (1) establishment of an evaluation basis threat (EBT), which should be less strong but more likely to occur than the design basis threat (DBT); (2) employment of realistic standard scenarios in the process of evaluation; (3) disclosure of results of evaluation implemented based on the above EBT and standard scenarios. It is expected that this considerably open system will foment peace of mind among citizens as well as create a deterrent effect that would minimize the occurrence of sabotage on nuclear facilities. (author)

  12. Safety Analysis for Power Reactor Protection System

    International Nuclear Information System (INIS)

    Eisawy, E.A.; Sallam, H.

    2012-01-01

    The main function of a Reactor Protection System (RPS) is to safely shutdown the reactor and prevents the release of radioactive materials. The purpose of this paper is to present a technique and its application for used in the analysis of safety system of the Nuclear Power Plant (NPP). A more advanced technique has been presented to accurately study such problems as the plant availability assessments and Technical Specifications evaluations that are becoming increasingly important. The paper provides the Markov model for the Reactor Protection System of the NPP and presents results of model evaluations for two testing policies in technical specifications. The quantification of the Markov model provides the probability values that the system will occupy each of the possible states as a function of time.

  13. A Logical Framework for Reputation Systems

    DEFF Research Database (Denmark)

    Nielsen, Mogens; Krukow, Karl Kristian; Sassone, Vladimiro

    2008-01-01

    Reputation systems are meta systems that record, aggregate and distribute information about principals' behaviour in distributed applications. Similarly, history-based access control systems make decisions based on programs' past security-sensitive actions. While the applications are distinct...

  14. A global framework for future costs and benefits of river-flood protection in urban areas

    Science.gov (United States)

    Ward, Philip J.; Jongman, Brenden; Aerts, Jeroen C. J. H.; Bates, Paul D.; Botzen, Wouter J. W.; Diaz Loaiza, Andres; Hallegatte, Stephane; Kind, Jarl M.; Kwadijk, Jaap; Scussolini, Paolo; Winsemius, Hessel C.

    2017-09-01

    Floods cause billions of dollars of damage each year, and flood risks are expected to increase due to socio-economic development, subsidence, and climate change. Implementing additional flood risk management measures can limit losses, protecting people and livelihoods. Whilst several models have been developed to assess global-scale river-flood risk, methods for evaluating flood risk management investments globally are lacking. Here, we present a framework for assessing costs and benefits of structural flood protection measures in urban areas around the world. We demonstrate its use under different assumptions of current and future climate change and socio-economic development. Under these assumptions, investments in dykes may be economically attractive for reducing risk in large parts of the world, but not everywhere. In some regions, economically efficient investments could reduce future flood risk below today’s levels, in spite of climate change and economic growth. We also demonstrate the sensitivity of the results to different assumptions and parameters. The framework can be used to identify regions where river-flood protection investments should be prioritized, or where other risk-reducing strategies should be emphasized.

  15. Collaborative Learning Framework in Business Management Systems

    Directory of Open Access Journals (Sweden)

    Vladimir GRIGORE

    2008-01-01

    Full Text Available This paper presents a solution based on collaboration with experts and practitioner from university and ERP companies involved in process learning by training and learning by working. The solution uses CPI test to establish proper team for framework modules: Real-Time Chat Room, Discussion Forum, E-mail Support and Learning through Training. We define novice, practitioner and expert competence level based on CORONET train methodology. ERP companies have own roles for mentoring services to knowledge workers and evaluate the performance of learning process with teachers’ cooperation in learning by teaching and learning by working module.

  16. Frameworks to assess health systems governance: a systematic review.

    Science.gov (United States)

    Pyone, Thidar; Smith, Helen; van den Broek, Nynke

    2017-06-01

    Governance of the health system is a relatively new concept and there are gaps in understanding what health system governance is and how it could be assessed. We conducted a systematic review of the literature to describe the concept of governance and the theories underpinning as applied to health systems; and to identify which frameworks are available and have been applied to assess health systems governance. Frameworks were reviewed to understand how the principles of governance might be operationalized at different levels of a health system. Electronic databases and web portals of international institutions concerned with governance were searched for publications in English for the period January 1994 to February 2016. Sixteen frameworks developed to assess governance in the health system were identified and are described. Of these, six frameworks were developed based on theories from new institutional economics; three are primarily informed by political science and public management disciplines; three arise from the development literature and four use multidisciplinary approaches. Only five of the identified frameworks have been applied. These used the principal-agent theory, theory of common pool resources, North's institutional analysis and the cybernetics theory. Governance is a practice, dependent on arrangements set at political or national level, but which needs to be operationalized by individuals at lower levels in the health system; multi-level frameworks acknowledge this. Three frameworks were used to assess governance at all levels of the health system. Health system governance is complex and difficult to assess; the concept of governance originates from different disciplines and is multidimensional. There is a need to validate and apply existing frameworks and share lessons learnt regarding which frameworks work well in which settings. A comprehensive assessment of governance could enable policy makers to prioritize solutions for problems identified

  17. Strengthening the human rights framework to protect breastfeeding: a focus on CEDAW.

    Science.gov (United States)

    Galtry, Judith

    2015-01-01

    continues to be inadequately addressed in international human rights law on women. A comparison is made with CRC and its subsequent elaborations. Increasing recognition of the need to protect, promote and support breastfeeding within the framework of CRC but not that of CEDAW suggests that breastfeeding is regarded primarily as a children's rights issue but only minimally as a women's rights issue. The human rights framework requires strengthening in every direction to protect, promote and support breastfeeding. Discussion is needed regarding whether a separate strengthening of the international human rights framework on women is required with regard to breastfeeding.

  18. An atmospheric vulnerability assessment framework for environment management and protection based on CAMx.

    Science.gov (United States)

    Zhang, Yang; Shen, Jing; Li, Yu

    2018-02-01

    This paper presents an atmospheric vulnerability assessment framework based on CAMx that should be helpful to assess potential impacts of changes in human, atmospheric environment, and social economic elements of atmospheric vulnerability. It is also a useful and effective tool that can provide policy-guidance for environmental protection and management to reduce the atmospheric vulnerability. The developed framework was applied to evaluate the atmospheric environment vulnerability of 13 cities in the Beijing-Tianjin-Hebei (BTH) region for verification. The results indicated that regional disparity of the atmospheric vulnerability existed in the study site. More specifically, the central and southern regions show more atmospheric environment vulnerability than the northern regions. The impact factors of atmospheric environment vulnerability in the BTH region mainly derived from increasing population press, frequently unfavorable meteorological conditions, extensive economic growth of secondary industry, increased environmental pollution, and accelerating population aging. The framework shown in this paper is an interpretative and heuristic tool for a better understanding of atmospheric vulnerability. This framework can also be replicated at different spatial and temporal scales using context-specific datasets to straightly support environmental managers with decision-making. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. A qualitative evaluation approach for energy system modelling frameworks

    DEFF Research Database (Denmark)

    Wiese, Frauke; Hilpert, Simon; Kaldemeyer, Cord

    2018-01-01

    properties define how useful it is in regard to the existing challenges. For energy system models, evaluation methods exist, but we argue that many decisions upon properties are rather made on the model generator or framework level. Thus, this paper presents a qualitative approach to evaluate frameworks...

  20. Generic adaptation framework for unifying adaptive web-based systems

    NARCIS (Netherlands)

    Knutov, E.

    2012-01-01

    The Generic Adaptation Framework (GAF) research project first and foremost creates a common formal framework for describing current and future adaptive hypermedia (AHS) and adaptive webbased systems in general. It provides a commonly agreed upon taxonomy and a reference model that encompasses the

  1. Generic Model Predictive Control Framework for Advanced Driver Assistance Systems

    NARCIS (Netherlands)

    Wang, M.

    2014-01-01

    This thesis deals with a model predictive control framework for control design of Advanced Driver Assistance Systems, where car-following tasks are under control. The framework is applied to design several autonomous and cooperative controllers and to examine the controller properties at the

  2. Regulatory System of Radiation Protection in Taiwan

    International Nuclear Information System (INIS)

    Tang, F. T.; Huang, C. C.

    2004-01-01

    After the radioactive contaminated buildings incident occurred in Taiwan in 1993, the competent authority for radiation protection the Atomic Energy Council (AEC) started to review the structured problem of radiation protection regulatory system. Through several years' investigation and study, the AEC has improved two important tools in radiation protection regulatory system, i.e., control regulations and actual practice, and made them more rigorous and efficient. This paper will make a brief introduction of the efforts that Taiwan has made in this respect. Taiwan's radiation protection control was based on the Atomic Energy Law promulgated in 1968, but the control idea and authorization scope were not sufficient to appropriately respond to the highly developed economy and democracy in Taiwan. After several years' legislative process, the Ionizing Radiation Protection Law (IRP Law) was promulgated and entered into force on February 1, 2003. This IRP Law specifically emphasizes categorized risk management of radiation sources, establishment of personnel licenses and training system, enhancement of public safety control, and implementation of quality assurance program for medical exposure. The Legislative Yuan (Congress) fully authorized the competent authority to establish various technological control regulations according to control necessity without prior review by the Legislative Yuan in advance. As to the penalties of the violations of the IRP Law, the AEC adopts high-rated administrative fines and applies the Criminal Law to those who seriously contaminate the environment. In actual practice, the AEC has constructed a Radiation Protection Control Information System compatible with the IRP Law that fully combines the functions of computers and Internet. The information of facility operators who own radiation sources, radiation protection specialists, and operating personnel are entered into this system, starting from the submission of application of the

  3. Addressing Circuitous Currents MVDC Power Systems Protection

    Science.gov (United States)

    2017-12-31

    Addressing Circuitous Currents MVDC Power Systems Protection 5b. GRANT NUMBER N00014-16-1-3113 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR($) Sd. PROJECT NUMBER...efficiency. A challenge with DC distribution is electrical protection . Z-source DC breakers alt! an pti n b&i g cvr.sidcrcd and this w rk ~xplores...zonal distribution, electric ship 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS PAGE ABSTRACT u u u uu 18. NUMBER

  4. Scheduling system for test automation framework

    NARCIS (Netherlands)

    Wahyudi, Djohan

    2014-01-01

    An Interventional X-ray (iXR) system provides real time X-ray imaging with high image clarity and low X-ray dose. After several years of development, the iXR System has become complex. In order to verify the correct operation of the system, the system integration and test group performs extensive

  5. BIODIVERSITY AND THE PROTECTED AREAS SYSTEM IN ALBANIA

    Directory of Open Access Journals (Sweden)

    Mehmet Metaj

    2009-06-01

    Full Text Available Albania possesses a wide range of ecological systems including coastal zones, estuaries and lagoons, lakes and wetlands, grasslands, middle-low altitude coppice forests, high altitude forests, alpine vegetation and glacial areas. The country possesses about 3,250 species of vascular plants, 165 families and more than 900 genera. Medicinal plants (botanicals and non-timber forest products have a long history of importance in the culture and traditional knowledge of Albania. Proper legislation and especially legal and regulatory framework enforcement for the regulation of this developing industry remains lacking. A Strategy of Biodiversity plan developed in 2000 calls for an increase in the Protected Areas system which currently covers some 6 % of Albania's area to a total area of 435,600 ha, approximately 15 % of the country's territory. Changes in the legal and policy framework as well as institutional structures is required to move forward and provide an environment for biodiversity conservation and a sustainable protected areas system. The various threats to biodiversity and constraints to improvement are outlined as well as recommendations for sustainable use, assessment and regulation.

  6. Magnetic field generated by lightning protection system

    Science.gov (United States)

    Geri, A.; Veca, G. M.

    1988-04-01

    A lightning protection system for today's civil buildings must be electromagnetically compatible with the electronic equipment present in the building. This paper highlights a mathematic model which analyzes the electromagnetic effects in the environment in which the lightning protection system is. This model is developed by means of finite elements of an electrical circuit where each element is represented by a double pole circuit according to the trapezoidal algorithm developed using the finite difference method. It is thus possible to analyze the electromagnetic phenomena associated with the transient effects created by the lightning stroke even for a high-intensity current. Referring to an elementary system comprised of an air terminal, a down conductor, and a ground terminal, numerical results are here laid out.

  7. Expert systems for protective monitoring of facilities

    International Nuclear Information System (INIS)

    Carr, K.R.

    1987-01-01

    In complex plants, the possibility of serious operator error always exists to some extent, but, this can be especially true during an experiment or some other unusual exercise. Possible contributing factors to operational error include personnel fatigue, misunderstanding in communication, mistakes in executing orders, uncertainty about the delegated authority, pressure to meet a demanding schedule, and a lack of understanding of the possible consequences of deliberate violations of the facility's established operating procedures. Authoritative reports indicate that most of these factors were involved in the disastrous Russian Chernobyl-4 nuclear reactor accident in April 1986, which, ironically, occurred when a safety experiment was being conducted. Given the computer hardware and software now available for implementing expert systems together with integrated signal monitoring and communications, plant protection could be enhanced by an expert system with extended features to monitor the plant. The system could require information from the operators on a rigidly enforced schedule and automatically log in and report on a scheduled time basis to authorities at a central remote site during periods of safe operation. Additionally, the system could warn an operator or automatically shut down the plant in case of dangerous conditions, while simultaneously notifying independent, responsible, off-site personnel of the action taken. This approach would provide protection beyond that provided by typical facility scram circuits. This paper presents such an approach to implementing an expert system for plant protection, together with specific hardware and software configurations. The Chernobyl accident is used as the basis of discussion

  8. Fire protection countermeasures for containment ventilation systems

    International Nuclear Information System (INIS)

    Alvares, N.J.; Beason, D.G.; Bergman, W.; Ford, H.W.; Lipska, A.E.

    1980-01-01

    The goal of this project is to find countermeasures to protect HEPA filters in exit ventilation ducts from the heat and smoke generated by fire. Several methods for partially mitigating the smoke exposure to the HEPA filters were identified through testing and analysis. These independently involve controlling the fuel, controlling the fire, and intercepting the smoke aerosol prior to its sorption on the HEPA filter. Exit duct treatment of aerosols is not unusual in industrial applications and involves the use of scrubbers, prefilters, and inertial impaction, depending on the size, distribution, and concentration of the subject aerosol. However, when these unmodified techniques were applied to smoke aerosols from fires on materials, common to experimental laboratories of LLNL, it was found they offered minimal protection to the HEPA filters. Ultimately, a continuous, movable, high-efficiency prefilter using modified commercial equipment was designed. This technique is capable of protecting HEPA filters over the total duration of the test fires. The reason for success involved the modificaton of the prefiltration media. Commercially available filter media has a particle sorption efficiency that is inversely proportional to media strength. To achieve properties of both efficiency and strength, we laminated rolling filter media with the desired properties. It is not true that the use of rolling prefilters solely to protect HEPA filters from fire-generated smoke aerosols is cost effective in every type of containment system, especially if standard fire-protection systems are available in the space. But in areas of high fire risk, where the potential fuel load is large and ignition sources are plentiful, the complication of a rolling prefilter in exit ventilation ducts to protect HEPA filters from smoke aerosols is definitely justified

  9. Poster Abstract: Towards a Categorization Framework for Occupancy Sensing Systems

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Lazarova-Molnar, Sanja; Jradi, Muhyiddine

    2015-01-01

    on occupancy sensing systems goes beyond basic methods, there is an increasing need for better comparison of proposed occupancy sensing systems. Developers of occupancy sensing systems are also lacking good frameworks for understanding different options when building occupancy sensing systems. This poster...

  10. Fire protection countermeasures for containment ventilation systems

    International Nuclear Information System (INIS)

    Alvares, N.; Beason, D.; Bergman, V.; Creighton, J.; Ford, H.; Lipska, A.

    1980-01-01

    The goal of this project is to find countermeasures to protect High Efficiency Particulate Air (HEPA) filters, in exit ventilation ducts, from the heat and smoke generated by fire. Initially, methods were developed to cool fire-heated air by fine water spray upstream of the filters. It was recognized that smoke aerosol exposure to HEPA filters could also cause disruption of the containment system. Through testing and analysis, several methods to partially mitigate the smoke exposure to the HEPA filters were identified. A continuous, movable, high-efficiency prefilter using modified commercial equipment was designed. The technique is capable of protecting HEPA filters over the total time duration of the test fires. The reason for success involved the modification of the prefiltration media. Commercially available filter media has particle sorption efficiency that is inversely proportional to media strength. To achieve properties of both efficiency and strength, rolling filter media were laminated with the desired properties. The approach was Edisonian, but truncation in short order to a combination of prefilters was effective. The application of this technique was qualified, since it is of use only to protect HEPA filters from fire-generated smoke aerosols. It is not believed that this technique is cost effective in the total spectrum of containment systems, especially if standard fire protection systems are available in the space. But in areas of high-fire risk, where the potential fuel load is large and ignition sources are plentiful, the complication of a rolling prefilter in exit ventilation ducts to protect HEPA filters from smoke aerosols is definitely justified

  11. Protective underpressure system for nuclear power plants

    International Nuclear Information System (INIS)

    Anon.

    1979-01-01

    A vacuum protection system for a nuclear reactor is described containng the possible accident in the immediate area where it happened. The system uses underpressure in the air-tight primary circuit jacket. Immediately after the accident, part of air is forced out from the area where coolant is being lost to another area which is then separated from the accident area. The desired underpressure is attained by steam condensation. A system diagram is shown and the time-dependent pressure changes in the contained areas are presented. (J.B.)

  12. LGBTQ relationally based positive psychology: An inclusive and systemic framework.

    Science.gov (United States)

    Domínguez, Daniela G; Bobele, Monte; Coppock, Jacqueline; Peña, Ezequiel

    2015-05-01

    Positive psychologists have contributed to our understandings of how positive emotions and flexible cognition enhance resiliency. However, positive psychologists' research has been slow to address the relational resources and interactions that help nonheterosexual families overcome adversity. Addressing overlooked lesbian, gay, bisexual, transgender, or queer (LGBTQ) and systemic factors in positive psychology, this article draws on family resilience literature and LGBTQ literature to theorize a systemic positive psychology framework for working with nonheterosexual families. We developed the LGBTQ relationally based positive psychology framework that integrates positive psychology's strengths-based perspective with the systemic orientation of Walsh's (1996) family resilience framework along with the cultural considerations proposed by LGBTQ family literature. We theorize that the LGBTQ relationally based positive psychology framework takes into consideration the sociopolitical adversities impacting nonheterosexual families and sensitizes positive psychologists, including those working in organized care settings, to the systemic interactions of same-sex loving relationships. (c) 2015 APA, all rights reserved).

  13. Framework for a comprehensive bridge management and information system.

    Science.gov (United States)

    2011-11-01

    "The purpose of this research project was to provide a framework for the development of a Bridge : Management Information System (BMIS). Researchers developed a synthesis of current BMIS development : activities and identified sources of data availab...

  14. Incipient fault detection and power system protection for spaceborne systems

    Science.gov (United States)

    Russell, B. Don; Hackler, Irene M.

    1987-01-01

    A program was initiated to study the feasibility of using advanced terrestrial power system protection techniques for spacecraft power systems. It was designed to enhance and automate spacecraft power distribution systems in the areas of safety, reliability and maintenance. The proposed power management/distribution system is described as well as security assessment and control, incipient and low current fault detection, and the proposed spaceborne protection system. It is noted that the intelligent remote power controller permits the implementation of digital relaying algorithms with both adaptive and programmable characteristics.

  15. AN AUTOMATED NETWORK SECURITYCHECKING AND ALERT SYSTEM: A NEW FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Yadav

    2013-09-01

    Full Text Available Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open gates of a building through which any one can get into. Network scanning is performed to identify insecure entry points in the network components. To find out vulnerabilities on these points vulnerability assessment is performed. So security checking consists of both activities- network scanning as well as vulnerability assessment. A single tool used for the security checking may not give reliable results. This paper presents a framework for assessing the security of a network using multiple Network Scanning and Vulnerability Assessment tools. The proposed framework is an extension of the framework given by Jun Yoon and Wontae Sim [1] which performs vulnerability scanning only. The framework presented here adds network scanning, alerting and reporting system to their framework. Network scanning and vulnerability tools together complement each other and make it amenable for centralized control and management. The reporting system of framework sends an email to the network administrator which contains detailed report (as attachment of security checking process. Alerting system sends a SMS message as an alert to the network administrator in case of severe threats found in the network. Initial results of the framework are encouraging and further work is in progress.

  16. PACS/information systems interoperability using Enterprise Communication Framework.

    Science.gov (United States)

    alSafadi, Y; Lord, W P; Mankovich, N J

    1998-06-01

    Interoperability among healthcare applications goes beyond connectivity to allow components to exchange structured information and work together in a predictable, coordinated fashion. To facilitate building an interoperability infrastructure, an Enterprise Communication Framework (ECF) was developed by the members of the Andover Working Group for Healthcare Interoperability (AWG-OHI). The ECF consists of four models: 1) Use Case Model, 2) Domain Information Model (DIM), 3) Interaction Model, and 4) Message Model. To realize this framework, a software component called the Enterprise Communicator (EC) is used. In this paper, we will demonstrate the use of the framework in interoperating a picture archiving and communication system (PACS) with a radiology information system (RIS).

  17. Fixed-site physical protection system modeling

    International Nuclear Information System (INIS)

    Chapman, L.D.

    1975-01-01

    An evaluation of a fixed-site safeguard security system must consider the interrelationships of barriers, alarms, on-site and off-site guards, and their effectiveness against a forcible adversary attack whose intention is to create an act of sabotage or theft. A computer model has been developed at Sandia Laboratories for the evaluation of alternative fixed-site security systems. Trade-offs involving on-site and off-site response forces and response times, perimeter alarm systems, barrier configurations, and varying levels of threat can be analyzed. The computer model provides a framework for performing inexpensive experiments on fixed-site security systems for testing alternative decisions, and for determining the relative cost effectiveness associated with these decision policies

  18. Sub-assembly accident protection instrumentation systems

    International Nuclear Information System (INIS)

    Vaughan, G.J.; Lunt, A.R.W.; Evans, N.J.; Lawrence, L.A.J.

    1982-01-01

    The possibility of an incident in a sub-assembly progressing to the stage at which the whole core may be at hazard has to be guarded against. It is proposed that for CDFR specific instrumentation will be provided to protect against this incident. Three such systems are described, these are: Acoustic Boiling Noise Detection, Burst Pin Detection and Individual Sub-Assembly Thermocouple (ISAT) monitoring. In the ISAT case, multiplexers and microprocessors are employed, using novel techniques to ensure failure-to-safety. The role of these systems and the implementation of them in the reactor design are also considered. It is concluded that sufficient protection can be provided for both core and breeder sub-assemblies

  19. A development framework for semantically interoperable health information systems.

    Science.gov (United States)

    Lopez, Diego M; Blobel, Bernd G M E

    2009-02-01

    Semantic interoperability is a basic challenge to be met for new generations of distributed, communicating and co-operating health information systems (HIS) enabling shared care and e-Health. Analysis, design, implementation and maintenance of such systems and intrinsic architectures have to follow a unified development methodology. The Generic Component Model (GCM) is used as a framework for modeling any system to evaluate and harmonize state of the art architecture development approaches and standards for health information systems as well as to derive a coherent architecture development framework for sustainable, semantically interoperable HIS and their components. The proposed methodology is based on the Rational Unified Process (RUP), taking advantage of its flexibility to be configured for integrating other architectural approaches such as Service-Oriented Architecture (SOA), Model-Driven Architecture (MDA), ISO 10746, and HL7 Development Framework (HDF). Existing architectural approaches have been analyzed, compared and finally harmonized towards an architecture development framework for advanced health information systems. Starting with the requirements for semantic interoperability derived from paradigm changes for health information systems, and supported in formal software process engineering methods, an appropriate development framework for semantically interoperable HIS has been provided. The usability of the framework has been exemplified in a public health scenario.

  20. A post-Bertalanffy Systemics Healthcare Competitive Framework Proposal.

    Science.gov (United States)

    Fiorini, Rodolfo A; Santacroce, Giulia F

    2014-01-01

    Health Information community can take advantage of a new evolutive categorization cybernetic framework. A systemic concept of principles organizing nature is proposed. It can be used as a multiscaling reference framework to develop successful and competitive antifragile system and new HRO information management strategies in advanced healthcare organization (HO) and high reliability organization (HRO) conveniently. Expected impacts are multifarious and quite articulated at different system scale level: major one is that, for the first time, Biomedical Engineering ideal system categorization levels can be matched exactly to practical system modeling interaction styles, with no paradigmatic operational ambiguity and information loss.

  1. An anomaly analysis framework for database systems

    NARCIS (Netherlands)

    Vavilis, S.; Egner, A.I.; Petkovic, M.; Zannone, N.

    2015-01-01

    Anomaly detection systems are usually employed to monitor database activities in order to detect security incidents. These systems raise an alert when anomalous activities are detected. The raised alerts have to be analyzed to timely respond to the security incidents. Their analysis, however, is

  2. Earth Systems Science: An Analytic Framework

    Science.gov (United States)

    Finley, Fred N.; Nam, Younkeyong; Oughton, John

    2011-01-01

    Earth Systems Science (ESS) is emerging rapidly as a discipline and is being used to replace the older earth science education that has been taught as unrelated disciplines--geology, meteorology, astronomy, and oceanography. ESS is complex and is based on the idea that the earth can be understood as a set of interacting natural and social systems.…

  3. Development of In-Core Protection System

    International Nuclear Information System (INIS)

    Cho, J. H; Kim, C. H.; Kim, J. H.; Jeong, S. H.; Sohn, S. D.; BaeK, S. M.; YOON, J. H.

    2016-01-01

    In-core Protection System (ICOPS) is an on-line digital computer system which continuously calculates Departure from Nucleate Boiling Ratio (DNBR) and Local Power Density (LPD) based on plant parameters to make trip decisions based on the computations. The function of the system is the same as that of Core Protection Calculator System (CPCS) and Reactor Core Protection System (RCOPS) which are applied to Optimized Power Reactor 1000 (OPR1000) and Advanced Power Reactor 1400 (APR1400). The ICOPS has been developed to overcome the algorithm related obstacles in overseas project. To achieve this goal, several algorithms were newly developed and hardware and software design was updated. The functional design requirements document was developed by KEPCO-NF and the component design was conducted by Doosan. System design and software implementation were performed by KEPCO-E and C, and software Verification and Validation (V and V) was performed by KEPCO-E and C and Sure Softtech. The ICOPS has been developed to overcome the algorithm related obstacles in overseas project. The function of I/O simulator was improved even though the hardware platform is the same as that of RCOPS for Shin-Hanul 1 and 2. SCADE was applied to the implementation of ICOPS software, and the V and V system for ICOPS which satisfies international standards was developed. Although several further detailed design works remain, the function of ICOPS has been confirmed. The ICOPS will be applied to APR+ project, and the further works will be performed in following project

  4. Development of In-Core Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Cho, J. H; Kim, C. H.; Kim, J. H.; Jeong, S. H.; Sohn, S. D.; BaeK, S. M.; YOON, J. H. [KEPCO Engineering and Construction Co., Deajeon (Korea, Republic of)

    2016-10-15

    In-core Protection System (ICOPS) is an on-line digital computer system which continuously calculates Departure from Nucleate Boiling Ratio (DNBR) and Local Power Density (LPD) based on plant parameters to make trip decisions based on the computations. The function of the system is the same as that of Core Protection Calculator System (CPCS) and Reactor Core Protection System (RCOPS) which are applied to Optimized Power Reactor 1000 (OPR1000) and Advanced Power Reactor 1400 (APR1400). The ICOPS has been developed to overcome the algorithm related obstacles in overseas project. To achieve this goal, several algorithms were newly developed and hardware and software design was updated. The functional design requirements document was developed by KEPCO-NF and the component design was conducted by Doosan. System design and software implementation were performed by KEPCO-E and C, and software Verification and Validation (V and V) was performed by KEPCO-E and C and Sure Softtech. The ICOPS has been developed to overcome the algorithm related obstacles in overseas project. The function of I/O simulator was improved even though the hardware platform is the same as that of RCOPS for Shin-Hanul 1 and 2. SCADE was applied to the implementation of ICOPS software, and the V and V system for ICOPS which satisfies international standards was developed. Although several further detailed design works remain, the function of ICOPS has been confirmed. The ICOPS will be applied to APR+ project, and the further works will be performed in following project.

  5. Lightning protection system for a wind turbine

    Science.gov (United States)

    Costin, Daniel P [Chelsea, VT; Petter, Jeffrey K [Williston, VT

    2008-05-27

    In a wind turbine (104, 500, 704) having a plurality of blades (132, 404, 516, 744) and a blade rotor hub (120, 712), a lightning protection system (100, 504, 700) for conducting lightning strikes to any one of the blades and the region surrounding the blade hub along a path around the blade hub and critical components of the wind turbine, such as the generator (112, 716), gearbox (708) and main turbine bearings (176, 724).

  6. Halon 1301 protection system for nuclear containments

    International Nuclear Information System (INIS)

    McHale, E.T.

    1981-01-01

    Halon 1301 can provide protection against any combustion hazard that hydrogen gas might present in an LWR containment following a loss-of-coolant accident. A development program was conducted, comprising analytical study, laboratory experiments and large-scale testing, to define the requirements for a Halon 1301 system and to examine certain operational problems that were hypothesized. Some results of the study are presented in this paper

  7. Protection of LV system against lightning

    OpenAIRE

    Yordanova Nedyalkova, Greta

    2010-01-01

    Lightning is a natural hazard and one of the greatest local mysteries. Scientists have not fully understood the mechanism of lightning. It is one of the most beautiful displays in nature and one of the nature's most dangerous phenomenon known to man. Overvoltage due to lightning is a very important problem of LV systems. Some lightning flashes damage buildings and a few kill or injure people and animals, either directly or indirectly, by causing fire and explosions. The need for protect...

  8. Beam loss monitor system for machine protection

    CERN Document Server

    Dehning, B

    2005-01-01

    Most beam loss monitoring systems are based on the detection of secondary shower particles which depose their energy in the accelerator equipment and finally also in the monitoring detector. To allow an efficient protection of the equipment, the likely loss locations have to be identified by tracking simulations or by using low intensity beams. If superconducting magnets are used for the beam guiding system, not only a damage protection is required but also quench preventions. The quench levels for high field magnets are several orders of magnitude below the damage levels. To keep the operational efficiency high under such circumstances, the calibration factor between the energy deposition in the coils and the energy deposition in the detectors has to be accurately known. To allow a reliable damage protection and quench prevention, the mean time between failures should be high. If in such failsafe system the number of monitors is numerous, the false dump probability has to be kept low to keep a high operation...

  9. Tracking the Debate Around Marine Protected Areas: Key Issues and the BEG Framework

    Science.gov (United States)

    Thorpe, Andy; Bavinck, Maarten; Coulthard, Sarah

    2011-04-01

    Marine conservation is often criticized for a mono-disciplinary approach, which delivers fragmented solutions to complex problems with differing interpretations of success. As a means of reflecting on the breadth and range of scientific research on the management of the marine environment, this paper develops an analytical framework to gauge the foci of policy documents and published scientific work on Marine Protected Areas. We evaluate the extent to which MPA research articles delineate objectives around three domains: biological-ecological [B]; economic-social[E]; and governance-management [G]. This permits us to develop an analytic [BEG] framework which we then test on a sample of selected journal article cohorts. While the framework reveals the dominance of biologically focussed research [B], analysis also reveals a growing frequency of the use of governance/management terminology in the literature over the last 15 years, which may be indicative of a shift towards more integrated consideration of governance concerns. However, consideration of the economic/social domain appears to lag behind biological and governance concerns in both frequency and presence in MPA literature.

  10. A Holistic and Immune System inspired Security Framework

    OpenAIRE

    Mwakalinga, G. Jeffy; Yngström, Louise; Kowalski, Stewart

    2009-01-01

    This paper presents a Framework for adaptive information security systems for securing information systems. Information systems today are vulnerable and not adaptive to the dynamic environments because initial development of these systems focused on computer technology and communications protocol only. Most research in information security does not consider culture of users, system environments and does not pay enough attention to the enemies of information systems. As a result, users serve t...

  11. Enhanced personal protection system for the PS

    CERN Multimedia

    Caroline Duc

    2013-01-01

    During the first long shutdown (LS1) a new safety system will be installed in the primary beam areas of the PS complex in order to bring the standard of personnel radiation protection at the PS into line with that of the LHC.   Pierre Ninin, deputy group leader of GS-ASE and responsible for the installation of the new PS complex safety system, in front of a new access control system. The LHC access control systems are state-of-the-art, whereas those of the injection chain accelerators were running the risk of becoming obsolete. For the past two years a project to upgrade the access and safety systems of the first links in the LHC accelerator chain has been underway to bring them into compliance with nuclear safety standards. These systems provide the personnel with automatic protection by limiting access to hazardous areas and by ensuring that nobody is present in the areas when the accelerator is in operation. By the end of 2013, the project teams will ha...

  12. Framework to investigate emergence in system engineering

    CSIR Research Space (South Africa)

    Oosthuizen, R

    2011-09-01

    Full Text Available System Engineering is the process of identifying, implementing and maintaining solutions to real world problems. Some problems tend to be messy with no single solution or set of effective and accurate requirements, often resulting in implementation...

  13. A macroeconomic framework for quantifying systemic risk

    OpenAIRE

    He, Zhiguo; Krishnamurthy, Arvind

    2012-01-01

    Systemic risk arises when shocks lead to states where a disruption in financial intermediation adversely affects the economy and feeds back into further disrupting financial intermediation. We present a macroeconomic model with a financial intermediary sector subject to an equity capital constraint. The novel aspect of our analysis is that the model produces a stochastic steady state distribution for the economy, in which only some of the states correspond to systemic risk states. The model a...

  14. Cybersecurity Framework for Ship Industrial Control System

    OpenAIRE

    Maule, R. William; Hake, Joseph

    2016-01-01

    Ship mechanical and electrical control systems, and the communications grid through which these devices operate, are a high priority concern for Navy leadership. Ship systems use microprocessor-based controls to interface with physical objects, and Programmable Logic Controllers (PLCs) to automate ship electromechanical processes. Ship operations are completely dependent on these devices. The commercial security products upon which ships depend do not work on ICS, leaving ships vulnerable. Th...

  15. An Automatic Car Counting System Using OverFeat Framework.

    Science.gov (United States)

    Biswas, Debojit; Su, Hongbo; Wang, Chengyi; Blankenship, Jason; Stevanovic, Aleksandar

    2017-06-30

    Automatic car counting is an important component in the automated traffic system. Car counting is very important to understand the traffic load and optimize the traffic signals. In this paper, we implemented the Gaussian Background Subtraction Method and OverFeat Framework to count cars. OverFeat Framework is a combination of Convolution Neural Network (CNN) and one machine learning classifier (like Support Vector Machines (SVM) or Logistic Regression). With this study, we showed another possible application area for the OverFeat Framework. The advantages and shortcomings of the Background Subtraction Method and OverFeat Framework were analyzed using six individual traffic videos with different perspectives, such as camera angles, weather conditions and time of the day. In addition, we compared the two algorithms above with manual counting and a commercial software called Placemeter. The OverFeat Framework showed significant potential in the field of car counting with the average accuracy of 96.55% in our experiment.

  16. System state estimation and optimal energy control framework for multicell lithium-ion battery system

    International Nuclear Information System (INIS)

    Wei, Jingwen; Dong, Guangzhong; Chen, Zonghai; Kang, Yu

    2017-01-01

    Highlights: • Employed a dual-scale EKF based estimator for in-pack cells’ SOC values. • Proposed a two-stage hybrid state-feedback and output-feedback equalization algorithm. • A switchable balance current mode is designed in the equalization topology. • Verified the performance of proposed method under two conditions. - Abstract: Cell variations caused by the inevitable inconsistency during manufacture and use of battery cells have significant impacts on battery capacity, security and durability for battery energy storage systems. Thus, the battery equalization systems are essentially required to reduce variations of in-pack cells and increase battery pack capability. In order to protect all in-pack cells from damaging, estimate battery state and reduce variations, a system state estimation and energy optimal control framework for multicell lithium-ion battery system is proposed. The state-of-charge (SOC) values of all in-pack cells are firstly estimated using a dual-scale extended Kalman filtering (EKF) to improve estimation accuracy and reduce computation simultaneously. These estimated SOC values provide specific details of battery system, which cannot only be used to protect cells from over-charging/over-discharging, but also be employed to design state-feedback controller for battery equalization system. A two-stage hybrid state-feedback and output-feedback equalization algorithm is proposed. The state-feedback controller is firstly employed for coarse-grained adjustment to reduce equalization time cost with large current. However, due to the inevitable SOC estimation errors, the output-feedback controller is then used for fine-grained adjustment with trickle current. Experimental results show that the proposed framework can provide an effectively estimation and energy control for multicell battery systems. Finally, the implementation of the proposed method is further discussed for the real applications.

  17. A compositional modelling framework for exploring MPSoC systems

    DEFF Research Database (Denmark)

    Tranberg-Hansen, Anders Sejer; Madsen, Jan

    2009-01-01

    This paper presents a novel compositional framework for system level performance estimation and exploration of Multi-Processor System On Chip (MPSoC) based systems. The main contributions are the definition of a compositional model which allows quantitative performance estimation to be carried ou...

  18. A framework for semantic driven electronic examination system for ...

    African Journals Online (AJOL)

    The framework is implemented using Java programming language and a prototype of the proposed system is tested and compared with the existing system. Results show that words that are synonymous to any given correct answer are equally recognize as correct option. Hence, the e - examination system reliability, ...

  19. Valve system incorporating single failure protection logic

    Science.gov (United States)

    Ryan, Rodger; Timmerman, Walter J. H.

    1980-01-01

    A valve system incorporating single failure protective logic. The system consists of a valve combination or composite valve which allows actuation or de-actuation of a device such as a hydraulic cylinder or other mechanism, integral with or separate from the valve assembly, by means of three independent input signals combined in a function commonly known as two-out-of-three logic. Using the input signals as independent and redundant actuation/de-actuation signals, a single signal failure, or failure of the corresponding valve or valve set, will neither prevent the desired action, nor cause the undesired action of the mechanism.

  20. Coherence protection in coupled quantum systems

    Science.gov (United States)

    Cammack, H. M.; Kirton, P.; Stace, T. M.; Eastham, P. R.; Keeling, J.; Lovett, B. W.

    2018-02-01

    The interaction of a quantum system with its environment causes decoherence, setting a fundamental limit on its suitability for quantum information processing. However, we show that if the system consists of coupled parts with different internal energy scales then the interaction of one part with a thermal bath need not lead to loss of coherence from the other. Remarkably, we find that the protected part can remain coherent for longer when the coupling to the bath becomes stronger or the temperature is raised. Our theory will enable the design of decoherence-resistant hybrid quantum computers.

  1. Integrated nuclear and radiation protection systems

    International Nuclear Information System (INIS)

    Oprea, I.; Oprea, M.; Stoica, V.; Cerga, V.; Pirvu, V.; Badea, E.

    1993-01-01

    A multifunctional radiation monitoring equipment, flexible and capable to meet virtually environmental radiation monitoring, activity measurement and computational requirements, for nuclear laboratories has been designed. It can be used as a radiation protection system, for radionuclide measurement in isotope laboratories, nuclear technology, health physics and nuclear medicine, nuclear power stations and nuclear industry. The equipment is able to measure, transmit and record gamma dose rate and isotope activities. Other parameters and functions are optionally available, such as: self-contained alarm level, system self-test, dose integrator, syringe volume calculation for a given dose corrected for decay, calibration factor, 99 Mo assays performing and background subtraction

  2. River Protection Project information systems assessment

    Energy Technology Data Exchange (ETDEWEB)

    JOHNSON, A.L.

    1999-07-28

    The Information Systems Assessment Report documents the results from assessing the Project Hanford Management Contract (PHMC) Hanford Data Integrator 2000 (HANDI 2000) system, Business Management System (BMS) and Work Management System phases (WMS), with respect to the System Engineering Capability Assessment Model (CAM). The assessment was performed in accordance with the expectations stated in the fiscal year (FY) 1999 Performance Agreement 7.1.1, item (2) which reads, ''Provide an assessment report on the selected Integrated Information System by July 31, 1999.'' This report assesses the BMS and WMS as implemented and planned for the River Protection Project (RPP). The systems implementation is being performed under the PHMC HANDI 2000 information system project. The project began in FY 1998 with the BMS, proceeded in FY 1999 with the Master Equipment List portion of the WMS, and will continue the WMS implementation as funding provides. This report constitutes an interim quality assessment providing information necessary for planning RPP's information systems activities. To avoid confusion, HANDI 2000 will be used when referring to the entire system, encompassing both the BMS and WMS. A graphical depiction of the system is shown in Figure 2-1 of this report.

  3. River Protection Project information systems assessment

    International Nuclear Information System (INIS)

    JOHNSON, A.L.

    1999-01-01

    The Information Systems Assessment Report documents the results from assessing the Project Hanford Management Contract (PHMC) Hanford Data Integrator 2000 (HANDI 2000) system, Business Management System (BMS) and Work Management System phases (WMS), with respect to the System Engineering Capability Assessment Model (CAM). The assessment was performed in accordance with the expectations stated in the fiscal year (FY) 1999 Performance Agreement 7.1.1, item (2) which reads, ''Provide an assessment report on the selected Integrated Information System by July 31, 1999.'' This report assesses the BMS and WMS as implemented and planned for the River Protection Project (RPP). The systems implementation is being performed under the PHMC HANDI 2000 information system project. The project began in FY 1998 with the BMS, proceeded in FY 1999 with the Master Equipment List portion of the WMS, and will continue the WMS implementation as funding provides. This report constitutes an interim quality assessment providing information necessary for planning RPP's information systems activities. To avoid confusion, HANDI 2000 will be used when referring to the entire system, encompassing both the BMS and WMS. A graphical depiction of the system is shown in Figure 2-1 of this report

  4. Environmental Information System Baden-Wuerttemberg. RK UIS 2015 framework concept 2015

    International Nuclear Information System (INIS)

    Weissenbach, Kurt

    2016-01-01

    The Baden-Wuerttemberg Environmental Information System (UIS BW), which was set up over 30 years ago, has developed into a strategic national policy instrument for precautionary environmental and climate protection. Its importance will continue to increase as digitalisation progresses. The associated framework concept (RK UIS) has been regularly updated since 1989. The RK UIS 2015 is a fundamental revision of the last framework concept from the year 2006. The legal, technical, technical and organizational requirements that have since been amended have been incorporated and reflected in their impact on the overall conceptual framework. The RK UIS 2015 documents recommendations and development goals for adapting the UIS BW to the changed targets and general conditions. The renewed conceptual framework forms the basis for the further development of the individual UIS components. [de

  5. PG BN 1600 sodium fire protection system

    International Nuclear Information System (INIS)

    Bar, J.; Urbancik, L.

    1978-12-01

    A design was developed of a fire protection system for steam generator of a 1600 MW sodium cooled fast reactor (BN-1600). Chemical reactions are described of liquid sodium with atmospheric components and solid materials coming into contact with sodium in its release from the steam generator, and in safeguarding protection against sodium fires. The requirements for the purity of nitrogen as an atmosphere inert to liquid sodium are given. Characteristics and basic parameters are shown of level and spray fires, elementary terms are explained concerning the properties of aerosols formed during fires, the methods and means of release signalling and fire alarm are described as are fire precautions using fire-fighting equipment, modifying the support tank and the cell bottom and building sewage pits. The design of the system comprises an alarm system for liquid sodium using point and line electric contact sensors and flame photometer based aerosol sensors as well as a fire-fighting system based on the system of channelling liquid sodium into emergency discharge tanks filled with an inert gas, a set of fire extinguishers and other fire fighting material, and measures for the elimination of sodium fire consequences. (J.B.)

  6. Distributed software framework and continuous integration in hydroinformatics systems

    Science.gov (United States)

    Zhou, Jianzhong; Zhang, Wei; Xie, Mengfei; Lu, Chengwei; Chen, Xiao

    2017-08-01

    When encountering multiple and complicated models, multisource structured and unstructured data, complex requirements analysis, the platform design and integration of hydroinformatics systems become a challenge. To properly solve these problems, we describe a distributed software framework and it’s continuous integration process in hydroinformatics systems. This distributed framework mainly consists of server cluster for models, distributed database, GIS (Geographic Information System) servers, master node and clients. Based on it, a GIS - based decision support system for joint regulating of water quantity and water quality of group lakes in Wuhan China is established.

  7. A Configurable, Object-Oriented, Transportation System Software Framework

    Energy Technology Data Exchange (ETDEWEB)

    KELLY,SUZANNE M.; MYRE,JOHN W.; PRICE,MARK H.; RUSSELL,ERIC D.; SCOTT,DAN W.

    2000-08-01

    The Transportation Surety Center, 6300, has been conducting continuing research into and development of information systems for the Configurable Transportation Security and Information Management System (CTSS) project, an Object-Oriented Framework approach that uses Component-Based Software Development to facilitate rapid deployment of new systems while improving software cost containment, development reliability, compatibility, and extensibility. The direction has been to develop a Fleet Management System (FMS) framework using object-oriented technology. The goal for the current development is to provide a software and hardware environment that will demonstrate and support object-oriented development commonly in the FMS Central Command Center and Vehicle domains.

  8. The run permit protection system for GTA

    International Nuclear Information System (INIS)

    Atkins, W.H.; Jones, R.G.

    1992-01-01

    A Run Permit system has been designed for the Ground Test Accelerator (GTA). The system implements mode-dependent software interlocks to ensure proper operation of the accelerator, enabling the ion source extractor and RF systems when proper conditions are met. The system is implemented using the GTA control system; thus all information available to the control system is also available for use in interlock logic. The logic is defined in terms of control system channels, which reflect accelerator parameters such as actuator positions, power supply values, temperatures, etc. A mode switch in the control room selects the accelerator operating mode, for example i njector only . The Run Permit software selects interlock logic as appropriate operating mode. This implementation easily accommodates logic changes as requirements evolve. To ensure reliable operation of a software-based system, a special circuit with a watch-dog timer is employed to produce the system's output signals. The software must periodically address the circuit, or the output signals are forced to a disabled state. For additional protection, there are self-test provisions for detecting and reacting to failures of the control system. (Author) 4 figs., ref

  9. Legislative and statutory framework of radiation protection of patients in Romania

    International Nuclear Information System (INIS)

    Milu, Constantin

    2008-01-01

    The paper presents the legislative and statutory framework of radiation protection of patients in Romania, starting with the basic Law 111/1996 on the Safe Deployment of Nuclear Activities, and its amendments in 1998 and 2006 and the general nuclear safety regulation, which is in agreement with the international regulation. Regarding the medical exposure, jointly the Nuclear Regulatory Authority and the Ministry of Public Health issued in 2002 a separate regulation, which was published in the Official Gazette Part I No. 446 bis in 25 June 2002 and represents the transposition of the European Directive 97/43/EURATOM of 30 June 1997 on health protection on individuals against the dangers of ionizing radiation in relation to medical exposure, and repealing Directive 84/466/EURATOM. Following this document, several specific regulations on radiation protection of the patients were approved by the Ministry of Public Health. Some practical problems already arise, particularly due to the lack of medical physics departments in hospitals. (author)

  10. Building an integrative framework for national systems of innovation

    DEFF Research Database (Denmark)

    Wang, Yuandi; Zhou, Zhao

    2011-01-01

    development of functional view of national systems of innovation, and the effective approach. Design/methodology/approach – As a theoretical research paper, the paper reviews and analyses intensive literature on national system of innovation from the perspectives of functional, structural, and effectiveness......Purpose – This paper proposes a way to integrate three different analytical approaches into a consistent framework of national systems of innovation that can benefit academia and policy makers. The approaches include the traditional structural method of national systems of innovation, the new...... approaches. Findings – The paper argues that these three approaches reflect different perspectives of national systems of innovation. Instead of contradicting each other, they could be integrated into a coherent framework. Originality/value – The paper builds an integrative framework to bring different...

  11. National Ignition Facility environmental protection systems

    International Nuclear Information System (INIS)

    Mintz, J.M.; Reitz, T.C.; Tobin, M.T.

    1994-06-01

    The conceptual design of Environmental Protection Systems (EPS) for the National Ignition Facility (NIF) is described. These systems encompass tritium and activated debris handling, chamber, debris shield and general decontamination, neutron and gamma monitoring, and radioactive, hazardous and mixed waste handling. Key performance specifications met by EPS designs include limiting the tritium inventory to 300 Ci and total tritium release from NIF facilities to less than 10 Ci/yr. Total radiation doses attributable to NIF shall remain below 10 mrem/yr for any member of the general public and 500 mrem/yr for NIF staff. ALARA-based design features and operational procedures will, in most cases, result in much lower measured exposures. Waste minimization, improved cycle time and reduced exposures all result from the proposed CO2 robotic arm cleaning and decontamination system, while effective tritium control is achieved through a modern system design based on double containment and the proven detritiation technology

  12. Radiological protection national system. Basic security rules

    International Nuclear Information System (INIS)

    1981-01-01

    This work has been prepared as the first one of a set of standards and regulations that will be enforced to provide the protection of men and the environment against the undesirable effects of ionizing radiations. It establishes, in the first place, the system of dose limits for the country and the principles of its utilization. It takes into account the CIPR's recommendations in this area and the mentioned frame of reference, it establishes further the necessary restrictions for the application of the limits to the professionally exposed workers, as well as to the isolated members of the public and the population in general. In addition it establishes the general conditions to be met for the implementation of radiological protection, among them, the classification of working areas and working conditions as well as the compulsory periodical medical surveillance. (H.D.N.)

  13. A Framework for Adaptive Information Security Systems : A Holistic Investigation

    OpenAIRE

    Mwakalinga, Jeffy

    2011-01-01

    This research proposes a framework for adaptive information security systems that considers both the technical and social aspects of information systems security. Initial development of information systems security focused on computer technology and communication protocols. Researchers and designers did not consider culture, traditions, ethics, and other social issues of the people using the systems when designing and developing information security systems. They also seemed to ignore environ...

  14. A Framework for the Design of Service Systems

    Science.gov (United States)

    Tan, Yao-Hua; Hofman, Wout; Gordijn, Jaap; Hulstijn, Joris

    We propose a framework for the design and implementation of service systems, especially to design controls for long-term sustainable value co-creation. The framework is based on the software support tool e3-control. To illustrate the framework we use a large-scale case study, the Beer Living Lab, for simplification of customs procedures in international trade. The BeerLL shows how value co-creation can be achieved by reduction of administrative burden in international beer export due to electronic customs. Participants in the BeerLL are Heineken, IBM and Dutch Tax & Customs.

  15. Data Curation in the World Data System: Proposed Framework

    Directory of Open Access Journals (Sweden)

    P Laughton

    2013-09-01

    Full Text Available The value of data in society is increasing rapidly. Organisations that work with data should have standard practices in place to ensure successful curation of data. The World Data System (WDS consists of a number of data centres responsible for curating research data sets for the scientific community. The WDS has no formal data curation framework or model in place to act as a guideline for member data centres. The objective of this research was to develop a framework for the curation of data in the WDS. A multiple-case case study was conducted. Interviews were used to gather qualitative data and analysis of the data, which led to the development of this framework. The proposed framework is largely based on the Open Archival Information System (OAIS functional model and caters for the curation of both analogue and digital data.

  16. Social-ecological system framework: initial changes and continuing challenges

    Directory of Open Access Journals (Sweden)

    Michael D. McGinnis

    2014-06-01

    Full Text Available The social-ecological system (SES framework investigated in this special issue enables researchers from diverse disciplinary backgrounds working on different resource sectors in disparate geographic areas, biophysical conditions, and temporal domains to share a common vocabulary for the construction and testing of alternative theories and models that determine which influences on processes and outcomes are especially critical in specific empirical settings. We summarize changes that have been made to this framework and discuss a few remaining ambiguities in its formulation. Specifically, we offer a tentative rearrangement of the list of relevant attributes of governance systems and discuss other ways to make this framework applicable to policy settings beyond natural resource settings. The SES framework will continue to change as more researchers apply it to additional contexts; the main purpose of this article is to delineate the version that served as the basis for the theoretical innovations and empirical analyses detailed in other contributions to this special issue.

  17. A Framework for Understanding Post-Merger Information Systems Integration

    DEFF Research Database (Denmark)

    Alaranta, Maria; Kautz, Karlheinz

    2012-01-01

    This paper develops a theoretical framework for the integration of information systems (IS) after a merger or an acquisition. The framework integrates three perspectives: a structuralist, an individualist, and an interactive process perspective to analyze and understand such integrations....... The framework is applied to a longitudinal case study of a manufacturing company that grew through an acquisition. The management decided to integrate the production control IS via tailoring a new system that blends together features of existing IS. The application of the framework in the case study confirms...... several known impediments to IS integrations. It also identifies a number of new inhibitors, as well as known and new facilitators that can bring post-merger IS integration to a success. Our findings provide relevant insights to researching and managing post-merger IS integrations. They emphasize...

  18. A framework expert system for pressure vessels

    International Nuclear Information System (INIS)

    Wang, Y.C.; Qin, S.J.

    1989-01-01

    Expert systems, known as a powerful tool to those numerical problems accompanied with logical argumentation, are facing the era of extended application into the engineering fields beyond the classical scopes of diagnosis and consultation. With regard to pressure vessels design it seems that the most important task is to establish a general purpose frame based on a microcomputer skeleton system to meet the various requirements of different vessels. The authors have made an attempt to perform such a skeleton designated file, ESTOOL, in order to achieve the objectives of executing numerical calculation combined with logical reasoning, and attaining higher efficiency of rules searching process. It has been successfully patched to the design software package for jacketed vessel with stirring shaft. This paper presents the guiding concepts and basic structure of ESTOOL via knowledge acquisition subsystem and inference engine

  19. An Automatic Car Counting System Using OverFeat Framework

    OpenAIRE

    Biswas, Debojit; Su, Hongbo; Wang, Chengyi; Blankenship, Jason; Stevanovic, Aleksandar

    2017-01-01

    Automatic car counting is an important component in the automated traffic system. Car counting is very important to understand the traffic load and optimize the traffic signals. In this paper, we implemented the Gaussian Background Subtraction Method and OverFeat Framework to count cars. OverFeat Framework is a combination of Convolution Neural Network (CNN) and one machine learning classifier (like Support Vector Machines (SVM) or Logistic Regression). With this study, we showed another poss...

  20. Investigation in Query System Framework for High Energy Physics

    CERN Document Server

    Jatuphattharachat, Thanat

    2017-01-01

    We summarize an investigation in query system framework for HEP (High Energy Physics). Our work was an investigation on distributed server part of Femtocode, which is a query language that provides the ability for physicists to make plots and other aggregations in real-time. To make the system more robust and capable of processing large amount of data quickly, it is necessary to deploy the system on a redundant and distributed computing cluster. This project aims to investigate third party coordination and resource management frameworks which fit into the design of real-time distributed query system. Zookeeper, Mesos and Marathon are the main frameworks for this investigation. The results indicate that Zookeeper is good for job coordinator and job tracking as it provides robust, fast, simple and transparent read and write process for all connecting client across distributed Zookeeper server. Furthermore, it also supports high availability access and consistency guarantee within specific time bound.

  1. Radiological protection system in the era of nuclear renaissance expectation for development of radiological protection system

    International Nuclear Information System (INIS)

    Toyomatsu, Hideki

    2008-01-01

    The current radiological protection system, which was established mainly by the ICRP and UNSCEAR, has contributed to the prevention of potential radiological health hazards, and has been a fundamental concept during the development of nuclear energy. Through a detailed discussion regarding the new ICRP recommendations, the world nuclear industry has reached a consensus that the current radiological protection system keeps its integrity in principle although it involves some remaining issues, such as the disposal of radioactive waste. In order to maximize the advantages of nuclear energy while keeping the integrity of radiological protection system, it is essential to address the characteristics of radiation, which is specific to nuclear energy, so that nuclear energy can coexist with other energy sources. The three basic principles of radiological protection (i.e., justification, optimization and dose limits), which were completed in the 1990 recommendations of ICRP, should be retained as the basic concepts for the future radiological protection system in order to maintain the continuity and consistency of the radiological protection system. The radiological protection system can be furthermore developed only by combining the above three principles with best practices extracted from utilities' field experience. The significant reduction of radiation exposures received by members of the public and radiation workers in the field has resulted from the efforts by the world utilities to achieve the optimization. In order to correctly apply the theory to the work practices, it is essential to see how the theory is practically used in the field. Such a process should be also emphasized in the revision work of the IAEA Basic Safety Standards (BSS), which is currently under progress. Integrating the theory in the work practices is the key to the true development of nuclear renaissance, which could lead to the establishment of the nuclear safety regime. (author)

  2. TREAT Reactor Control and Protection System

    International Nuclear Information System (INIS)

    Lipinski, W.C.; Brookshier, W.K.; Burrows, D.R.; Lenkszus, F.R.; McDowell, W.P.

    1985-01-01

    The main control algorithm of the Transient Reactor Test Facility (TREAT) Automatic Reactor Control System (ARCS) resides in Read Only Memory (ROM) and only experiment specific parameters are input via keyboard entry. Prior to executing an experiment, the software and hardware of the control computer is tested by a closed loop real-time simulation. Two computers with parallel processing are used for the reactor simulation and another computer is used for simulation of the control rod system. A monitor computer, used as a redundant diverse reactor protection channel, uses more conservative setpoints and reduces challenges to the Reactor Trip System (RTS). The RTS consists of triplicated hardwired channels with one out of three logic. The RTS is automatically tested by a digital Dedicated Microprocessor Tester (DMT) prior to the execution of an experiment. 6 refs., 5 figs., 1 tab

  3. Towards a conceptual framework for protection of personal information from the perspective of activity theory

    Directory of Open Access Journals (Sweden)

    Tiko Iyamu

    2017-11-01

    Full Text Available Background: Personal information about individuals is stored by organisations including government agencies. The information is intended to be kept confidential and strictly used for its primary and legitimate purposes. However, that has not always been the case in many South African government agencies and departments. In recent years, personal information about individuals and groups has been illegally leaked for other motives, in which some were detrimental. Even though there exists a legislation, Protection of Personal Information (POPI Act, which prohibits such malpractices, illegally leaked information has however, not stopped or reduced. In addition to the adoption of the POPI Act, a more stringent approach is therefore needed in order to improve sanity in the use and management of personal information. Otherwise, the detriment that such malpractices cause too many citizens can only be on the increase. Objectives: The objectives of this study were in twofold: (1 to examine and understand the activities that happen with personal information leaks, which includes why and how information is leaked; and (2 to develop a conceptual framework, which includes identification of the factors that influence information leaks and breaches in an environment. Method: Qualitative research methods were followed in achieving the objectives of the study. Within the qualitative methods, documents including existing literature were gathered. The activity theory was employed as lens to guide the analysis. Result: From the analysis, four critical factors were found to be of influence in information leaks and breaches in organisations. The factors include: (1 information and its value, (2 the roles of society and its compliance to information protection, (3 government and its laws relating to information protection and (4 the need for standardisation of information usage and management within a community. Based on the factors, a conceptual framework was

  4. Fault-tolerant reactor protection system

    International Nuclear Information System (INIS)

    Gaubatz, D.C.

    1997-01-01

    A reactor protection system is disclosed having four divisions, with quad redundant sensors for each scram parameter providing input to four independent microprocessor-based electronic chassis. Each electronic chassis acquires the scram parameter data from its own sensor, digitizes the information, and then transmits the sensor reading to the other three electronic chassis via optical fibers. To increase system availability and reduce false scrams, the reactor protection system employs two levels of voting on a need for reactor scram. The electronic chassis perform software divisional data processing, vote 2/3 with spare based upon information from all four sensors, and send the divisional scram signals to the hardware logic panel, which performs a 2/4 division vote on whether or not to initiate a reactor scram. Each chassis makes a divisional scram decision based on data from all sensors. Each division performs independently of the others (asynchronous operation). All communications between the divisions are asynchronous. Each chassis substitutes its own spare sensor reading in the 2/3 vote if a sensor reading from one of the other chassis is faulty or missing. Therefore the presence of at least two valid sensor readings in excess of a set point is required before terminating the output to the hardware logic of a scram inhibition signal even when one of the four sensors is faulty or when one of the divisions is out of service. 16 figs

  5. Thermal Protection Systems: Past, Present and Future

    Science.gov (United States)

    Johnson, Sylvia M.

    2015-01-01

    Thermal protection materials and systems (TPS) have been critical to fulfilling humankinds desire to explore space. Composite and ceramic materials have enabled the early missions to orbit, the moon, the space station, Mars with robots, and sample return. Crewed missions to Mars are being considered, and this places even more demands on TPS materials. This talk will give some history on the materials used for earth and planetary entry and the demands placed upon such materials. TPS needs for future missions, especially to Mars, will be identified and potential solutions discussed.

  6. Reactor protection system refurbishment at Paks

    International Nuclear Information System (INIS)

    Hetzmann, A.; Turi, T.

    1997-01-01

    The history and the milestones of the reactor protection system refurbishment are outlined. During the preparation phase of the refurbishment project, detailed requirements have been set up and specific technical solutions developed. The structure of the project documents prepared during these activities is shown in a figure. The life cycle of the project was divided into four phases: the preparatory phase; the design and manufacturing phase; the installation and commissioning phase; and the operation phase. For all four Paks units a time schedule for implementation was set up. The licensing process is dealt with; the principal license was issued in June 1996. (A.K.)

  7. A Modeling Framework for Schedulability Analysis of Distributed Avionics Systems

    DEFF Research Database (Denmark)

    Han, Pujie; Zhai, Zhengjun; Nielsen, Brian

    2018-01-01

    This paper presents a modeling framework for schedulability analysis of distributed integrated modular avionics (DIMA) systems that consist of spatially distributed ARINC-653 modules connected by a unified AFDX network. We model a DIMA system as a set of stopwatch automata (SWA) in UPPAAL...

  8. Model-based safety architecture framework for complex systems

    NARCIS (Netherlands)

    Schuitemaker, Katja; Rajabali Nejad, Mohammadreza; Braakhuis, J.G.; Podofillini, Luca; Sudret, Bruno; Stojadinovic, Bozidar; Zio, Enrico; Kröger, Wolfgang

    2015-01-01

    The shift to transparency and rising need of the general public for safety, together with the increasing complexity and interdisciplinarity of modern safety-critical Systems of Systems (SoS) have resulted in a Model-Based Safety Architecture Framework (MBSAF) for capturing and sharing architectural

  9. Generic Formal Framework for Compositional Analysis of Hierarchical Scheduling Systems

    DEFF Research Database (Denmark)

    Boudjadar, Jalil; Hyun Kim, Jin; Thi Xuan Phan, Linh

    We present a compositional framework for the specification and analysis of hierarchical scheduling systems (HSS). Firstly we provide a generic formal model, which can be used to describe any type of scheduling system. The concept of Job automata is introduced in order to model job instantiation...

  10. Mechanisms of symbiont-conferred protection against natural enemies: an ecological and evolutionary framework.

    Science.gov (United States)

    Gerardo, Nicole M; Parker, Benjamin J

    2014-10-01

    Many vertically-transmitted microbial symbionts protect their insect hosts from natural enemies, including host-targeted pathogens and parasites, and those vectored by insects to other hosts. Protection is often achieved through production of inhibiting toxins, which is not surprising given that toxin production mediates competition in many environments. Classical models of macroecological interactions, however, demonstrate that interspecific competition can be less direct, and recent research indicates that symbiont-protection can be mediated through exploitation of limiting resources, and through activation of host immune mechanisms that then suppress natural enemies. Available data, though limited, suggest that effects of symbionts on vectored pathogens and parasites, as compared to those that are host-targeted, are more likely to result from symbiont activation of the host immune system. We discuss these different mechanisms in light of their potential impact on the evolution of host physiological processes. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. A step-by-step framework to assess benefits of established temperate marine protected areas

    Directory of Open Access Journals (Sweden)

    Albrecht Götz

    2013-01-01

    Full Text Available Marine protected areas (MPAs have been advocated as a solution to the challenges of both conservation and modern fishery management, but their application remains controversial, partly because there are only general guidelines for evaluating their effectiveness. We propose a framework to specifically evaluate established MPAs in six steps. We tested the approach by reviewing published research and unpublished information on the Goukamma MPA in the centre of the South African temperate south coast. Information reviewed included effects on the structure of fish populations, catch and abundance indices of fish species, and ecosystem effects. We investigated factors that determine the usefulness of a MPA in fisheries management, including the movement behaviour of adult fishes, larval dispersal and fisher-displacement patterns. We found that differences in the rates of exploitation across the MPA border resulted in differences in abundance, size and condition of the main target species, roman (Chrysoblephus laticeps. The diversity and abundance of non-target fish species, and the composition of the benthic invertebrate community, were affected by the cessation of fishing. The potential for "spillover" of adult roman might be limited to the vicinity of the MPA by their small home range, but there is potential for self-seeding and dispersal of roman eggs and larvae over wider areas. These theoretical considerations were confirmed by an analysis of catch data from before and after MPA implementation. The framework presented here may help to identify and fill gaps in the knowledge of established MPAs along South Africa's temperate south coast.

  12. A Framework for Identifying and Understanding Enterprise Systems Benefits

    DEFF Research Database (Denmark)

    Schubert, Petra; Williams, Susan P.

    2011-01-01

    Purpose – Identifying the benefits arising from implementations of enterprise systems and realizing business value remains a significant challenge for both research and industry. This paper aims to consolidate previous work. It presents a framework for investigating enterprise systems benefits...... into aspects and criteria plus an attributed appraisal value. The resulting scheme for the “three-level benefit codes” provides a greater level of detail about the nature of expected and realized benefits. Practical implications – The high level of detail and the code scheme comprising 60 different codes...... and the method for deriving the codes allows companies to identify and define benefits as well as to assess the outcome of enterprise systems implementation projects. Originality/value – The paper empirically develops an applicable benefits framework, which addresses the lack of detail of previous frameworks....

  13. Interconnection test framework for the CMS level-1 trigger system

    International Nuclear Information System (INIS)

    Hammer, J.; Magrans de Abril, M.; Wulz, C.E.

    2012-01-01

    The Level-1 Trigger Control and Monitoring System is a software package designed to configure, monitor and test the Level-1 Trigger System of the Compact Muon Solenoid (CMS) experiment at CERN's Large Hadron Collider. It is a large and distributed system that runs over 50 PCs and controls about 200 hardware units. The objective of this paper is to describe and evaluate the architecture of a distributed testing framework - the Interconnection Test Framework (ITF). This generic and highly flexible framework for creating and executing hardware tests within the Level-1 Trigger environment is meant to automate testing of the 13 major subsystems interconnected with more than 1000 links. Features include a web interface to create and execute tests, modeling using finite state machines, dependency management, automatic configuration, and loops. Furthermore, the ITF will replace the existing heterogeneous testing procedures and help reducing both maintenance and complexity of operation tasks. (authors)

  14. ICI system for protecting underwater structures

    Energy Technology Data Exchange (ETDEWEB)

    1977-10-14

    The new ICI Offshore product consists of polypropylene fibers about 4.4 m long, and with a density lower than that of sea water and thus a good buoyancy coefficient. Bundles of the fibers are passed through a braided mat of polyester, ''Paraweb'', which is weighted in accordance with the density of the entire system. The system is installed at the foot of platform legs and axially along pipelines to prevent scouring by ocean currents. The system has been installed in 144.8 m of water along the pipeline linking the Piper field to the Flotta terminal in the Orkney Islands. By reducing the velocity of the marine currents, the system causes sand and other material to be deposited along the fibers, forming a protective ''talus'' cone at first, then completely covering the structure. A sizable sand deposit had accumulated along the test segment of the pipeline less than one month after installation of the system. Use of the system on the Ekofisk-Emden gas pipeline where it is uncovered in the Danish North Sea sector is proposed.

  15. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  16. Neutronic control instrumentation of protection systems

    International Nuclear Information System (INIS)

    Furet, J.

    1977-01-01

    The aims of neutronic control instrumentation are briefly recalled and the present status of materials research and development is presented. As for the out-of-pile instrumentation, emphasis is put on the reliability and efficiency of the detectors and the new solutions of electric signal processing. The possible reactivity measurements at rest are examined. As for in-pile instrumentation results relating to mobile detectors of the type of miniaturized fission chambers are presented. The radiation tests on course of development for several years in the working conditions of neutron self-powdered detectors are analyzed so as to show that their use as built-in in-core instrumentation is to be envisaged at short term. Basic options inherent to the 'Nuclear Safety' philosophy that define the protection system are recalled. A definition and a justification of the performance testing of the instrumentation at rest and in-service are then derived. Some new solutions are envisaged for processing the digital data obtained from the various sensors . A quality control of the materials setting conditions (especially electric noise) ensures a high reliability and availability of the materials involved in the neutron control and the protection system in working conditions [fr

  17. 3D Multifunctional Ablative Thermal Protection System

    Science.gov (United States)

    Feldman, Jay; Venkatapathy, Ethiraj; Wilkinson, Curt; Mercer, Ken

    2015-01-01

    NASA is developing the Orion spacecraft to carry astronauts farther into the solar system than ever before, with human exploration of Mars as its ultimate goal. One of the technologies required to enable this advanced, Apollo-shaped capsule is a 3-dimensional quartz fiber composite for the vehicle's compression pad. During its mission, the compression pad serves first as a structural component and later as an ablative heat shield, partially consumed on Earth re-entry. This presentation will summarize the development of a new 3D quartz cyanate ester composite material, 3-Dimensional Multifunctional Ablative Thermal Protection System (3D-MAT), designed to meet the mission requirements for the Orion compression pad. Manufacturing development, aerothermal (arc-jet) testing, structural performance, and the overall status of material development for the 2018 EM-1 flight test will be discussed.

  18. IoT Architectural Framework: Connection and Integration Framework for IoT Systems

    OpenAIRE

    Uviase, Onoriode; Kotonya, Gerald

    2018-01-01

    The proliferation of the Internet of Things (IoT) has since seen a growing interest in architectural design and adaptive frameworks to promote the connection between heterogeneous IoT devices and IoT systems. The most widely favoured software architecture in IoT is the Service Oriented Architecture (SOA), which aims to provide a loosely coupled systems to leverage the use and reuse of IoT services at the middle-ware layer, to minimise system integration problems. However, despite the flexibil...

  19. RANZAR Body Systems Framework of diagnostic imaging examination descriptors

    International Nuclear Information System (INIS)

    Pitman, Alexander D.; Penlington, Lisa; Doromal, Darren; Vukolova, Natalia; Slater, Gregory

    2014-01-01

    A unified and logical system of descriptors for diagnostic imaging examinations and procedures is a desirable resource for radiology in Australia and New Zealand and is needed to support core activities of RANZCR. Existing descriptor systems available in Australia and New Zealand (including the Medicare DIST and the ACC Schedule) have significant limitations and are inappropriate for broader clinical application. An anatomically based grid was constructed, with anatomical structures arranged in rows and diagnostic imaging modalities arranged in columns (including nuclear medicine and positron emission tomography). The grid was segregated into five body systems. The cells at the intersection of an anatomical structure row and an imaging modality column were populated with short, formulaic descriptors of the applicable diagnostic imaging examinations. Clinically illogical or physically impossible combinations were ‘greyed out’. Where the same examination applied to different anatomical structures, the descriptor was kept identical for the purposes of streamlining. The resulting Body Systems Framework of diagnostic imaging examination descriptors lists all the reasonably common diagnostic imaging examinations currently performed in Australia and New Zealand using a unified grid structure allowing navigation by both referrers and radiologists. The Framework has been placed on the RANZCR website and is available for access free of charge by registered users. The Body Systems Framework of diagnostic imaging examination descriptors is a system of descriptors based on relationships between anatomical structures and imaging modalities. The Framework is now available as a resource and reference point for the radiology profession and to support core College activities.

  20. Meta-learning framework applied in bioinformatics inference system design.

    Science.gov (United States)

    Arredondo, Tomás; Ormazábal, Wladimir

    2015-01-01

    This paper describes a meta-learner inference system development framework which is applied and tested in the implementation of bioinformatic inference systems. These inference systems are used for the systematic classification of the best candidates for inclusion in bacterial metabolic pathway maps. This meta-learner-based approach utilises a workflow where the user provides feedback with final classification decisions which are stored in conjunction with analysed genetic sequences for periodic inference system training. The inference systems were trained and tested with three different data sets related to the bacterial degradation of aromatic compounds. The analysis of the meta-learner-based framework involved contrasting several different optimisation methods with various different parameters. The obtained inference systems were also contrasted with other standard classification methods with accurate prediction capabilities observed.

  1. Perspective of MAS in Power System via a Fuzzy Framework

    Directory of Open Access Journals (Sweden)

    S. Razini

    2017-03-01

    Full Text Available Multi agent systems (MAS are popularly used in practice, however; a few studies have looked at MAS capabilities from the power engineering perspective. This paper presents the results of an investigation concerning the compatibility of MAS capabilities in different power engineering categories. Five MAS capabilities and seven power system categories are established. A framework for applying MAS in power engineering is developed. A fuzzy inference system is adopted to evaluate the paper proposed framework. Two approaches, namely simulation and real, are considered for different power categories. The paper shows that MAS capabilities are generally compatible with both approaches, although compatibility of MAS with real approach is more significant. The paper concludes that in the near future MAS is anticipated to be a key important tool in the development of intelligent systems and smart grids in power system. This paper contributes to thinking on perspective of MAS in power System.

  2. Achieving sustainable ese of environment: a framework for payment for protected forest ecosystem service

    Science.gov (United States)

    Widicahyono, A.; Awang, S. A.; Maryudi, A.; Setiawan, M. A.; Rusdimi, A. U.; Handoko, D.; Muhammad, R. A.

    2018-04-01

    Over the last decade, deforestation in Indonesia has reduced the forest area down to more than 6 million hectares. There is conflict that the protected forest ecosystem service is still often perceived as public goods. Many of them went unrecognized in planning process and continue to be undervalued. The challenge lies in maintaining socioeconomic development and ecosystem services sustainability without overlooking the people’s opportunities and improving their livelihoods over the long term. An integrated approach is required to understand the comprehensive concept of protected forest ecosystem service. This research aims to formulate a scheme of payment for ecosystem service (PES) in a protected forest. It is a first step towards the attempt for the value of ecosystem services to be reflected in decision-making. Literatures, previous researches and secondary data are reviewed thoroughly to analyze the interrelated components by looking at the environment as a whole and recognize their linkages that have consequences to one another both positive and negative. The framework of implementation of PES schemes outlines the complexity of human-environment interconnecting relationships. It evaluates the contributing actors of different interest i.e. long term use and short term use. The concept of PES accommodates the fulfillment of both conservation and exploitation with an incentive scheme to the contributing parties who are willing to implement conservation and issuance of compensation expense for any exploitation means. The most crucial part in this concept is to have a good and effective communication between every policy makers concerning the forest ecosystem and local communities.

  3. Extensions and renovations of reactor protection systems

    International Nuclear Information System (INIS)

    Hellmerichs, K.

    1985-01-01

    Increase of requirements by the authorities as to the design of reactor protection systems affected in the last years not only plans being under construction, but also resulted in partly spacious extensions and renovations. While working on the extensions and renovations a lot of problems arose: far-reaching performance of newest guidelines and rules in spite of old plant concepts; partly higher degree of redundancy requirements of the new systems in contrast to the present systems; use of present safeguard systems for new accident countermeasures; designation of priorities between present and new functions, especially in view of fault behaviour of present systems; adaptation of the new I and C equipment to the present signalisation-, operation- and information-arrangements under consideration of the present operational philosophy; spatial incorporation of new equipments; construction as to time without expanding of the planned refuelling phases. Because the KWU has planned and constructed such alterations in nearly 10 plants a lot of experience has been gathered. (author)

  4. Physical protection system using activated barriers

    International Nuclear Information System (INIS)

    Timm, R.E.; Zinneman, T.E.; Haumann, J.R.; Flaugher, H.A.; Reigle, D.L.

    1984-03-01

    The Argonne National Laboratory has recently installed an activated barrier, the Access Denial System, to upgrade its security. The technology of this system was developed in the late 70's by Sandia National Laboratory-Albuquerque. The Argonne National Laboratory is the first Department of Energy facility to use this device. Recent advancements in electronic components provide the total system support that makes the use of an activated barrier viable and desirable. The premise of an activated barrier is that it is deployed after a positive detection of an adversary is made and before the adversary can penetrate vital area. To accomplish this detection, sophisticated alarms, assessment, and communications must be integrated into a system that permits a security inspector to make a positive evaluation and to activate the barrier. The alarm sensor locations are selected to provide protection in depth. Closed circuit television is used with components that permit multiple video frames to be stored for automated, priority-based playback to the security inspector. Further, algorithms permit look-ahead surveillance of vital areas so that the security inspector can activate the access denial system in a timely manner and not be restricted to following the adversaries' penetration path(s)

  5. Research and Development of Protection OPC server for China advanced research reactor digital monitoring system

    International Nuclear Information System (INIS)

    Jia Yuwen; Xu Qiguo

    2012-01-01

    OPC server was developed as I/O driver to communicate the digital monitoring system of China Advanced Research Reactor iFIX and protection system. The framework and working principle of the OPC server were researched, and an effective method was developed to resolve the special communication protocol. After commissioning and testing, the results show that this method is reliable and stable, makes the system easy to configure, and can reduce the complexity of the system. (authors)

  6. 46 CFR 154.1110 - Areas protected by system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Areas protected by system. 154.1110 Section 154.1110... Firefighting § 154.1110 Areas protected by system. Each water spray system must protect: (a) All cargo tank... valves essential to cargo flow; (f) Each boundary facing the cargo area of each superstructure that...

  7. 46 CFR 153.460 - Fire protection systems.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Fire protection systems. 153.460 Section 153.460... Requirements for Flammable Or Combustible Cargoes § 153.460 Fire protection systems. Each self-propelled ship... protection system listed beside the cargo in Table 1 and described in the footnotes to Table 1. (b) The...

  8. A framework for AI-based nuclear design support system

    International Nuclear Information System (INIS)

    Furuta, Kazuo; Kondo, Shunsuke

    1991-01-01

    Nowadays many computer programs are being developed and used for the analytic tasks in nuclear reactor design, but experienced designers are still responsible for most of the synthetic tasks which are not amenable to algorithmic computer processes. Artificial intelligence (AI) is a promising technology to deal with these intractable tasks in design. In development of AI-based design support systems, it is desirable to choose a comprehensive framework based on the scientific theory of design. In this work a framework for AI-based design support systems for nuclear reactor design will be proposed based on an exploration model of design. The fundamental architectures of this framework will be described especially on knowledge representation, context management and design planning. (author)

  9. Framework for AI-based nuclear reactor design support system

    International Nuclear Information System (INIS)

    Furuta, Kazuo; Kondo, Shunsuke

    1992-01-01

    Nowadays many computer programs are being developed and used for the analytic tasks in nuclear reactor design, but experienced designers are still responsible for most of the synthetic tasks which are not amenable to algorithmic computer processes. Artificial intelligence (AI) is a promising technology to deal with these intractable tasks in design. In development of AI-based design support systems, it is desirable to choose a comprehensive framework based on the scientific theory of design. In this work a framework for AI-based design support systems for nuclear reactor design will be proposed based on an explorative abduction model of design. The fundamental architectures of this framework will be described especially on knowledge representation, context management and design planning. (author)

  10. Generic modelling framework for economic analysis of battery systems

    DEFF Research Database (Denmark)

    You, Shi; Rasmussen, Claus Nygaard

    2011-01-01

    opportunities, a generic modelling framework is proposed to handle this task. This framework outlines a set of building blocks which are necessary for carrying out the economic analysis of various BS applications. Further, special focus is given on describing how to use the rainflow cycle counting algorithm...... for battery cycle life estimation, since the cycle life plays a central role in the economic analysis of BS. To illustrate the modelling framework, a case study using a Sodium Sulfur Battery (NAS) system with 5-minute regulating service is performed. The economic performances of two dispatch scenarios, a so......Deregulated electricity markets provide opportunities for Battery Systems (BS) to participate in energy arbitrage and ancillary services (regulation, operating reserves, contingency reserves, voltage regulation, power quality etc.). To evaluate the economic viability of BS with different business...

  11. Digital signal processing in power system protection and control

    CERN Document Server

    Rebizant, Waldemar; Wiszniewski, Andrzej

    2011-01-01

    Digital Signal Processing in Power System Protection and Control bridges the gap between the theory of protection and control and the practical applications of protection equipment. Understanding how protection functions is crucial not only for equipment developers and manufacturers, but also for their users who need to install, set and operate the protection devices in an appropriate manner. After introductory chapters related to protection technology and functions, Digital Signal Processing in Power System Protection and Control presents the digital algorithms for signal filtering, followed

  12. Reactor protection system including engineered features actuation system

    International Nuclear Information System (INIS)

    Palmaers, W.

    1982-01-01

    The safety concept requires to ensure that - the reactor protection system - the active engineered safeguard - and the necessary auxiliary systems are so designed and interfaced in respect of design and mode of action that, in the event of single component failure reliable control of the consequences of accidents remains ensured at all times and that the availability of the power plant is not limited unnecessarily. In order to satisfy these requirements due, importance was attached to a consistent spacial separation of the mutually redundant subsystems of the active safety equipment. The design and layout of the reactor protection system, of the power supply (emergency power supply), and of the auxiliary systems important from the safety engineering point of view, are such that their subsystems also largely satisfy the requirements of independence and spacial separation. (orig./RW)

  13. Clinical time series prediction: Toward a hierarchical dynamical system framework.

    Science.gov (United States)

    Liu, Zitao; Hauskrecht, Milos

    2015-09-01

    Developing machine learning and data mining algorithms for building temporal models of clinical time series is important for understanding of the patient condition, the dynamics of a disease, effect of various patient management interventions and clinical decision making. In this work, we propose and develop a novel hierarchical framework for modeling clinical time series data of varied length and with irregularly sampled observations. Our hierarchical dynamical system framework for modeling clinical time series combines advantages of the two temporal modeling approaches: the linear dynamical system and the Gaussian process. We model the irregularly sampled clinical time series by using multiple Gaussian process sequences in the lower level of our hierarchical framework and capture the transitions between Gaussian processes by utilizing the linear dynamical system. The experiments are conducted on the complete blood count (CBC) panel data of 1000 post-surgical cardiac patients during their hospitalization. Our framework is evaluated and compared to multiple baseline approaches in terms of the mean absolute prediction error and the absolute percentage error. We tested our framework by first learning the time series model from data for the patients in the training set, and then using it to predict future time series values for the patients in the test set. We show that our model outperforms multiple existing models in terms of its predictive accuracy. Our method achieved a 3.13% average prediction accuracy improvement on ten CBC lab time series when it was compared against the best performing baseline. A 5.25% average accuracy improvement was observed when only short-term predictions were considered. A new hierarchical dynamical system framework that lets us model irregularly sampled time series data is a promising new direction for modeling clinical time series and for improving their predictive performance. Copyright © 2014 Elsevier B.V. All rights reserved.

  14. Clinical time series prediction: towards a hierarchical dynamical system framework

    Science.gov (United States)

    Liu, Zitao; Hauskrecht, Milos

    2014-01-01

    Objective Developing machine learning and data mining algorithms for building temporal models of clinical time series is important for understanding of the patient condition, the dynamics of a disease, effect of various patient management interventions and clinical decision making. In this work, we propose and develop a novel hierarchical framework for modeling clinical time series data of varied length and with irregularly sampled observations. Materials and methods Our hierarchical dynamical system framework for modeling clinical time series combines advantages of the two temporal modeling approaches: the linear dynamical system and the Gaussian process. We model the irregularly sampled clinical time series by using multiple Gaussian process sequences in the lower level of our hierarchical framework and capture the transitions between Gaussian processes by utilizing the linear dynamical system. The experiments are conducted on the complete blood count (CBC) panel data of 1000 post-surgical cardiac patients during their hospitalization. Our framework is evaluated and compared to multiple baseline approaches in terms of the mean absolute prediction error and the absolute percentage error. Results We tested our framework by first learning the time series model from data for the patient in the training set, and then applying the model in order to predict future time series values on the patients in the test set. We show that our model outperforms multiple existing models in terms of its predictive accuracy. Our method achieved a 3.13% average prediction accuracy improvement on ten CBC lab time series when it was compared against the best performing baseline. A 5.25% average accuracy improvement was observed when only short-term predictions were considered. Conclusion A new hierarchical dynamical system framework that lets us model irregularly sampled time series data is a promising new direction for modeling clinical time series and for improving their predictive

  15. An Evolved System of Radiological Protection

    International Nuclear Information System (INIS)

    Kaneko, M.

    2004-01-01

    The current system of radiological protection based on the Linear No-Threshold (LNT) hypothesis has greatly contributed to the minimization of doses received by workers and members of the public. However, it has brought about r adiophobia a mong people and waste of resources due to over-regulation, because the LNT implies that radiation is harmful no matter how small the dose is. The author reviewed the results of research on health effects of radiation including major epidemiological studies on radiation workers and found no clear evidence of deleterious health effects from radiation exposures below the current maximum dose limits (50 mSv/y for workers and 5 mSv/y for members of the public), which have been adopted worldwide in the second half of the 20th century. Now that the existence of bio-defensive mechanisms such as DNA repair, apoptosis and adaptive response are well recognized, the linearity assumption cannot be said to be s cientific . Evidences increasingly imply that there are threshold effects in risk of radiation. A concept of practical thresholds or virtually safe doses will have to be introduced into the new system of radiological protection in order to resolve the low dose issues. Practical thresholds may be defined as dose levels below which induction of detectable radiogenic cancers or hereditary effects are not expected. If any workers and members of the public do not gain benefits from being exposed, excepting intentional irradiation for medical purposes, their radiation exposures should be kept below practical thresholds. On the assumption that the current dose limits are below practical thresholds and with no radiation detriments, there is no need of justification and optimization (ALARA) principles for occupational and public exposures. Then the ethical issue of justification to allow benefit to society to offset radiation detriments to individuals can be resolved. And also the ethical issue of optimization to exchange health or safety for

  16. Diversity in computerized reactor protection systems

    International Nuclear Information System (INIS)

    Fischer, H.D.; Piel, L.

    1999-01-01

    Based on engineering judgement, the most important measures to increase the independency of redundant trains of a computerized safety instrumentation and control system (I and C) in a nuclear power plant are evaluated with respect to practical applications. This paper will contribute to an objective discussion on the necessary and justifiable arrangement of diversity in a computerized safety I and C system. Important conclusions are: - (i) diverse equipment may be used to control dependent failures only if measures necessary for designing, licensing, and operating a computerized safety I and C system homogeneous in equipment are neither technically nor economically feasible; - (ii) the considerable large operating experience in France with a non-diverse equipment digital reactor protection system does not call for equipment diversity. Although there are no generally accepted methods, the licensing authority is still required to take into account dependent failures in a probabilistic safety analysis; - (ii) the frequency of postulated initiating events implies which I and C functionality should be implemented on diverse equipment. Using non-safety I and C equipment in addition to safety I and C equipment is attractive because its necessary unavailability to control an initiating event in teamwork with the safety I and C equipment is estimated to range from 0.01 to 0.1. This can be achieved by operational experience

  17. Evolution of the system of radiological protection

    International Nuclear Information System (INIS)

    2007-01-01

    The OECD Nuclear Energy Agency (NEA) has actively participated in discussions with the International Commission on Radiological Protection (ICRP) regarding the development of new recommendations that will replace those in ICRP Publication 60, which has long served as the international standard in this field. Part of this development process has involved the organisation of seven international workshops, including the First and Second Asian Regional Conferences on the Evolution of the System of Radiological Protection which took place in Tokyo, Japan in October 2002 and July 2004. The Third Asian Regional Conference was held on 5-6 July 2006, also in Tokyo. The main objective of these conferences was to ensure that the views and concerns of relevant Asian stakeholders, such as regulatory authorities, industry, professional societies and NGO, could be expressed and discussed with the ICRP. The three conferences provided the ICRP with specific views on how new recommendations could best be developed to address regulatory and implementation needs in the Asian context. These proceedings summarize the results and key discussions of the Third Asian Regional Conference. (author)

  18. Integration of the environment into the system of radiation protection

    International Nuclear Information System (INIS)

    Higley, K.

    2018-01-01

    In 2005 the International Commission on Radiological Protection (ICRP) embarked on an effort to ensure that the system for environmental radiological protection would be reconcilable with that for radiological protection of man, and with the approaches used for protection of the environment from other potential hazards

  19. The interactive systems framework applied to the strategic prevention framework: the Rhode Island experience.

    Science.gov (United States)

    Florin, Paul; Friend, Karen B; Buka, Stephen; Egan, Crystelle; Barovier, Linda; Amodei, Brenda

    2012-12-01

    The Interactive Systems Framework for Dissemination and Implementation (ISF) was introduced as a heuristic systems level model to help bridge the gap between research and practice (Wandersman et al., in Am J Commun Psychol 41:171-181, 2008). This model describes three interacting systems with distinct functions that (1) distill knowledge to develop innovations; (2) provide supportive training and technical assistance for dissemination to; (3) a prevention delivery system responsible for implementation in the field. The Strategic Prevention Framework (SPF) is a major prevention innovation launched by the Center for Substance Abuse Prevention (CSAP) of the Substance Abuse and Mental Health Services Administration (SAMHSA). The SPF offers a structured, sequential, data-driven approach that explicitly targets environmental conditions in the community and aims for change in substance use and problems at the population level. This paper describes how the ISF was applied to the challenges of implementing the SPF in 14 Rhode Island communities, with a focus on the development of a new Training and Technical Assistance Resources Center to support SPF efforts. More specifically, we (1) describe each of the three ISF interacting systems as they evolved in Rhode Island; (2) articulate the lines of communication between the three systems; and (3) examine selected evaluation data to understand relationships between training and technical assistance and SPF implementation and outcomes.

  20. Cancer registration, public health and the reform of the European data protection framework: Abandoning or improving European public health research?

    Science.gov (United States)

    Andersen, Mette Rye; Storm, Hans H

    2015-06-01

    The importance of cancer- and other disease registries for planning, management and evaluation of healthcare systems has been shown repeatedly during the last 50 years. Complete and unbiased population-level analyses on routinely collected, individual data concerning health and personal characteristics can address significant concerns about risk factors for cancer and provide sound evidence about public health and the effectiveness of healthcare systems. The existence of quality controlled and comprehensive data in registries, allowed to be used for quality control, research and public health purposes are taken as granted by most health professionals and researchers. However, the current revision of the European Union (EU) data protection framework suggests a harmonisation of requirements for confidentiality and individual consent to data processing, likely at the expense of proper use of registry data in the health sector. Consequences of excessive confidentiality rules that may lead to missed data linkages have been simulated. The simulations provide one possible explanation for observed heterogeneity among some cancer incidence data. Further, public health, quality control and epidemiological research on large populations can no longer provide evidence for health interventions, if requirements for consent renders research impossible or where attempts to obtain consent from each data subject generates biased results. Health professionals should engage in the on-going debate on the Commission's proposal for a General Data Protection Regulation. The nature and use of registry data in public health research must be explained and known to policy-makers and the public. Use of cancer registry data and other epidemiological activity will terminate abruptly if an unnecessarily strict EU data protection regulation is adopted. Research based interventions, as well as the international recognised standing of cancer registries and register-based research institutions in

  1. The African Union System of Refugee Protection : A Champion not a Recipient?

    NARCIS (Netherlands)

    Nicolosi, S.

    2014-01-01

    Africa has often been treated as a mere recipient of legal systems, particularly by the former colonial powers. However, an examination of the African practice of international law reveals that, in the specific area of refugee protection, Africa has been championing a legal framework capable of

  2. Advancing Integrated Systems Modelling Framework for Life Cycle Sustainability Assessment

    Directory of Open Access Journals (Sweden)

    Anthony Halog

    2011-02-01

    Full Text Available The need for integrated methodological framework for sustainability assessment has been widely discussed and is urgent due to increasingly complex environmental system problems. These problems have impacts on ecosystems and human well-being which represent a threat to economic performance of countries and corporations. Integrated assessment crosses issues; spans spatial and temporal scales; looks forward and backward; and incorporates multi-stakeholder inputs. This study aims to develop an integrated methodology by capitalizing the complementary strengths of different methods used by industrial ecologists and biophysical economists. The computational methodology proposed here is systems perspective, integrative, and holistic approach for sustainability assessment which attempts to link basic science and technology to policy formulation. The framework adopts life cycle thinking methods—LCA, LCC, and SLCA; stakeholders analysis supported by multi-criteria decision analysis (MCDA; and dynamic system modelling. Following Pareto principle, the critical sustainability criteria, indicators and metrics (i.e., hotspots can be identified and further modelled using system dynamics or agent based modelling and improved by data envelopment analysis (DEA and sustainability network theory (SNT. The framework is being applied to development of biofuel supply chain networks. The framework can provide new ways of integrating knowledge across the divides between social and natural sciences as well as between critical and problem-solving research.

  3. Biocomplexity in coupled natural–human systems: a multidimensional framework

    Science.gov (United States)

    S.T.A. Pickett; M.L. Cadenasso; J.M. Grove

    2005-01-01

    As defined by Ascher, biocomplexity results from a "multiplicity of interconnected relationships and levels. "However, no integrative framework yet exists to facilitate the application of this concept to coupled human-natural systems. Indeed, the term "biocomplexity" is still used primarily as a creative and provocative metaphor. To help advance its...

  4. Integrated Risk Framework for Onsite Wastewater Treatment Systems

    Science.gov (United States)

    Carroll, Steven; Goonetilleke, Ashantha; Thomas, Evan; Hargreaves, Megan; Frost, Ray; Dawes, Les

    2006-08-01

    Onsite wastewater treatment systems (OWTS) are becoming increasingly important for the treatment and dispersal of effluent in new urbanised developments that are not serviced by centralised wastewater collection and treatment systems. However, the current standards and guidelines adopted by many local authorities for assessing suitable site and soil conditions for OWTS are increasingly coming under scrutiny due to the public health and environmental impacts caused by poorly performing systems, in particular septic tank-soil adsorption systems. In order to achieve sustainable onsite wastewater treatment with minimal impacts on the environment and public health, more appropriate means of assessment are required. This paper highlights an integrated risk based approach for assessing the inherent hazards associated with OWTS in order to manage and mitigate the environmental and public health risks inherent with onsite wastewater treatment. In developing a sound and cohesive integrated risk framework for OWTS, several key issues must be recognised. These include the inclusion of relevant stakeholders throughout framework development, the integration of scientific knowledge, data and analysis with risk assessment and management ideals, and identification of the appropriate performance goals for successful management and mitigation of associated risks. These issues were addressed in the development of the risk framework to provide a generic approach to assessing risk from OWTS. The utilisation of the developed risk framework for achieving more appropriate assessment and management techniques for OWTS is presented in a case study for the Gold Coast region, Queensland State, Australia.

  5. A framework for the organization and delivery of systemic treatment.

    Science.gov (United States)

    Vandenberg, T; Coakley, N; Nayler, J; Degrasse, C; Green, E; Mackay, J A; McLennan, C; Smith, A; Wilcock, L; Trudeau, M E

    2009-01-01

    Increasing systemic treatment and shortages of oncology professionals in Canada require innovative approaches to the safe and effective delivery of intravenous (IV) cancer treatment. We conducted a systematic review of the clinical and scientific literature, and an environmental scan of models in Canada, the United Kingdom, Australia, and New Zealand. We then developed a framework for the organization and delivery of IV systemic treatment. The systematic review covered the medline, embase, cinahl, and HealthStar databases. The environmental scan retrieved published and unpublished sources, coupled with a free key word search using the Google search engine. The Systemic Treatment Working Group reviewed the evidence and developed a draft framework using evidence-based analysis, existing recommendations from various jurisdictions, and expert opinion based on experience and consensus. The draft was assessed by Ontario stakeholders and reviewed and approved by Cancer Care Ontario. The poor quantity and quality of the evidence necessitated a consensus-derived model. That model comprises four levels of care determined by a regional systemic treatment program and three integrated structures (integrated cancer programs, affiliate institutions, and satellite institutions), each with a defined scope of practice and a specific organizational framework. New models of care are urgently required beyond large centres, particularly in geographically remote or rural areas. Despite limited applicable evidence, the development and successful implementation of this framework is intended to create sustainable, accessible, quality care and to measurably improve patient outcomes.

  6. Reliable Software Development for Machine Protection Systems

    CERN Document Server

    Anderson, D; Dragu, M; Fuchsberger, K; Garnier, JC; Gorzawski, AA; Koza, M; Krol, K; Misiowiec, K; Stamos, K; Zerlauth, M

    2014-01-01

    The Controls software for the Large Hadron Collider (LHC) at CERN, with more than 150 millions lines of code, resides amongst the largest known code bases in the world1. Industry has been applying Agile software engineering techniques for more than two decades now, and the advantages of these techniques can no longer be ignored to manage the code base for large projects within the accelerator community. Furthermore, CERN is a particular environment due to the high personnel turnover and manpower limitations, where applying Agile processes can improve both, the codebase management as well as its quality. This paper presents the successful application of the Agile software development process Scrum for machine protection systems at CERN, the quality standards and infrastructure introduced together with the Agile process as well as the challenges encountered to adapt it to the CERN environment.

  7. Overload protection system for power inverter

    Science.gov (United States)

    Nagano, S. (Inventor)

    1977-01-01

    An overload protection system for a power inverter utilized a first circuit for monitoring current to the load from the power inverter to detect an overload and a control circuit to shut off the power inverter, when an overload condition was detected. At the same time, a monitoring current inverter was turned on to deliver current to the load at a very low power level. A second circuit monitored current to the load, from the monitoring current inverter, to hold the power inverter off through the control circuit, until the overload condition was cleared so that the control circuit may be deactivated in order for the power inverter to be restored after the monitoring current inverter is turned off completely.

  8. Establishing an Information Security System related to Physical Protection

    International Nuclear Information System (INIS)

    Jang, Sung Soon; Yoo, Ho Sik

    2009-01-01

    A physical protection system (PPS) integrates people, procedures and equipment for the protection of assets or facilities against theft, sabotage or other malevolent attacks. In the physical protection field, it is important the maintain confidentiality of PPS related information, such as the alarm system layout, detailed maps of buildings, and guard schedules. In this abstract, we suggest establishing a methodology for an information security system. The first step in this methodology is to determine the information to protect and possible adversaries. Next, system designers should draw all possible paths to the information and arrange appropriate protection elements. Finally he/she should analyze and upgrade their information security system

  9. Standard Relativistic Reference Systems and the IAU Framework

    Science.gov (United States)

    Soffel, Michael H.

    2009-05-01

    The classical post-Newtonian (PN) framework is formulated in one single reference system. In a series of papers Damour, Soffel and Xu laid the foundations for a new improved PN framework dealing with the celestial mechanical problem of N gravitationally interacting rotating bodies of arbitrary shape and the problem of astronomical reference systems. In the DSX-framework a total of N+1 reference systems with corresponding coordinates is introduced in the N-body problem: a global one covering the entire model manifold where the translational equations of motion are formulated and one local system attached to each of the N bodies that is co-moving with the body under consideration. In each of these systems the metric tensor is assumed to be of a special form determined by two potentials: a scalar and a vector potential. Theorems are given for the transformations between local and global coordinates and metric potentials. In each of the local systems outside the local body the metric potentials are expressed in terms of Blanchet-Damour mass- and spin-multipole moments. The talk first introduces the original DSX formalism and then concentrates on IAU resolutions related with it. Finally, the formalism is extended to include also effects from the cosmic expansion. The influence of the Hubble expansion on the dynamics of the solar system is explicitly discussed in some detail.

  10. Machine protection system algorithm compiler and simulator

    International Nuclear Information System (INIS)

    White, G.R.; Sherwin, G.

    1993-01-01

    The Machine Protection System (MPS) component of the SLC's beam selection system, in which integrated current is continuously monitored and limited to safe levels through careful selection and feedback of the beam repetition rate, is described elsewhere in these proceedings. The novel decision making mechanism by which that system can evaluate open-quotes safe levelsclose quotes, and choose an appropriate repetition rate in real-time, is described here. The algorithm that this mechanism uses to make its decision is written in test files and expressed in states of the accelerator and its devices, one file per accelerator region. Before being used, a file is open-quotes compiledclose quotes to a binary format which can be easily processed as a forward-chaining decision tree. It is processed by distributed microcomputers local to the accelerator regions. A parent algorithm evaluates all results, and reports directly to the beam control microprocessor. Operators can test new algorithms, or changes they make to them, with an online graphical MPS simulator

  11. WASTE HANDLING BUILDING FIRE PROTECTION SYSTEM DESCRIPTION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    J. D. Bigbee

    2000-06-21

    The Waste Handling Building Fire Protection System provides the capability to detect, control, and extinguish fires and/or mitigate explosions throughout the Waste Handling Building (WHB). Fire protection includes appropriate water-based and non-water-based suppression, as appropriate, and includes the distribution and delivery systems for the fire suppression agents. The Waste Handling Building Fire Protection System includes fire or explosion detection panel(s) controlling various detectors, system actuation, annunciators, equipment controls, and signal outputs. The system interfaces with the Waste Handling Building System for mounting of fire protection equipment and components, location of fire suppression equipment, suppression agent runoff, and locating fire rated barriers. The system interfaces with the Waste Handling Building System for adequate drainage and removal capabilities of liquid runoff resulting from fire protection discharges. The system interfaces with the Waste Handling Building Electrical Distribution System for power to operate, and with the Site Fire Protection System for fire protection water supply to automatic sprinklers, standpipes, and hose stations. The system interfaces with the Site Fire Protection System for fire signal transmission outside the WHB as needed to respond to a fire emergency, and with the Waste Handling Building Ventilation System to detect smoke and fire in specific areas, to protect building high-efficiency particulate air (HEPA) filters, and to control portions of the Waste Handling Building Ventilation System for smoke management and manual override capability. The system interfaces with the Monitored Geologic Repository (MGR) Operations Monitoring and Control System for annunciation, and condition status.

  12. WASTE HANDLING BUILDING FIRE PROTECTION SYSTEM DESCRIPTION DOCUMENT

    International Nuclear Information System (INIS)

    J. D. Bigbee

    2000-01-01

    The Waste Handling Building Fire Protection System provides the capability to detect, control, and extinguish fires and/or mitigate explosions throughout the Waste Handling Building (WHB). Fire protection includes appropriate water-based and non-water-based suppression, as appropriate, and includes the distribution and delivery systems for the fire suppression agents. The Waste Handling Building Fire Protection System includes fire or explosion detection panel(s) controlling various detectors, system actuation, annunciators, equipment controls, and signal outputs. The system interfaces with the Waste Handling Building System for mounting of fire protection equipment and components, location of fire suppression equipment, suppression agent runoff, and locating fire rated barriers. The system interfaces with the Waste Handling Building System for adequate drainage and removal capabilities of liquid runoff resulting from fire protection discharges. The system interfaces with the Waste Handling Building Electrical Distribution System for power to operate, and with the Site Fire Protection System for fire protection water supply to automatic sprinklers, standpipes, and hose stations. The system interfaces with the Site Fire Protection System for fire signal transmission outside the WHB as needed to respond to a fire emergency, and with the Waste Handling Building Ventilation System to detect smoke and fire in specific areas, to protect building high-efficiency particulate air (HEPA) filters, and to control portions of the Waste Handling Building Ventilation System for smoke management and manual override capability. The system interfaces with the Monitored Geologic Repository (MGR) Operations Monitoring and Control System for annunciation, and condition status

  13. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  14. AFECS. multi-agent framework for experiment control systems

    Energy Technology Data Exchange (ETDEWEB)

    Gyurjyan, V; Abbott, D; Heyes, G; Jastrzembski, E; Timmer, C; Wolin, E [Jefferson Lab, 12000 Jefferson Ave. MS-12B3, Newport News, VA 23606 (United States)], E-mail: gurjyan@jlab.org

    2008-07-01

    AFECS is a pure Java based software framework for designing and implementing distributed control systems. AFECS creates a control system environment as a collection of software agents behaving as finite state machines. These agents can represent real entities, such as hardware devices, software tasks, or control subsystems. A special control oriented ontology language (COOL), based on RDFS (Resource Definition Framework Schema) is provided for control system description as well as for agent communication. AFECS agents can be distributed over a variety of platforms. Agents communicate with their associated physical components using range of communication protocols, including tcl-DP, cMsg (publish-subscribe communication system developed at Jefferson Lab), SNMP (simple network management protocol), EPICS channel access protocol and JDBC.

  15. AFECS. Multi-Agent Framework for Experiment Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Vardan Gyurjyan; David Abbott; William Heyes; Edward Jastrzembski; Carl Timmer; Elliott Wolin

    2008-01-23

    AFECS is a pure Java based software framework for designing and implementing distributed control systems. AFECS creates a control system environment as a collection of software agents behaving as finite state machines. These agents can represent real entities, such as hardware devices, software tasks, or control subsystems. A special control oriented ontology language (COOL), based on RDFS (Resource Definition Framework Schema) is provided for control system description as well as for agent communication. AFECS agents can be distributed over a variety of platforms. Agents communicate with their associated physical components using range of communication protocols, including tcl-DP, cMsg (publish-subscribe communication system developed at Jefferson Lab), SNMP (simple network management protocol), EPICS channel access protocol and JDBC.

  16. General framework and key technologies of national nuclear emergency system

    International Nuclear Information System (INIS)

    Yuan Feng; Li Xudong; Zhu Guangying; Song Yafeng; Zeng Suotian; Shen Lifeng

    2014-01-01

    Nuclear emergency is the important safeguard for the sustainable development of nuclear energy, and is the significant part of national public crisis management. The paper gives the definition of nuclear emergency system explicitly based on the analysis of the characteristics of the nuclear emergency, and through the research of the structure and general framework, the general framework of the national nuclear emergency management system (NNEMS) is obtained, which is constructed in four parts, including one integrative platform, six layers, eight applications and two systems, then the paper indicate that the architecture of national emergency system that should be laid out by three-tiers, i.e. national, provincial and organizations with nuclear facilities, and also describe the functions of the NNEMS on the nuclear emergency's workflow. Finally, the paper discuss the key technology that NNIEMS needed, such as WebGIS, auxiliary decision-making, digitalized preplan and the conformity and usage of resources, and analyze the technical principle in details. (authors)

  17. AFECS. multi-agent framework for experiment control systems

    International Nuclear Information System (INIS)

    Gyurjyan, V; Abbott, D; Heyes, G; Jastrzembski, E; Timmer, C; Wolin, E

    2008-01-01

    AFECS is a pure Java based software framework for designing and implementing distributed control systems. AFECS creates a control system environment as a collection of software agents behaving as finite state machines. These agents can represent real entities, such as hardware devices, software tasks, or control subsystems. A special control oriented ontology language (COOL), based on RDFS (Resource Definition Framework Schema) is provided for control system description as well as for agent communication. AFECS agents can be distributed over a variety of platforms. Agents communicate with their associated physical components using range of communication protocols, including tcl-DP, cMsg (publish-subscribe communication system developed at Jefferson Lab), SNMP (simple network management protocol), EPICS channel access protocol and JDBC

  18. 14 CFR 23.954 - Fuel system lightning protection.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Fuel system lightning protection. 23.954... Fuel System § 23.954 Fuel system lightning protection. The fuel system must be designed and arranged to prevent the ignition of fuel vapor within the system by— (a) Direct lightning strikes to areas having a...

  19. A surety engineering framework to reduce cognitive systems risks.

    Energy Technology Data Exchange (ETDEWEB)

    Caudell, Thomas P. (University of New Mexico, Albuquerque, NM); Peercy, David Eugene; Caldera, Eva O. (University of New Mexico, Albuquerque, NM); Shaneyfelt, Wendy L.

    2008-12-01

    Cognitive science research investigates the advancement of human cognition and neuroscience capabilities. Addressing risks associated with these advancements can counter potential program failures, legal and ethical issues, constraints to scientific research, and product vulnerabilities. Survey results, focus group discussions, cognitive science experts, and surety researchers concur technical risks exist that could impact cognitive science research in areas such as medicine, privacy, human enhancement, law and policy, military applications, and national security (SAND2006-6895). This SAND report documents a surety engineering framework and a process for identifying cognitive system technical, ethical, legal and societal risks and applying appropriate surety methods to reduce such risks. The framework consists of several models: Specification, Design, Evaluation, Risk, and Maturity. Two detailed case studies are included to illustrate the use of the process and framework. Several Appendices provide detailed information on existing cognitive system architectures; ethical, legal, and societal risk research; surety methods and technologies; and educing information research with a case study vignette. The process and framework provide a model for how cognitive systems research and full-scale product development can apply surety engineering to reduce perceived and actual risks.

  20. Electrical Power Systems Protection and Interdependencies with ICT

    OpenAIRE

    Milis, George; Kyriakides, Elias; Hadjiantonis, Antonis

    2017-01-01

    The present chapter discusses the issue of protection of the electrical power systems, addressing all dimensions, from the need of protection to the identified faults and disturbances to the available protection schemes and further considerations, also looking at the challenges brought by recognizing the interdependent nature of the today’s electrical power systems.

  1. Modern tools to evaluate and optimize fire protection systems

    International Nuclear Information System (INIS)

    Alvares, N.J.; Hasegawa, H.K.

    1980-01-01

    Modern techniques, such as fault tree analysis, can be used to obtain engineering descriptions of specific fire protection systems. The analysis allows establishment of an optimum level of fire protection, and evaluates the level of protection provided by various systems. A prime example: the application to fusion energy experiments

  2. An Automatic Car Counting System Using OverFeat Framework

    Directory of Open Access Journals (Sweden)

    Debojit Biswas

    2017-06-01

    Full Text Available Automatic car counting is an important component in the automated traffic system. Car counting is very important to understand the traffic load and optimize the traffic signals. In this paper, we implemented the Gaussian Background Subtraction Method and OverFeat Framework to count cars. OverFeat Framework is a combination of Convolution Neural Network (CNN and one machine learning classifier (like Support Vector Machines (SVM or Logistic Regression. With this study, we showed another possible application area for the OverFeat Framework. The advantages and shortcomings of the Background Subtraction Method and OverFeat Framework were analyzed using six individual traffic videos with different perspectives, such as camera angles, weather conditions and time of the day. In addition, we compared the two algorithms above with manual counting and a commercial software called Placemeter. The OverFeat Framework showed significant potential in the field of car counting with the average accuracy of 96.55% in our experiment.

  3. Framework for measuring sustainable development in catchment systems.

    Science.gov (United States)

    Walmsley, Jay J

    2002-02-01

    Integrated catchment management represents an approach to managing the resources of a catchment by integrating environmental, economic, and social issues. It is aimed at deriving sustainable benefits for future generations, while protecting natural resources, particularly water, and minimizing possible adverse social, economic, and environmental consequences. Indicators of sustainable development, which summarize information for use in decision-making, are invaluable when trying to assess the diverse, interacting components of catchment processes and resource management actions. The Driving-Forces--Pressure--State--Impact--Response (DPSIR) indicator framework is useful for identifying and developing indicators of sustainable development for catchment management. Driving forces have been identified as the natural conditions occurring in a catchment and the level of development and economic activity. Pressures include the natural and anthropogenic supply of water, water demand, and water pollution. State indicators can be split into those of quantity and those of quality. Impacts include those that affect the ecosystems directly and those that impact the use value of the resource. It core indicators are identified within each of the categories given in the framework, most major catchment-based management issues can be evaluated. This framework is applied to identify key issues in catchment management in South Africa, and develop a set of indicators for evaluating catchments throughout the country.

  4. Effect of Remote Back-Up Protection System Failure on the Optimum Routine Test Time Interval of Power System Protection

    Directory of Open Access Journals (Sweden)

    Y Damchi

    2013-12-01

    Full Text Available Appropriate operation of protection system is one of the effective factors to have a desirable reliability in power systems, which vitally needs routine test of protection system. Precise determination of optimum routine test time interval (ORTTI plays a vital role in predicting the maintenance costs of protection system. In the most previous studies, ORTTI has been determined while remote back-up protection system was considered fully reliable. This assumption is not exactly correct since remote back-up protection system may operate incorrectly or fail to operate, the same as the primary protection system. Therefore, in order to determine the ORTTI, an extended Markov model is proposed in this paper considering failure probability for remote back-up protection system. In the proposed Markov model of the protection systems, monitoring facility is taken into account. Moreover, it is assumed that the primary and back-up protection systems are maintained simultaneously. Results show that the effect of remote back-up protection system failures on the reliability indices and optimum routine test intervals of protection system is considerable.

  5. Toward a systems- and control-oriented agent framework.

    Science.gov (United States)

    Fregene, Kingsley; Kennedy, Diane C; Wang, David W L

    2005-10-01

    This paper develops a systems- and control-oriented intelligent agent framework called the hybrid intelligent control agent (HICA), as well as its composition into specific kinds of multiagent systems. HICA is essentially developed around a hybrid control system core so that knowledge-based planning and coordination can be integrated with verified hybrid control primitives to achieve the coordinated control of multiple multimode dynamical systems. The scheme is applied to the control of teams of unmanned air and ground vehicles engaged in a pursuit-evasion war game. Results are demonstrated in simulation.

  6. A decision-making framework for protecting process plants from flooding based on fault tree analysis

    International Nuclear Information System (INIS)

    Hauptmanns, Ulrich

    2010-01-01

    The protection of process plants from external events is mandatory in the Seveso Directive. Among these events figures the possibility of inundation of a plant, which may cause a hazard by disabling technical components and obviating operator interventions. A methodological framework for dealing with hazards from potential flooding events is presented. It combines an extension of the fault tree method with generic properties of flooding events in rivers and of dikes, which should be adapted to site-specific characteristics in a concrete case. Thus, a rational basis for deciding whether upgrading is required or not and which of the components should be upgraded is provided. Both the deterministic and the probabilistic approaches are compared. Preference is given to the probabilistic one. The conclusions drawn naturally depend on the scope and detail of the model calculations and the decision criterion adopted. The latter has to be supplied from outside the analysis, e.g. by the analyst himself, the plant operator or the competent authority. It turns out that decision-making is only viable if the boundary conditions for both the procedure of analysis and the decision criterion are clear.

  7. A collaborative framework for contributing DICOM RT PHI (Protected Health Information) to augment data mining in clinical decision support

    Science.gov (United States)

    Deshpande, Ruchi; Thuptimdang, Wanwara; DeMarco, John; Liu, Brent J.

    2014-03-01

    We have built a decision support system that provides recommendations for customizing radiation therapy treatment plans, based on patient models generated from a database of retrospective planning data. This database consists of relevant metadata and information derived from the following DICOM objects - CT images, RT Structure Set, RT Dose and RT Plan. The usefulness and accuracy of such patient models partly depends on the sample size of the learning data set. Our current goal is to increase this sample size by expanding our decision support system into a collaborative framework to include contributions from multiple collaborators. Potential collaborators are often reluctant to upload even anonymized patient files to repositories outside their local organizational network in order to avoid any conflicts with HIPAA Privacy and Security Rules. We have circumvented this problem by developing a tool that can parse DICOM files on the client's side and extract de-identified numeric and text data from DICOM RT headers for uploading to a centralized system. As a result, the DICOM files containing PHI remain local to the client side. This is a novel workflow that results in adding only relevant yet valuable data from DICOM files to the centralized decision support knowledge base in such a way that the DICOM files never leave the contributor's local workstation in a cloud-based environment. Such a workflow serves to encourage clinicians to contribute data for research endeavors by ensuring protection of electronic patient data.

  8. Thermal Management and Thermal Protection Systems

    Science.gov (United States)

    Hasnain, Aqib

    2016-01-01

    's rays directly impinging on the system. Heating rate of the lamps were calculated by knowing fraction of emitted energy in a wavelength interval and the filament temperature. This version of the model can be used to predict performance of the system under vacuum with extreme cold or hot conditions. Initial testing of the PTMS showed promise, and the thermal math model predicts even better performance in thermal vacuum testing. ii) Thermal Protection Systems (TPS) are required for vehicles which enter earth's atmosphere to protect from aerodynamic heating caused by the friction between the vehicle and atmospheric gases. Orion's heat shield design has two aspects which needed to be analyzed thermally: i) a small excess of adhesive used to bond the outer AVCOAT layer to the inner composite structure tends to seep from under the AVCOAT and form a small bead in between two bricks of AVCOAT, ii) a silicone rubber with different thermophysical properties than AVCOAT fills the gap between two bricks of AVCOAT. I created a thermal model using TD to determine temperature differences that are caused by these two features. To prevent false results, all TD models must be verified against something known. In this case, the TD model was correlated to CHAR, an ablation modelling software used to analyze TPS. Analyzing a node far from the concerning features, we saw that the TD model data match CHAR data, verifying the TD model. Next, the temperature of the silicone rubber as well as the bead of adhesive were analyzed to determine if they exceeded allowable temperatures. It was determined that these two features do not have a significant effect on the max temperature of the heat shield. This model can be modified to check temperatures at various locations of the heat shield where the composite thickness varies.

  9. An expert system framework for nondestructive waste assay

    International Nuclear Information System (INIS)

    Becker, G.K.

    1996-01-01

    Management and disposition of transuranic (RU) waste forms necessitates determining entrained RU and associated radioactive material quantities as per National RU Waste Characterization Program requirements. Technical justification and demonstration of a given NDA method used to determine RU mass and uncertainty in accordance with program quality assurance is difficult for many waste forms. Difficulties are typically founded in waste NDA methods that employ standards compensation and/or employment of simplifying assumptions on waste form configurations. Capability to determine and justify RU mass and mass uncertainty can be enhanced through integration of waste container data/information using expert system and empirical data-driven techniques with conventional data acquisition and analysis. Presented is a preliminary expert system framework that integrates the waste form data base, alogrithmic techniques, statistical analyses, expert domain knowledge bases, and empirical artificial intelligence modules into a cohesive system. The framework design and bases in addition to module development activities are discussed

  10. Understanding Hawking radiation in the framework of open quantum systems

    International Nuclear Information System (INIS)

    Yu Hongwei; Zhang Jialin

    2008-01-01

    We study the Hawking radiation in the framework of open quantum systems by examining the time evolution of a detector (modeled by a two-level atom) interacting with vacuum massless scalar fields. The dynamics of the detector is governed by a master equation obtained by tracing over the field degrees of freedom from the complete system. The nonunitary effects are studied by analyzing the time behavior of a particular observable of the detector, i.e., its admissible state, in the Unruh, Hartle-Hawking, as well as Boulware vacua outside a Schwarzschild black hole. We find that the detector in both the Unruh and Hartle-Hawking vacua would spontaneously excite with a nonvanishing probability the same as what one would obtain if there is thermal radiation at the Hawking temperature from the black hole, thus reproducing the basic results concerning the Hawking effect in the framework of open quantum systems

  11. Quality Assurance Framework Implementation Guide for Isolated Community Power Systems

    Energy Technology Data Exchange (ETDEWEB)

    Esterly, Sean R. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Baring-Gould, Edward I. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Burman, Kari A. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Greacen, Chris [Independent Consultant (United States)

    2017-08-15

    This implementation guide is a companion document to the 'Quality Assurance Framework for Mini-Grids' technical report. This document is intended to be used by one of the many stakeholder groups that take part in the implementation of isolated power systems. Although the QAF could be applied to a single system, it was designed primarily to be used within the context of a larger national or regional rural electrification program in which many individual systems are being installed. This guide includes a detailed overview of the Quality Assurance Framework and provides guidance focused on the implementation of the Framework from the perspective of the different stakeholders that are commonly involved in expanding energy development within specific communities or regions. For the successful long-term implementation of a specific rural electrification program using mini-grid systems, six key stakeholders have been identified that are typically engaged, each with a different set of priorities 1. Regulatory agency 2. Governmental ministry 3. System developers 4. Mini-utility 5. Investors 6. Customers/consumers. This document is broken into two distinct sections. The first focuses on the administrative processes in the development and operation of community-based mini-grid programs, while the second focuses on the process around the installation of the mini-grid project itself.

  12. Architectural frameworks: defining the structures for implementing learning health systems.

    Science.gov (United States)

    Lessard, Lysanne; Michalowski, Wojtek; Fung-Kee-Fung, Michael; Jones, Lori; Grudniewicz, Agnes

    2017-06-23

    The vision of transforming health systems into learning health systems (LHSs) that rapidly and continuously transform knowledge into improved health outcomes at lower cost is generating increased interest in government agencies, health organizations, and health research communities. While existing initiatives demonstrate that different approaches can succeed in making the LHS vision a reality, they are too varied in their goals, focus, and scale to be reproduced without undue effort. Indeed, the structures necessary to effectively design and implement LHSs on a larger scale are lacking. In this paper, we propose the use of architectural frameworks to develop LHSs that adhere to a recognized vision while being adapted to their specific organizational context. Architectural frameworks are high-level descriptions of an organization as a system; they capture the structure of its main components at varied levels, the interrelationships among these components, and the principles that guide their evolution. Because these frameworks support the analysis of LHSs and allow their outcomes to be simulated, they act as pre-implementation decision-support tools that identify potential barriers and enablers of system development. They thus increase the chances of successful LHS deployment. We present an architectural framework for LHSs that incorporates five dimensions-goals, scientific, social, technical, and ethical-commonly found in the LHS literature. The proposed architectural framework is comprised of six decision layers that model these dimensions. The performance layer models goals, the scientific layer models the scientific dimension, the organizational layer models the social dimension, the data layer and information technology layer model the technical dimension, and the ethics and security layer models the ethical dimension. We describe the types of decisions that must be made within each layer and identify methods to support decision-making. In this paper, we outline

  13. RANZCR Body Systems Framework of diagnostic imaging examination descriptors.

    Science.gov (United States)

    Pitman, Alexander G; Penlington, Lisa; Doromal, Darren; Slater, Gregory; Vukolova, Natalia

    2014-08-01

    A unified and logical system of descriptors for diagnostic imaging examinations and procedures is a desirable resource for radiology in Australia and New Zealand and is needed to support core activities of RANZCR. Existing descriptor systems available in Australia and New Zealand (including the Medicare DIST and the ACC Schedule) have significant limitations and are inappropriate for broader clinical application. An anatomically based grid was constructed, with anatomical structures arranged in rows and diagnostic imaging modalities arranged in columns (including nuclear medicine and positron emission tomography). The grid was segregated into five body systems. The cells at the intersection of an anatomical structure row and an imaging modality column were populated with short, formulaic descriptors of the applicable diagnostic imaging examinations. Clinically illogical or physically impossible combinations were 'greyed out'. Where the same examination applied to different anatomical structures, the descriptor was kept identical for the purposes of streamlining. The resulting Body Systems Framework of diagnostic imaging examination descriptors lists all the reasonably common diagnostic imaging examinations currently performed in Australia and New Zealand using a unified grid structure allowing navigation by both referrers and radiologists. The Framework has been placed on the RANZCR website and is available for access free of charge by registered users. The Body Systems Framework of diagnostic imaging examination descriptors is a system of descriptors based on relationships between anatomical structures and imaging modalities. The Framework is now available as a resource and reference point for the radiology profession and to support core College activities. © 2014 The Royal Australian and New Zealand College of Radiologists.

  14. Towards an evaluation framework for Laboratory Information Systems.

    Science.gov (United States)

    Yusof, Maryati M; Arifin, Azila

    Laboratory testing and reporting are error-prone and redundant due to repeated, unnecessary requests and delayed or missed reactions to laboratory reports. Occurring errors may negatively affect the patient treatment process and clinical decision making. Evaluation on laboratory testing and Laboratory Information System (LIS) may explain the root cause to improve the testing process and enhance LIS in supporting the process. This paper discusses a new evaluation framework for LIS that encompasses the laboratory testing cycle and the socio-technical part of LIS. Literature review on discourses, dimensions and evaluation methods of laboratory testing and LIS. A critical appraisal of the Total Testing Process (TTP) and the human, organization, technology-fit factors (HOT-fit) evaluation frameworks was undertaken in order to identify error incident, its contributing factors and preventive action pertinent to laboratory testing process and LIS. A new evaluation framework for LIS using a comprehensive and socio-technical approach is outlined. Positive relationship between laboratory and clinical staff resulted in a smooth laboratory testing process, reduced errors and increased process efficiency whilst effective use of LIS streamlined the testing processes. The TTP-LIS framework could serve as an assessment as well as a problem-solving tool for the laboratory testing process and system. Copyright © 2016 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  15. Dynamic state estimation assisted power system monitoring and protection

    Science.gov (United States)

    Cui, Yinan

    The advent of phasor measurement units (PMUs) has unlocked several novel methods to monitor, control, and protect bulk electric power systems. This thesis introduces the concept of "Dynamic State Estimation" (DSE), aided by PMUs, for wide-area monitoring and protection of power systems. Unlike traditional State Estimation where algebraic variables are estimated from system measurements, DSE refers to a process to estimate the dynamic states associated with synchronous generators. This thesis first establishes the viability of using particle filtering as a technique to perform DSE in power systems. The utility of DSE for protection and wide-area monitoring are then shown as potential novel applications. The work is presented as a collection of several journal and conference papers. In the first paper, we present a particle filtering approach to dynamically estimate the states of a synchronous generator in a multi-machine setting considering the excitation and prime mover control systems. The second paper proposes an improved out-of-step detection method for generators by means of angular difference. The generator's rotor angle is estimated with a particle filter-based dynamic state estimator and the angular separation is then calculated by combining the raw local phasor measurements with this estimate. The third paper introduces a particle filter-based dual estimation method for tracking the dynamic states of a synchronous generator. It considers the situation where the field voltage measurements are not readily available. The particle filter is modified to treat the field voltage as an unknown input which is sequentially estimated along with the other dynamic states. The fourth paper proposes a novel framework for event detection based on energy functions. The key idea is that any event in the system will leave a signature in WAMS data-sets. It is shown that signatures for four broad classes of disturbance events are buried in the components that constitute the

  16. Rack Protection Monitor - A Simple System

    International Nuclear Information System (INIS)

    Orr, S.

    1997-12-01

    The Rack Protection Monitor is a simple, fail-safe device to monitor smoke, temperature and ventilation sensors. It accepts inputs from redundant sensors and has a hardwired algorithm to prevent nuisance power trips due to random sensor failures. When a sensor is triggered the Rack Protection Monitor latches and annunicates the alarm. If another sensor is triggered, the Rack Protection Monitor locally shuts down the power to the relay rack and sends alarm to central control

  17. 14 CFR 25.954 - Fuel system lightning protection.

    Science.gov (United States)

    2010-01-01

    ... AIRCRAFT AIRWORTHINESS STANDARDS: TRANSPORT CATEGORY AIRPLANES Powerplant Fuel System § 25.954 Fuel system lightning protection. The fuel system must be designed and arranged to prevent the ignition of fuel vapor... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Fuel system lightning protection. 25.954...

  18. 14 CFR 27.954 - Fuel system lightning protection.

    Science.gov (United States)

    2010-01-01

    ... AIRCRAFT AIRWORTHINESS STANDARDS: NORMAL CATEGORY ROTORCRAFT Powerplant Fuel System § 27.954 Fuel system lightning protection. The fuel system must be designed and arranged to prevent the ignition of fuel vapor... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Fuel system lightning protection. 27.954...

  19. 14 CFR 29.954 - Fuel system lightning protection.

    Science.gov (United States)

    2010-01-01

    ... AIRCRAFT AIRWORTHINESS STANDARDS: TRANSPORT CATEGORY ROTORCRAFT Powerplant Fuel System § 29.954 Fuel system lightning protection. The fuel system must be designed and arranged to prevent the ignition of fuel vapor... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Fuel system lightning protection. 29.954...

  20. Characterising Information Systems in Australia: A Theoretical Framework

    Directory of Open Access Journals (Sweden)

    Gail Ridley

    2006-11-01

    Full Text Available The study reported in this volume aims to investigate the state of the Information Systems academic discipline in Australia from a historical and current perspective, collecting evidence across a range of dimensions. To maximise the strategic potential of the study, the results need to be capable of integration, so that the relationships within and across the dimensions and geographical units are understood. A meaningful theoretical framework will help relate the results of the different dimensions of the study to characterise the discipline in the region, and assist in empowering the Australian IS research community. This paper reviewed literature on the development of disciplines, before deriving a theoretical framework for the broader study reported in this volume. The framework considered the current and past state of IS in Australian universities from the perspective of the development of a discipline. The components of the framework were derived and validated through a thematic analysis of both the IS and non-IS literature. This paper also presents brief vignettes of the development of two other related disciplines. The framework developed in this paper, which has been partly guided by Whitley’s Theory of Scientific Change, has been used to analyse data collated from the Australian states and the Australian Capital Territory. The degree of variation in Australian IS as an indication of its “professionalisation”, the nature of its body of knowledge and its mechanisms of control, will be used to frame the analysis. Research reported in several of the papers that follow in this volume has drawn upon the theoretical framework presented below.

  1. A semantic security framework for systems of systems

    NARCIS (Netherlands)

    Trivellato, Daniel; Zannone, Nicola; Glaundrup, Maurice; Skowronek, Jacek; Etalle, Sandro

    2013-01-01

    Systems of systems (SoS) are dynamic coalitions of distributed, autonomous and heterogeneous systems that collaborate to achieve a common goal. While offering several advantages in terms of scalability and flexibility, the SoS paradigm has a strong impact on systems interoperability and on the

  2. Evaluation of several corrosion protective coating systems on aluminum

    Science.gov (United States)

    Higgins, R. H.

    1981-01-01

    A study of several protective coating systems for use on aluminum in seawater/seacoast environments was conducted to review the developments made on protective coatings since early in the Space Shuttle program and to perform comparative studies on these coatings to determine their effectiveness for providing corrosion protection during exposure to seawater/seacoast environments. Panels of 2219-T87 aluminum were coated with 21 different systems and exposed to a 5 percent salt spray for 4000 hr. Application properties, adhesion measurements, heat resistance and corrosion protection were evaluated. For comparative studies, the presently specified Bostik epoxy system used on the SRB structures was included. Results of these tests indicate four systems with outstanding performance and four additional systems with protection almost as good. These systems are based on a chromated pretreatment, a chromate epoxy primer, and a polyurethane topcoat. Consideration for one of these systems should be included for those applications where superior corrosion protection for aluminum surfaces is required.

  3. Framework for optimal power flow incorporating dynamic system security

    International Nuclear Information System (INIS)

    El-Kady, M.A.; Owayedh, M.S.

    2006-01-01

    This paper introduces a novel framework and methodologies which are capable of tackling the complex issue of power system economy versus security in a practical and effective manner. At heart of achieving such a challenging and far-reaching objective is the incorporation of the Dyanamic Security Assessment (DSA) into production optimization techniques using the Transient Energy Function (TEF) method. In addition, and in parallel with the already well established concept of the system security, two new concepts pertaining to power system performance will be introduced in this paper, namely the concept of system dynamic susceptibility, which measures the level of systems weakness to a particular contingency and the concept of system consequent restorability, which measures the extent of contingency severity in terms of the required subsequent system restoration work should a particular contingency occur. (author)

  4. [Framework for the strengthening of health information systems in Peru].

    Science.gov (United States)

    Curioso, Walter H; Espinoza-Portilla, Elizabeth

    2015-01-01

    In this article we present the essential components and policies that are most relevant regarding the conceptual framework to strengthen the health information systems in Peru. The article also presents the main policies, actions and strategies made in the field of electronic health in Peru that are most significant. The health information systems in Peru play a key role and are expected to achieve an integrated and interoperable information system. This will allow health information to be complete, efficient, of good quality and available in a timely manner to achieve better quality of life for people and allow meaningful modernization of public health in the context of health reform in Peru.

  5. A Structural Model Decomposition Framework for Systems Health Management

    Science.gov (United States)

    Roychoudhury, Indranil; Daigle, Matthew J.; Bregon, Anibal; Pulido, Belamino

    2013-01-01

    Systems health management (SHM) is an important set of technologies aimed at increasing system safety and reliability by detecting, isolating, and identifying faults; and predicting when the system reaches end of life (EOL), so that appropriate fault mitigation and recovery actions can be taken. Model-based SHM approaches typically make use of global, monolithic system models for online analysis, which results in a loss of scalability and efficiency for large-scale systems. Improvement in scalability and efficiency can be achieved by decomposing the system model into smaller local submodels and operating on these submodels instead. In this paper, the global system model is analyzed offline and structurally decomposed into local submodels. We define a common model decomposition framework for extracting submodels from the global model. This framework is then used to develop algorithms for solving model decomposition problems for the design of three separate SHM technologies, namely, estimation (which is useful for fault detection and identification), fault isolation, and EOL prediction. We solve these model decomposition problems using a three-tank system as a case study.

  6. A structural model decomposition framework for systems health management

    Science.gov (United States)

    Roychoudhury, I.; Daigle, M.; Bregon, A.; Pulido, B.

    Systems health management (SHM) is an important set of technologies aimed at increasing system safety and reliability by detecting, isolating, and identifying faults; and predicting when the system reaches end of life (EOL), so that appropriate fault mitigation and recovery actions can be taken. Model-based SHM approaches typically make use of global, monolithic system models for online analysis, which results in a loss of scalability and efficiency for large-scale systems. Improvement in scalability and efficiency can be achieved by decomposing the system model into smaller local submodels and operating on these submodels instead. In this paper, the global system model is analyzed offline and structurally decomposed into local submodels. We define a common model decomposition framework for extracting submodels from the global model. This framework is then used to develop algorithms for solving model decomposition problems for the design of three separate SHM technologies, namely, estimation (which is useful for fault detection and identification), fault isolation, and EOL prediction. We solve these model decomposition problems using a three-tank system as a case study.

  7. Development of a conceptual framework toward an integrated transportation system : final report, April 10, 2009.

    Science.gov (United States)

    2009-04-10

    This report documents research on the conceptual framework of an integrated transportation system with a prototype application under the framework. Three levels of control are involved in this framework: at the global level (an entire transportation ...

  8. Specific features of modern voice protection systems

    Directory of Open Access Journals (Sweden)

    Roman A. Ustinov

    2017-11-01

    Full Text Available Nowadays, speech technologies are among the most vibrant sectors of the world’s economy. Of high importance is the problem of ensuring the security of speech information (SI. Here we discuss SI protection systems within a modern communication model. The model is multimodal, multithreaded, and implies a large number of subscribers interacting via several communication lines. With this in mind, we perform a detailed analysis of threats to the confidentiality, integrity and accessibility of SI. Existing methods of counteraction against these threats are discussed, and shown to be insufficient to ensure the safety of voice messages (VM in full. Mean while, there are new threats to the integrity and accessibility of SI, the solutions for which are either do not exist, or only being developed. We propose our original approach to counter these threats. Steganography methods are the most promising for ensuring the integrity of the VM.  In particular, using audiomarkers allows one to reliably trace speaker’sidentity throughout the entire communication session. In order to counter the threats to SI availability due to the capacity of the communication channel and the limited volumes of VM data storage, it is necessary to improve existing adaptive speech compression algorithms, along with developing new ones. Furthermore, such algorithms must keep the specified level of speech intelligibility.

  9. Advanced materials for thermal protection system

    Science.gov (United States)

    Heng, Sangvavann; Sherman, Andrew J.

    1996-03-01

    Reticulated open-cell ceramic foams (both vitreous carbon and silicon carbide) and ceramic composites (SiC-based, both monolithic and fiber-reinforced) were evaluated as candidate materials for use in a heat shield sandwich panel design as an advanced thermal protection system (TPS) for unmanned single-use hypersonic reentry vehicles. These materials were fabricated by chemical vapor deposition/infiltration (CVD/CVI) and evaluated extensively for their mechanical, thermal, and erosion/ablation performance. In the TPS, the ceramic foams were used as a structural core providing thermal insulation and mechanical load distribution, while the ceramic composites were used as facesheets providing resistance to aerodynamic, shear, and erosive forces. Tensile, compressive, and shear strength, elastic and shear modulus, fracture toughness, Poisson's ratio, and thermal conductivity were measured for the ceramic foams, while arcjet testing was conducted on the ceramic composites at heat flux levels up to 5.90 MW/m2 (520 Btu/ft2ṡsec). Two prototype test articles were fabricated and subjected to arcjet testing at heat flux levels of 1.70-3.40 MW/m2 (150-300 Btu/ft2ṡsec) under simulated reentry trajectories.

  10. Protected areas system planning and monitoring

    NARCIS (Netherlands)

    Vreugdenhil, D.

    2003-01-01

    The Vth World Parks Congress to be held in Durban, South Africa, September 8-17, 2003 will evaluate progress in protected areas conservation and stipulate strategic policies for the coming decade. Most countries of the world have at least a collection of protected areas, and have signed the

  11. Covering the Monitoring Network: A Unified Framework to Protect E-Commerce Security

    Directory of Open Access Journals (Sweden)

    Lirong Qiu

    2017-01-01

    Full Text Available Multimedia applications in smart electronic commerce (e-commerce, such as online trading and Internet marketing, always face security in storage and transmission of digital images and videos. This study addresses the problem of security in e-commerce and proposes a unified framework to analyze the security data. First, to allocate the definite security resources optimally, we build our e-commerce monitoring model as an undirected network, where a monitored node is a vertex of the graph and a connection between vertices is an undirected edge. Moreover, we aim to find a minimal cover for the monitoring network as the optimal solution of resource allocation, which is defined as the network monitoring minimization problem (NMM. This problem is proved to be NP-hard. Second, by analyzing the latent threats, we design a novel and trusted monitoring system that can integrate incident monitoring, data analysis, risk assessment, and security warnings. This system does not touch users’ privacy data. Third, we propose a sequential model-based risk assessment method, which can predict the risk according to the text semantics. Our experimental results on web scale data demonstrate that our system is flexible enough when monitoring, which also verify the effectiveness and efficiency of our system.

  12. Quaternary geophysical framework of the northeastern North Carolina coastal system

    Science.gov (United States)

    Thieler, E.R.; Foster, D.S.; Mallinson, D.M.; Himmelstoss, E.A.; McNinch, J.E.; List, J.H.; Hammar-Klose, E.S.

    2013-01-01

    The northeastern North Carolina coastal system, from False Cape, Virginia, to Cape Lookout, North Carolina, has been studied by a cooperative research program that mapped the Quaternary geologic framework of the estuaries, barrier islands, and inner continental shelf. This information provides a basis to understand the linkage between geologic framework, physical processes, and coastal evolution at time scales from storm events to millennia. The study area attracts significant tourism to its parks and beaches, contains a number of coastal communities, and supports a local fishing industry, all of which are impacted by coastal change. Knowledge derived from this research program can be used to mitigate hazards and facilitate effective management of this dynamic coastal system.

  13. A Systematic Modelling Framework for Phase Transfer Catalyst Systems

    DEFF Research Database (Denmark)

    Anantpinijwatna, Amata; Sales-Cruz, Mauricio; Hyung Kim, Sun

    2016-01-01

    Phase-transfer catalyst systems contain two liquid phases, with a catalyst (PTC) that transfers between the phases, driving product formation in one phase and being regenerated in the other phase. Typically the reaction involves neutral species in an organic phase and regeneration involves ions i....... The application of the framework is made to two cases in order to highlight the performance and issues of activity coefficient models for predicting design and operation and the effects when different organic solvents are employed....

  14. Comparison of Component Frameworks for Real-Time Embedded Systems

    Czech Academy of Sciences Publication Activity Database

    Pop, T.; Hnětynka, P.; Hošek, P.; Malohlava, M.; Bureš, Tomáš

    2014-01-01

    Roč. 40, č. 1 (2014), s. 127-170 ISSN 0219-1377 Grant - others:GA AV ČR(CZ) GAP202/11/0312; GA UK(CZ) Project 378111; UK(CZ) SVV-2013- 267312 Keywords : component-based development * component frameworks * real-time and embedded systems Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.782, year: 2014

  15. Planetary Protection Considerations in EVA System Design

    Science.gov (United States)

    Eppler, Dean B.; Kosmo, Joseph J.

    2011-01-01

    very little expression of these anomalies. hardware from the human-occupied area may limit (although not likely eliminate) external materials in the human habitat. Definition of design-to requirements is critical to understanding technical feasibility and costs. The definition of Planetary Protection needs in relation to EVA mission and system element development cost impacts should be considered and interpreted in terms of Plausible Protection criteria. Since EVA operations will have the most direct physical interaction with the Martian surface, PP needs should be considered in the terms of mitigating hardware and operations impacts and costs.

  16. Decentralized Adaptive Overcurrent Protection for Medium Voltage Maritime Power Systems

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Bak, Claus Leth; Blaabjerg, Frede

    2016-01-01

    the entire electrical network and changes the relay settings accordingly, but this approach is not adequate for the maritime power systems. This paper propose a decentralized adaptive protection method, where each protection relay is able to identify by itself the network status without the need of a central...... control unit. The new adaptive protection method is based on communication between the overcurrent relays and the equipment that could affect the protection system, such as circuit breakers and generators. Using PSCAD, the proposed method is implemented in a test medium voltage maritime power system......More and more maritime applications as marine vessels and offshore platforms need an adaptive protection power system. However, the adaptive protection is yet to be implemented in the maritime sector. Usually, the adaptive protection implies the existence of a central control unit that monitors...

  17. Comparison, with regard to safety, between a hard-wired reactor protection system and a computerized protection system. Pt. 1

    International Nuclear Information System (INIS)

    Buettner, W.E.

    1976-07-01

    The study compares a conventional hard-wired dynamic reactor protection system with a computerized protection system. In the comparison, only the unequivocally safety-oriented protection actions are considered. In the first part, the different structures of both systems and the method of verification for their functional safety will be described. In the second part, the mean unavailability in case of demand for both systems under defined conditions will be determined. (orig.) [de

  18. Protective relaying of power systems using mathematical morphology

    CERN Document Server

    Wu, QH; Ji, TY

    2009-01-01

    Discusses the development of novel protective relaying algorithms, using Mathematical Morphology (MM). This book introduces the fundamental principles of MM, and brings together the applications of MM to develop different protective relaying algorithms for the protection of a variety of power system components.

  19. Advanced nuclear control and protection system ANCAP-80

    International Nuclear Information System (INIS)

    Asai, Takashi; Okano, Michihiko; Ishibashi, Kengo; Hasegawa, Masakoto; Fukuda, Hiroyoshi; Hosomichi, Renichi.

    1983-01-01

    Advanced reactor protection systems were developed to improve operational reliability and availability and to ease the burden of operators of Mitsubishi PWR Nuclear Power Stations. (Called ANCAP-80; Advanced Nuclear Control And Protection System) For the PWR plants now being planned and in future plans, Mitsubishi will adopt these systems with the following functional features; (1) Four channel protection logic, (2) Automatic bypass logic, (3) Automatic test provision, (4) Optical isolators. (author)

  20. SNAP: a tool for nuclear physical protection system modeling

    International Nuclear Information System (INIS)

    Engi, D.; Grant, F.H. III.

    1979-10-01

    Nuclear safeguards systems are concerned, in part, with the physical protection of nuclear materials. The function of a physical protection system is to define the facility against adversary activities which could lead to theft of nuclear material or sabotage resulting in a radiological release. The Safeguards Network Analysis Procedure (SNAP) provides a convenient and standard analysis methodology for the evaluation of physical protection system analysis. This paper describes a detailed application of SNAP to a hypothetical nuclear facility

  1. Incident Management in Academic Information System using ITIL Framework

    Science.gov (United States)

    Palilingan, V. R.; Batmetan, J. R.

    2018-02-01

    Incident management is very important in order to ensure the continuity of a system. Information systems require incident management to ensure information systems can provide maximum service according to the service provided. Many of the problems that arise in academic information systems come from incidents that are not properly handled. The objective of this study aims to find the appropriate way of incident management. The incident can be managed so it will not be a big problem. This research uses the ITIL framework to solve incident problems. The technique used in this study is a technique adopted and developed from the service operations section of the ITIL framework. The results of this research found that 84.5% of incidents appearing in academic information systems can be handled quickly and appropriately. 15.5% incidents can be escalated so as to not cause any new problems. The model of incident management applied to make academic information system can run quickly in providing academic service in a good and efficient. The incident management model implemented in this research is able to manage resources appropriately so as to quickly and easily manage incidents.

  2. Understanding Science: Frameworks for using stories to facilitate systems thinking

    Science.gov (United States)

    ElShafie, S. J.; Bean, J. R.

    2017-12-01

    Studies indicate that using a narrative structure for teaching and learning helps audiences to process and recall new information. Stories also help audiences retain specific information, such as character names or plot points, in the context of a broader narrative. Stories can therefore facilitate high-context systems learning in addition to low-context declarative learning. Here we incorporate a framework for science storytelling, which we use in communication workshops, with the Understanding Science framework developed by the UC Museum of Paleontology (UCMP) to explore the application of storytelling to systems thinking. We translate portions of the Understanding Science flowchart into narrative terms. Placed side by side, the two charts illustrate the parallels between the scientific process and the story development process. They offer a roadmap for developing stories about scientific studies and concepts. We also created a series of worksheets for use with the flowcharts. These new tools can generate stories from any perspective, including a scientist conducting a study; a character that plays a role in a larger system (e.g., foraminifera or a carbon atom); an entire system that interacts with other systems (e.g., the carbon cycle). We will discuss exemplar stories about climate change from each of these perspectives, which we are developing for workshops using content and storyboard models from the new UCMP website Understanding Global Change. This conceptual framework and toolkit will help instructors to develop stories about scientific concepts for use in a classroom setting. It will also help students to analyze stories presented in class, and to create their own stories about new concepts. This approach facilitates student metacognition of the learning process, and can also be used as a form of evaluation. We are testing this flowchart and its use in systems teaching with focus groups, in preparation for use in teacher professional development workshops.

  3. Radiation protection system in Azerbaijan Republic

    International Nuclear Information System (INIS)

    Aliyev, L.

    2002-01-01

    land or merge into Caspian See. Is increased also the bring into country of instruments, equipments and other technical means, which work on radioactive sources basic. The numerated facts indicate that is necessary function of good radiation control land protection's system in Azerbaijan (sector radiation's investigations, Radioecology Center NMS of Ministry for Ecology and Natural Recourses the special Plant 'Isotope' and his burring point of radioactive wastes, Civil Defense. Academic organizations and NMS, execute monitoring, control and noticing function by radiation situation. The last two organizations structures, which have been occupied with keeping, transportation, disactivate and burring of radioactive sources and their wastes, which are receiving here from much institutions. The functional activity of special plant 'Isotope' must be reorganized and reconstruct- red the exist PBRW. There is necessity of build of new PBRW, in according with modern technical requirements to the industrial cycle on complete utilization of all radioactive wastes kinds. The monitoring function of radiation situation over all territory of Republic is put on NMS MENR of Azerbaijan. But, for the execution his problems, NMS are necessary new instrumental park (radiometric, dozemetric, spectrometric and etc.) and the dense monitoring network over all territory of Azerbaijan Republic. Co-operation with IAEA will allow improve the quality of radiation protection system of Azerbaijan in shorter periods. (author)

  4. StreamNet Query System: Protected Areas

    Data.gov (United States)

    Pacific States Marine Fisheries Commission — Beginning in 1983, the Northwest Power Planning Council (Council) directed extensive studies of existing habitat and has analyzed alternative means of protection. In...

  5. Distributed Computations Environment Protection Using Artificial Immune Systems

    Directory of Open Access Journals (Sweden)

    A. V. Moiseev

    2011-12-01

    Full Text Available In this article the authors describe possibility of artificial immune systems applying for distributed computations environment protection from definite types of malicious impacts.

  6. Simulation Framework for Rebalancing of Autonomous Mobility on Demand Systems

    Directory of Open Access Journals (Sweden)

    Marczuk Katarzyna A.

    2016-01-01

    This study is built upon our previous work on Autonomous Mobility on Demand (AMOD systems. Our methodology is simulation-based and we make use of SimMobility, an agent-based microscopic simulation platform. In the current work we focus on the framework for testing different rebalancing policies for the AMOD systems. We compare three different rebalancing methods: (i no rebalancing, (ii offline rebalancing, and (iii online rebalancing. Simulation results indicate that rebalancing reduces the required fleet size and shortens the customers’ wait time.

  7. Hybrid Intrusion Forecasting Framework for Early Warning System

    Science.gov (United States)

    Kim, Sehun; Shin, Seong-Jun; Kim, Hyunwoo; Kwon, Ki Hoon; Han, Younggoo

    Recently, cyber attacks have become a serious hindrance to the stability of Internet. These attacks exploit interconnectivity of networks, propagate in an instant, and have become more sophisticated and evolutionary. Traditional Internet security systems such as firewalls, IDS and IPS are limited in terms of detecting recent cyber attacks in advance as these systems respond to Internet attacks only after the attacks inflict serious damage. In this paper, we propose a hybrid intrusion forecasting system framework for an early warning system. The proposed system utilizes three types of forecasting methods: time-series analysis, probabilistic modeling, and data mining method. By combining these methods, it is possible to take advantage of the forecasting technique of each while overcoming their drawbacks. Experimental results show that the hybrid intrusion forecasting method outperforms each of three forecasting methods.

  8. Framework for continuous performance improvement in small drinking water systems.

    Science.gov (United States)

    Bereskie, Ty; Haider, Husnain; Rodriguez, Manuel J; Sadiq, Rehan

    2017-01-01

    Continuous performance improvement (CPI) can be a useful approach to overcome water quality problems impacting small communities. Small drinking water systems (SDWSs) struggle to meet regulatory requirements and often lack the economic and human resource flexibility for immediate improvement. A CPI framework is developed to provide SDWS managers and operators an approach to gauge their current performance against similar systems and to track performance improvement from the implementation of the new technologies or innovations into the future. The proposed CPI framework incorporates the use of a water quality index (WQI) and functional performance benchmarking to evaluate and compare drinking water quality performance of an individual water utility against that of a representative benchmark. The results are then used to identify and prioritize the most vulnerable water quality indicators and subsequently identify and prioritize performance improvement strategies. The proposed CPI framework has been demonstrated using data collected from SDWSs in the province of Newfoundland and Labrador (NL), Canada and using the Canadian Council of Ministers of the Environment (CCME) WQI. Copyright © 2016 Elsevier B.V. All rights reserved.

  9. Overvoltage protection system for wireless power transfer systems

    Science.gov (United States)

    Chambon, Paul H.; Jones, Perry T.; Miller, John M.; Onar, Omer C.; Tang, Lixin; White, Clifford P.

    2017-05-02

    A wireless power transfer overvoltage protection system is provided. The system includes a resonant receiving circuit. The resonant receiving circuit includes an inductor, a resonant capacitor and a first switching device. The first switching device is connected the ends of the inductor. The first switching device has a first state in which the ends of the inductor are electrically coupled to each other through the first switching device, and a second state in which the inductor and resonant capacitor are capable of resonating. The system further includes a control module configured to control the first switching device to switching between the first state and the second state when the resonant receiving circuit is charging a load and a preset condition is satisfied and otherwise, the first switching device is maintained in the first state.

  10. A social-ecological systems framework for food systems research: accommodating transformation systems and their products

    Directory of Open Access Journals (Sweden)

    Graham R. Marshall

    2015-09-01

    Full Text Available The social-ecological systems (SES framework was developed to support communication across the multiple disciplines concerned with sustainable provision and/or appropriation of common-pool resources (CPRs. Transformation activities (e.g. processing, distribution, retailing in which value is added to resource units appropriated from CPRs were assumed in developing the framework to be exogenous to the SES of focal concern. However, provision and appropriation of CPRs are nowadays often closely integrated with the market economy, so significant interdependence exists between many CPR provision/appropriation activities and the activities in which appropriated resource units are transformed into the products ultimately marketed. This paper presents a modified version of the SES framework designed to better account for transformation activities in order to be more suitable for diagnosing those sustainability problems where it is inappropriate to define all such activities as exogenous to the SES of focal concern. The need for such modification was identified in a research project examining the challenges faced by Cambodian cattle-owning smallholders in accessing value chains for premium-priced beef. Hence the immediate focus was on strengthening the SES framework’s value for facilitating a multi-disciplinary diagnostic approach to food system research projects of this kind. The modified SES framework’s potential in this respect was illustrated by a preliminary application that drew on literature reviewed for the Cambodian project. Significant further potential exists in using the modified framework as a foundation from which to develop a version that is suitable for application to SESs in which transformation systems are appropriately represented as endogenous. Maintaining consistency with the standard SES framework will enable communication to occur more effectively between food system researchers and CPR scholars more generally.

  11. A Framework for Developing Context-aware Systems

    Directory of Open Access Journals (Sweden)

    Vangalur Alagar

    2014-09-01

    Full Text Available Context-aware computing refers to a general class of mobile real-time reactive systems that continuously sense their physical environment, and adapt their behavior accordingly. Context-awareness is an essential inherent property of ubiquitous computing or pervasive computing systems. Such systems are much richer and more complex than many software systems. The richness mainly comes from context-awareness, the heterogeneity of mobile devices and their service types, while complexity arises in the multitude of adaptations enforced by system policies. In order to provide the true intended effect on the application of services without compromising on the richness, the complexity must be tamed. Towards this goal, this paper proposes a component-based architecture for a Context-aware Framework in which context, awareness capabilities, reactions, and adaptations are formally dealt with. Two formal languages are designed to express context situations and express workflow policies, which respectively lead to a context reasoner and to enforce adaptations.With these formalisms and a component design that can be formalized, this work fulfills a formal approach to construct context-aware applications. Two case studies are explained, of which one is a proof-of-concept case study from service-oriented domain. It is fully implemented to illustrate the expressiveness of the framework design and robustness of its implementation.

  12. COSMOS: A System-Level Modelling and Simulation Framework for Coprocessor-Coupled Reconfigurable Systems

    DEFF Research Database (Denmark)

    Wu, Kehuai; Madsen, Jan

    2007-01-01

    and resource management, and iii) present a SystemC based framework to model and simulate coprocessor-coupled reconfigurable systems. We illustrate how COSMOS may be used to capture the dynamic behavior of such systems and emphasize the need for capturing the system aspects of such systems in order to deal...

  13. Distributed systems for the protection of nuclear stations

    International Nuclear Information System (INIS)

    Jover, P.

    1980-01-01

    The advantages of distributed control systems usually mentioned are improved exploitation, cost reduction, and adaptation to changes in technology. These advantages are obviously very interesting for nuclear power plant applications, and many such systems have been proposed. This note comments on the application of the distributed system concept to protection systems - what should be distributed - and closes with a brief description of a protection system based on microprocessors for pressurized water stations being built in France. (auth) [fr

  14. Understanding Global Change: Frameworks and Models for Teaching Systems Thinking

    Science.gov (United States)

    Bean, J. R.; Mitchell, K.; Zoehfeld, K.; Oshry, A.; Menicucci, A. J.; White, L. D.; Marshall, C. R.

    2017-12-01

    The scientific and education communities must impart to teachers, students, and the public an understanding of how the various factors that drive climate and global change operate, and why the rates and magnitudes of these changes related to human perturbation of Earth system processes today are cause for deep concern. Even though effective educational modules explaining components of the Earth and climate system exist, interdisciplinary learning tools are necessary to conceptually link the causes and consequences of global changes. To address this issue, the Understanding Global Change Project at the University of California Museum of Paleontology (UCMP) at UC Berkeley developed an interdisciplinary framework that organizes global change topics into three categories: (1) causes of climate change, both human and non-human (e.g., burning of fossil fuels, deforestation, Earth's tilt and orbit), (2) Earth system processes that shape the way the Earth works (e.g., Earth's energy budget, water cycle), and (3) the measurable changes in the Earth system (e.g., temperature, precipitation, ocean acidification). To facilitate student learning about the Earth as a dynamic, interacting system, a website will provide visualizations of Earth system models and written descriptions of how each framework topic is conceptually linked to other components of the framework. These visualizations and textual summarizations of relationships and feedbacks in the Earth system are a unique and crucial contribution to science communication and education, informed by a team of interdisciplinary scientists and educators. The system models are also mechanisms by which scientists can communicate how their own work informs our understanding of the Earth system. Educators can provide context and relevancy for authentic datasets and concurrently can assess student understanding of the interconnectedness of global change phenomena. The UGC resources will be available through a web-based platform and

  15. A Structural Model Decomposition Framework for Hybrid Systems Diagnosis

    Science.gov (United States)

    Daigle, Matthew; Bregon, Anibal; Roychoudhury, Indranil

    2015-01-01

    Nowadays, a large number of practical systems in aerospace and industrial environments are best represented as hybrid systems that consist of discrete modes of behavior, each defined by a set of continuous dynamics. These hybrid dynamics make the on-line fault diagnosis task very challenging. In this work, we present a new modeling and diagnosis framework for hybrid systems. Models are composed from sets of user-defined components using a compositional modeling approach. Submodels for residual generation are then generated for a given mode, and reconfigured efficiently when the mode changes. Efficient reconfiguration is established by exploiting causality information within the hybrid system models. The submodels can then be used for fault diagnosis based on residual generation and analysis. We demonstrate the efficient causality reassignment, submodel reconfiguration, and residual generation for fault diagnosis using an electrical circuit case study.

  16. Internet of Things Framework for Home Care Systems

    Directory of Open Access Journals (Sweden)

    Biljana Risteska Stojkoska

    2017-01-01

    Full Text Available The increasing average age of the population in most industrialized countries imposes a necessity for developing advanced and practical services using state-of-the-art technologies, dedicated to personal living spaces. In this paper, we introduce a hierarchical distributed approach for home care systems based on a new paradigm known as Internet of Things (IoT. The proposed generic framework is supported by a three-level data management model composed of dew computing, fog computing, and cloud computing for efficient data flow in IoT based home care systems. We examine the proposed model through a real case scenario of an early fire detection system using a distributed fuzzy logic approach. The obtained results prove that such implementation of dew and fog computing provides high accuracy in fire detection IoT systems, while achieving minimum data latency.

  17. Systems resilience: a new analytical framework for nuclear nonproliferation

    International Nuclear Information System (INIS)

    Pregenzer, Arian Leigh

    2011-01-01

    This paper introduces the concept of systems resilience as a new framework for thinking about the future of nonproliferation. Resilience refers to the ability of a system to maintain its vital functions in the face of continuous and unpredictable change. The nonproliferation regime can be viewed as a complex system, and key themes from the literature on systems resilience can be applied to the nonproliferation system. Most existing nonproliferation strategies are aimed at stability rather than resilience, and the current nonproliferation system may be over-constrained by the cumulative evolution of strategies, increasing its vulnerability to collapse. The resilience of the nonproliferation system can be enhanced by diversifying nonproliferation strategies to include general international capabilities to respond to proliferation and focusing more attention on reducing the motivation to acquire nuclear weapons in the first place. Ideas for future research, include understanding unintended consequences and feedbacks among nonproliferation strategies, developing methodologies for measuring the resilience of the nonproliferation system, and accounting for interactions of the nonproliferation system with other systems on larger and smaller scales.

  18. Systems resilience : a new analytical framework for nuclear nonproliferation.

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, Arian Leigh

    2011-12-01

    This paper introduces the concept of systems resilience as a new framework for thinking about the future of nonproliferation. Resilience refers to the ability of a system to maintain its vital functions in the face of continuous and unpredictable change. The nonproliferation regime can be viewed as a complex system, and key themes from the literature on systems resilience can be applied to the nonproliferation system. Most existing nonproliferation strategies are aimed at stability rather than resilience, and the current nonproliferation system may be over-constrained by the cumulative evolution of strategies, increasing its vulnerability to collapse. The resilience of the nonproliferation system can be enhanced by diversifying nonproliferation strategies to include general international capabilities to respond to proliferation and focusing more attention on reducing the motivation to acquire nuclear weapons in the first place. Ideas for future research, include understanding unintended consequences and feedbacks among nonproliferation strategies, developing methodologies for measuring the resilience of the nonproliferation system, and accounting for interactions of the nonproliferation system with other systems on larger and smaller scales.

  19. Reactor protection system design using micro-computers

    International Nuclear Information System (INIS)

    Fairbrother, D.B.

    1976-01-01

    Reactor protection systems for nuclear power plants have traditionally been built using analog hardware. This hardware works quite well for single parameter trip functions; however, optimum protection against DNBR and KW/ft limits requires more complex trip functions than can easily be handled with analog hardware. For this reason, Babcock and Wilcox has introduced a Reactor Protection System, called the RPS-II, that utilizes a micro-computer to handle the more complex trip functions. The paper describes the design of the RPS-II and the operation of the micro-computer within the Reactor Protection System

  20. Reactor protection system design using micro-computers

    International Nuclear Information System (INIS)

    Fairbrother, D.B.

    1977-01-01

    Reactor Protection Systems for Nuclear Power Plants have traditionally been built using analog hardware. This hardware works quite well for single parameter trip functions; however, optimum protection against DNBR and KW/ft limits requires more complex trip functions than can easily be handled with analog hardware. For this reason, Babcock and Wilcox has introduced a Reactor Protection System, called the RPS-II, that utilizes a micro-computer to handle the more complex trip functions. This paper describes the design of the RPS-II and the operation of the micro-computer within the Reactor Protection System

  1. Seismic design criteria of fire protection systems for DOE facilities

    International Nuclear Information System (INIS)

    Hardy, G.; Cushing, R.; Driesen, G.

    1991-01-01

    Fire protection systems are critical to the safety of personnel and to the protection of inventory during any kind of emergency situation that involves a fire. The importance of these fire protection systems is hightened for DOE facilities which often house nuclear, chemical or scientific processes. Current research into the topic of open-quotes fires following earthquakesclose quotes has demonstrated that the risks of a fire starting as a result of a major earthquake can be significant. Thus, fire protection systems need to be designed to withstand the anticipated seismic event for the site in question

  2. Novel Directional Protection Scheme for the FREEDM Smart Grid System

    Science.gov (United States)

    Sharma, Nitish

    This research primarily deals with the design and validation of the protection system for a large scale meshed distribution system. The large scale system simulation (LSSS) is a system level PSCAD model which is used to validate component models for different time-scale platforms, to provide a virtual testing platform for the Future Renewable Electric Energy Delivery and Management (FREEDM) system. It is also used to validate the cases of power system protection, renewable energy integration and storage, and load profiles. The protection of the FREEDM system against any abnormal condition is one of the important tasks. The addition of distributed generation and power electronic based solid state transformer adds to the complexity of the protection. The FREEDM loop system has a fault current limiter and in addition, the Solid State Transformer (SST) limits the fault current at 2.0 per unit. Former students at ASU have developed the protection scheme using fiber-optic cable. However, during the NSF-FREEDM site visit, the National Science Foundation (NSF) team regarded the system incompatible for the long distances. Hence, a new protection scheme with a wireless scheme is presented in this thesis. The use of wireless communication is extended to protect the large scale meshed distributed generation from any fault. The trip signal generated by the pilot protection system is used to trigger the FID (fault isolation device) which is an electronic circuit breaker operation (switched off/opening the FIDs). The trip signal must be received and accepted by the SST, and it must block the SST operation immediately. A comprehensive protection system for the large scale meshed distribution system has been developed in PSCAD with the ability to quickly detect the faults. The validation of the protection system is performed by building a hardware model using commercial relays at the ASU power laboratory.

  3. The Protective Arm of the Renin Angiotensin System (RAS)

    DEFF Research Database (Denmark)

    understanding of the protective side of the Renin Angiotensin System (RAS) involving angiotensin AT2 receptor, ACE2, and Ang(1-7)/Mas receptor Combines the knowledge of editors who pioneered research on the protective renin angiotensin system including; Dr. Thomas Unger, one of the founders of AT2 receptor......The Protective Arm of the Renin Angiotensin System: Functional Aspects and Therapeutic Implications is the first comprehensive publication to signal the protective role of a distinct part of the renin-angiotensin system (RAS), providing readers with early insight into a complex system which...... will become of major medical importance in the near future. Focusing on recent research, The Protective Arm of the Renin Angiotensin System presents a host of new experimental studies on specific components of the RAS, namely angiotensin AT2 receptors (AT2R), the angiotensin (1-7) peptide with its receptor...

  4. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  5. Report on task I: fire protection system study

    International Nuclear Information System (INIS)

    Bernard, E.A.; Cano, G.L.

    1977-02-01

    This study (1) evaluates, on a comparative basis, the national and international regulatory and insurance standards that serve as guidance for fire protection within the nuclear power industry; (2) analyzes the recommendations contained in the major reports on the Browns Ferry Fire; (3) proposes quantitative safety goals and evaluation methods for Nuclear Power Plant Fire Protection Systems (NPPFPS); (4) identifies potential improvements that may be incorporated into NPPFPS; and (5) recommends a plan of action for continuation of the fire protections systems study

  6. A Working Framework for Enabling International Science Data System Interoperability

    Science.gov (United States)

    Hughes, J. Steven; Hardman, Sean; Crichton, Daniel J.; Martinez, Santa; Law, Emily; Gordon, Mitchell K.

    2016-07-01

    For diverse scientific disciplines to interoperate they must be able to exchange information based on a shared understanding. To capture this shared understanding, we have developed a knowledge representation framework that leverages ISO level reference models for metadata registries and digital archives. This framework provides multi-level governance, evolves independent of the implementation technologies, and promotes agile development, namely adaptive planning, evolutionary development, early delivery, continuous improvement, and rapid and flexible response to change. The knowledge representation is captured in an ontology through a process of knowledge acquisition. Discipline experts in the role of stewards at the common, discipline, and project levels work to design and populate the ontology model. The result is a formal and consistent knowledge base that provides requirements for data representation, integrity, provenance, context, identification, and relationship. The contents of the knowledge base are translated and written to files in suitable formats to configure system software and services, provide user documentation, validate input, and support data analytics. This presentation will provide an overview of the framework, present a use case that has been adopted by an entire science discipline at the international level, and share some important lessons learned.

  7. Development of Digital I and C System using C4ISR Architect Framework

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Jae Cheon [KEPCO, Ulsan (Korea, Republic of); Quang, Phamle [Ninh Thuan Nuclear Power Project Management Board, Province (Viet Nam)

    2014-08-15

    The architect framework for the digital I and C system is presented in this work. With rapid changes in digital I and C technology, there is a strong need to provide uniform methods to describe the system functions and their performance in context with the physical configuration and logical behavior. C4ISR framework would provide the process and method for the digital system in that it allows the three different views of operational, systems and services, and technical standards. Therefore, stake holders can share information that is related to the system interfaces, the actions or activities that those components perform, and rules or constraints for those activities from the initial state of system development. As a result, the life cycle cost and development time for the digital I and C system can also be optimized. These benefits can be obtained by introducing views and products to reveal the logical, behavioral, and performance characteristics of the architecture. To prove this approach, the plant protection system (PPS) is chosen and the measure of effectiveness (MOE) is evaluated. An MOE of PPS is introduced as: functional effectiveness, performance effectiveness, and interoperability effectiveness.

  8. 78 FR 44475 - Protection System Maintenance Reliability Standard

    Science.gov (United States)

    2013-07-24

    ... that the performance or product has some reliability-related value, then the requirement will have...] Protection System Maintenance Reliability Standard AGENCY: Federal Energy Regulatory Commission, Energy... Commission proposes to approve a revised Reliability Standard, PRC-005- 2--Protection System Maintenance, to...

  9. A computational framework for modeling targets as complex adaptive systems

    Science.gov (United States)

    Santos, Eugene; Santos, Eunice E.; Korah, John; Murugappan, Vairavan; Subramanian, Suresh

    2017-05-01

    Modeling large military targets is a challenge as they can be complex systems encompassing myriad combinations of human, technological, and social elements that interact, leading to complex behaviors. Moreover, such targets have multiple components and structures, extending across multiple spatial and temporal scales, and are in a state of change, either in response to events in the environment or changes within the system. Complex adaptive system (CAS) theory can help in capturing the dynamism, interactions, and more importantly various emergent behaviors, displayed by the targets. However, a key stumbling block is incorporating information from various intelligence, surveillance and reconnaissance (ISR) sources, while dealing with the inherent uncertainty, incompleteness and time criticality of real world information. To overcome these challenges, we present a probabilistic reasoning network based framework called complex adaptive Bayesian Knowledge Base (caBKB). caBKB is a rigorous, overarching and axiomatic framework that models two key processes, namely information aggregation and information composition. While information aggregation deals with the union, merger and concatenation of information and takes into account issues such as source reliability and information inconsistencies, information composition focuses on combining information components where such components may have well defined operations. Since caBKBs can explicitly model the relationships between information pieces at various scales, it provides unique capabilities such as the ability to de-aggregate and de-compose information for detailed analysis. Using a scenario from the Network Centric Operations (NCO) domain, we will describe how our framework can be used for modeling targets with a focus on methodologies for quantifying NCO performance metrics.

  10. The evolving system of radiological protection: the nuclear industry perspective

    International Nuclear Information System (INIS)

    Coates, R.

    2003-01-01

    . (A set of key examples is listed herein.) In our view, the current system comprising of the dose limit (1 mSv pa) and the ALARA Principle provides the necessary flexibility and tools to regulators for addressing any country specific or site specific settings, and there are already good examples of this. Again, we believe that this matter is best left for discussion and agreement between the local stakeholders rather than at an international level. We strongly support the need to establish an international approach to defining a level of dose below which society may legitimately maintain that an individual is adequately protected., and hence the allocation of further resources to control the source on radiological health grounds would be inappropriate. WNA considers that this dose is not less than a few tens of micro-sieverts. This approach should be supported by guidance on the appropriate level of conservatism within dose assessments, both in the context of exclusion/clearance/exemption and critical groups in general. WNA supports the continued use of the term 'ALARA, economic and social factors being taken into account'. Collective dose is a useful concept in the optimisation of occupational exposure: in addition it needs to be supplemented by the consideration of the number of workers exposed at the higher levels and by wider pragmatic experience. Public collective dose is of very limited utility in decision making, and little if any weight should be given to exposures at long timescales and exceedingly trivial levels of individual exposure. WNA welcomes both the lead taken by ICRP to bring the protection of non-human biota into a coherent overall framework addressing the totality of radiological protection, and the recognition that the current system has in practice provided an appropriate standard of environmental protection. On this basis the development of the future system of protection must not impose a disproportionate burden on operators. The focus for

  11. Impact of Y2K problem on physical protection system

    International Nuclear Information System (INIS)

    Kumar, R.; Swadia, N.S.; Zanwar, P.S.; Mishra, G.P.; Salunke, A.S.; Nigam, R.K.

    1999-01-01

    Year 2000 related system failures/problems in Physical Protection System pose no threat to general safety and functioning of any nuclear facility. But there can be potential security threats having radiation safety and non-proliferation concern and hence should be given due importance. Reviewing and testing Physical Protection System for Y2K compliance are easier than other systems as it does not directly affect operation of the plant. The existing emergency response capability at the nuclear facilities should be utilizes effectively to mitigate any Y2K induced events on Physical Protection System with dedicated manpower and channeled efforts

  12. Evolution of Radiation Protection System in Kenya

    International Nuclear Information System (INIS)

    Maina, J. A. W.

    2004-01-01

    Promulgation of radiation protection legislation in Kenya dates back to 1982, was revised in 1985 and became operational in 1986. This law, the Radiation Protection Act, establishes the Radiation Protection Board as the National Regulatory Authority, with an executive Inspectorate headed by the Secretary to the Board. Subsidiary legislation on radiological practices and standards were subsequently published. The Inspectorate carries out the National programme for notification, authorization, inspection and enforcement. Nuclear applications for peaceful purposes in Kenya are on the increase in all major fields of socio-economic development. Provision of regulatory services, guidance and enforcement procedures, has had a net growth over the last fifteen years. However, staff retention has been declining over the years in a market where job opportunities, with relatively high incentives, are high either inside or outside the country. Human and equipment resource development has therefore not kept pace and this has hampered effective and efficient provision of services. The poor status of the economy has had its impact on delivery of quality, effective and efficient radiation protection services. Provision of radiation services and acquisition of radiation detection and measurement equipment in the country has been generally lacking dating as far back as 1995. During the period 1989 to present, Kenya's Regulatory Authority, the Radiation Protection Board, undertook to provide personal monitoring, quality assurance, radioanalysis, and equipment calibration. Over the years these services have stalled due to outdated equipment most of which have broken down. A maintenance and calibration service for nuclear equipment is an expensive cross-boarder issue. Budgetary constraints, insufficient human and equipment resources, and a perennial 'brain drain' has placed limitations to the effectiveness and efficiency of implementation of the National programmes and slowed the

  13. Electronic health record standards, coding systems, frameworks, and infrastructures

    CERN Document Server

    Sinha, Pradeep K; Bendale, Prashant; Mantri, Manisha; Dande, Atreya

    2013-01-01

    Discover How Electronic Health Records Are Built to Drive the Next Generation of Healthcare Delivery The increased role of IT in the healthcare sector has led to the coining of a new phrase ""health informatics,"" which deals with the use of IT for better healthcare services. Health informatics applications often involve maintaining the health records of individuals, in digital form, which is referred to as an Electronic Health Record (EHR). Building and implementing an EHR infrastructure requires an understanding of healthcare standards, coding systems, and frameworks. This book provides an

  14. Flight envelope protection system for unmanned aerial vehicles

    KAUST Repository

    Claudel, Christian G.; Shaqura, Mohammad

    2016-01-01

    Systems and methods to protect the flight envelope in both manual flight and flight by a commercial autopilot are provided. A system can comprise: an inertial measurement unit (IMU); a computing device in data communication with the IMU

  15. System and method for quench protection of a superconductor

    Science.gov (United States)

    Huang, Xianrui; Sivasubramaniam, Kiruba Haran; Bray, James William; Ryan, David Thomas

    2008-03-11

    A system and method for protecting a superconductor from a quench condition. A quench protection system is provided to protect the superconductor from damage due to a quench condition. The quench protection system comprises a voltage detector operable to detect voltage across the superconductor. The system also comprises a frequency filter coupled to the voltage detector. The frequency filter is operable to couple voltage signals to a control circuit that are representative of a rise in superconductor voltage caused by a quench condition and to block voltage signals that are not. The system is operable to detect whether a quench condition exists in the superconductor based on the voltage signal received via the frequency filter and to initiate a protective action in response.

  16. Design and evaluation of physical protection systems of nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    An, Jin Soo; Lee, Hyun Chul; Hwang, In Koo; Kwack, Eun Ho; Choi, Yung Myung

    2001-06-01

    Nuclear material and safety equipment of nuclear facilities are required to be protected against any kind of theft or sabotage. Physical protection is one of the measures to prevent such illegally potential threats for public security. It should cover all the cases of use, storage, and transportation of nuclear material. A physical protection system of a facility consists of exterior intrusion sensors, interior intrusion sensors, an alarm assessment and communication system, entry control systems, access delay equipment, etc. The design of an effective physical protection system requires a comprehensive approach in which the designers define the objective of the system, establish an initial design, and evaluate the proposed design. The evaluation results are used to determine whether or not the initial design should be modified and improved. Some modelling techniques are commonly used to analyse and evaluate the performance of a physical protection system. Korea Atomic Energy Research Institute(KAERI) has developed a prototype of software as a part of a full computer model for effectiveness evaluation for physical protection systems. The input data elements for the prototype, contain the type of adversary, tactics, protection equipment, and the attributes of each protection component. This report contains the functional and structural requirements defined in the development of the evaluation computer model.

  17. The importance of research for the regulatory framework of radiation protection

    International Nuclear Information System (INIS)

    Schmitt-Hannig, A.

    1998-01-01

    On behalf of the Federal ministry for Environment, Nature Conservation and Nuclear Safety (BMU), the Federal Office for Radiation Protection in Germany (BfS) is carrying out a research program in the field of radiation protection. More that 60 research and study contracts in 11 different radiation protection areas are funded every year, and these are carried out mainly by universities and research centers. The results of these projects are used in developing radiation protection regulations, guidelines and procedures to fulfill the special radiation protection tasks of the BMU, the execution of which is required by law. Planning, scientific and administrative management, provision of assistance as well as expert evaluation of the results from these projects lies within the area of responsibility of the BfS. A report issued annually provides information on preliminary and final results of radiation protection research projects in Germany (author) Germany (author)

  18. Operational test report - Project W-320 cathodic protection systems

    International Nuclear Information System (INIS)

    Bowman, T.J.

    1998-01-01

    Washington Administrative Code (WAC) 173-303-640 specifies that corrosion protection must be designed into tank systems that treat or store dangerous wastes. Project W-320, Waste Retrieval Sluicing System (WRSS), utilizes underground encased waste transfer piping between tanks 241-C-106 and 241-AY-102. Corrosion protection is afforded to the encasements of the WRSS waste transfer piping through the application of earthen ionic currents onto the surface of the piping encasements. Cathodic protection is used in conjunction with the protective coatings that are applied upon the WRSS encasement piping. WRSS installed two new two rectifier systems (46 and 47) and modified one rectifier system (31). WAC 173-303-640 specifies that the proper operation of cathodic protection systems must be confirmed within six months after initial installation. The WRSS cathodic protection systems were energized to begin continuous operation on 5/5/98. Sixteen days after the initial steady-state start-up of the WRSS rectifier systems, the operational testing was accomplished with procedure OTP-320-006 Rev/Mod A-0. This operational test report documents the OTP-320-006 results and documents the results of configuration testing of integrated piping and rectifier systems associated with the W-320 cathodic protection systems

  19. Framework for combining REACH and national regulations to obtain equal protection levels of human health and the environment in different countries - Comparative study of Denmark and Korea

    DEFF Research Database (Denmark)

    Lee, Jihyun; Pedersen, Anders Branth; Thomsen, Marianne

    2013-01-01

    The aim of this paper is to present a conceptual framework for a systems approach to protect the environment and human health by taking into account differences in the cumulative risks of total human exposure in a territorial context. To this end the measures that are available and that can...... compound, the territorial differences in background exposure to endocrine and neurological interfering stressors were modelled. It is concluded that the different territorial soil and air lead pollution levels contribute differently to the total childhood lead exposure in the two countries. As such...

  20. Discussion on several problems in evolution of radiation protection system

    International Nuclear Information System (INIS)

    Ziqiang, P.

    2004-01-01

    As viewed from the standpoint of radiation protection practice, it is necessary that the current system of radiological protection should be made more simple and coherent. The human-based protective measures alone are far from having met the requirements of environmental protection in many circumstances. Protecting the environment from ionising radiation would be implicated in radiation protection. Collective dose is an useful indicator, of which applicable extent should be defined. Using such an quantity could help improve radiation protection level, but applicable conditions should be indicated, temporal or spatial. Natural radiation is the largest contributor to the radiation exposure of human. Occupational exposure from natural radiation should be controlled, for occupations such as underground miners and air crew. Controlling both man-made and natural radiation exposure of pregnant women and children needs to be enhanced, especially radiological diagnosis and treatment. China radiation protection community, as a whole, is paying considerable attention to the ICRP's new Recommendations. Prof. Clarke's article 'A Report on Progress towards New Recommendations', a communication from the International Commission on Radiological Protection, has been translated into Chinese and published on Radiation Protection, the Official Journal of China Radiation Protection Society with a view of intensifying awareness of the new Recommendations within more radiation protection workers and people concerned. In addition, a special meeting was convened in early 2002 to address the comments on the new Recommendations. (author)

  1. The OME Framework for genome-scale systems biology

    Energy Technology Data Exchange (ETDEWEB)

    Palsson, Bernhard O. [Univ. of California, San Diego, CA (United States); Ebrahim, Ali [Univ. of California, San Diego, CA (United States); Federowicz, Steve [Univ. of California, San Diego, CA (United States)

    2014-12-19

    The life sciences are undergoing continuous and accelerating integration with computational and engineering sciences. The biology that many in the field have been trained on may be hardly recognizable in ten to twenty years. One of the major drivers for this transformation is the blistering pace of advancements in DNA sequencing and synthesis. These advances have resulted in unprecedented amounts of new data, information, and knowledge. Many software tools have been developed to deal with aspects of this transformation and each is sorely needed [1-3]. However, few of these tools have been forced to deal with the full complexity of genome-scale models along with high throughput genome- scale data. This particular situation represents a unique challenge, as it is simultaneously necessary to deal with the vast breadth of genome-scale models and the dizzying depth of high-throughput datasets. It has been observed time and again that as the pace of data generation continues to accelerate, the pace of analysis significantly lags behind [4]. It is also evident that, given the plethora of databases and software efforts [5-12], it is still a significant challenge to work with genome-scale metabolic models, let alone next-generation whole cell models [13-15]. We work at the forefront of model creation and systems scale data generation [16-18]. The OME Framework was borne out of a practical need to enable genome-scale modeling and data analysis under a unified framework to drive the next generation of genome-scale biological models. Here we present the OME Framework. It exists as a set of Python classes. However, we want to emphasize the importance of the underlying design as an addition to the discussions on specifications of a digital cell. A great deal of work and valuable progress has been made by a number of communities [13, 19-24] towards interchange formats and implementations designed to achieve similar goals. While many software tools exist for handling genome

  2. Towards an evaluation framework for complex social systems

    Science.gov (United States)

    McDonald, Diane M.; Kay, Nigel

    While there is growing realisation that the world in which we live in is highly complex with multiple interdependencies and irreducibly open to outside influence, how to make these 'systems' more manageable is still a significant outstanding issue. As (2004) suggests, applying the theoretical principles of Complex Systems may help solve complex problems in this complex world. While Bar-Yam provides examples of forward-thinking organisations which have begun to see the relevance of complex systems principles, for many organisations the language and concepts of complexity science such as self-organisation and unpredictability while they make theoretical sense offer no practical or acceptable method of implementation to those more familiar with definitive facts and classical hierarchical, deterministic approaches to control. Complexity Science explains why designed systems or interventions may not function as anticipated in differing environments, without providing a silver bullet which enables control or engineering of the system to ensure the desired results. One familiar process which might, if implemented with complex systems in mind, provide the basis of an accessible and understandable framework that enables policy makers and practitioners to better design and manage complex socio-technical systems is that of evaluation.

  3. 44 CFR 65.14 - Remapping of areas for which local flood protection systems no longer provide base flood protection.

    Science.gov (United States)

    2010-10-01

    ... local flood protection systems no longer provide base flood protection. 65.14 Section 65.14 Emergency... § 65.14 Remapping of areas for which local flood protection systems no longer provide base flood... process of restoring a flood protection system that was: (i) Constructed using Federal funds; (ii...

  4. Implementation of a radiation protection framework for medical and dental X-ray diagnostic services in Minas Gerais/Brazil

    International Nuclear Information System (INIS)

    Silva, Teogenes A. da; Pereira, Elton G.; Nogueira, Maria do S.; Ferreira, Hudson R.; Alonso, Thessa C.; Castro, Jose G.L. de; Andrade, Mauricio C.; Joana, Georgia S.; Oliveira, Mauricio de; Cezar, Adriana C. Z.

    2008-01-01

    The Brazilian Sanitary Vigilance Agency is the regulatory authority for radiation protection and quality control of all practices with X-rays for diagnostic purpose. In 1998, the technical regulation 'Guidelines for Radiation Protection in Medical and Dental Radiodiagnostic' was issued by the government that reflected the most updated policy recommended by the International Basic Safety Standards for Protection against Ionizing Radiation. To accomplish the objective of improving radiation protection conditions in the state of Minas Gerais, the Development Centre of Nuclear Technology (CDTN) and the Superintendence of Sanitary Vigilance (SVS) signed a formal cooperation agreement that included: an accreditation process for radiation protection professionals, a follow-up program of the services provided by those professionals, technical support from CDTN for audits carried out by SVS and training of SVS inspectors. Actions to improve and assure metrological reliability of the radiation measurements and special attention to mammography services were done. This paper provides details and results of the radiation protection framework for X-ray radiodiagnostic services in Minas Gerais; the success of the adopted model suggests that it can be used as a basic model to other regions. (author)

  5. A New Physical Protection System Design and Evaluation Process

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Heoksoon; Kim, Myungsu; Bae, Yeongkyoung; Na, Janghwan [KHNP-CRI, Daejeon (Korea, Republic of)

    2014-10-15

    International Atomic Energy Agency(IAEA) had established security-related department and has been strengthening security measures against possible sabotage. IAEA enforces the recommendations for the physical protection of NPPs in the INFCIRC/ 225/Rev.5 to the member states and U.S. NRC also enforces the similar requirements in 10 CFR 73.55. Thus, in order to let Korean NPPs meet the new requirements in INFCIRC/225/Rev.5 or U.S. NRC requirements, Korea nuclear licensee should develop or establish appropriate physical protection system (PPS) design methods for the physical protection of the operating NPPs and new NPPs. KHNP is doing the project of 'Development of APR1400 Physical Protection System Design (2012- 2015, KHNP/KAERI /KEPCO E-C)'. This paper describes overview of a physical protection system (PPS) design and evaluation for an advanced nuclear power plant. It found that a new physical protection system (PPS)design and evaluation. KHNP is doing the project of Physical Protection System design according to U.S. NRC requirements and IAEA requirements in INFCIRC /225 /Rev.5 and will complete by 7.31, 2015 for development of APR1400 Physical Protection System. After completing this project, the results of project are expected to apply new NPPs.

  6. Quantitative evaluation of physical protection system in nuclear power plant

    International Nuclear Information System (INIS)

    Sun Yahua; Li Bin; Li Shiju

    2009-01-01

    Based on the prompt detection analysis, this paper introduced one analysis model of intrusion path in nuclear power plant by means of morphology analysis and developed the evaluation software for path model analysis of physical protection system. Quantitative analysis on three elements (detection, delay, and response) of physical protection system was presented with an imaginary intrusion event example in Mac Arthur nuclear center. The results indicated that the path prompt detection analysis worked effectively to find the weak point of the physical protection system in NPP, and meantime we can also get the high cost-effectiveness improved measures. It is an effective approach to evaluate the overall performance of the system. (authors)

  7. Tuning pathological brain oscillations with neurofeedback: A systems neuroscience framework

    Directory of Open Access Journals (Sweden)

    Tomas eRos

    2014-12-01

    Full Text Available Neurofeedback is emerging as a promising technique that enables self-regulation of ongoing brain oscillations. However, despite a rise in empirical evidence attesting to its clinical benefits, a solid theoretical basis is still lacking on the manner in which neurofeedback is able to achieve these outcomes. The present work attempts to bring together various concepts from neurobiology, engineering, and dynamical systems so as to propose a contemporary theoretical framework for the mechanistic effects of neurofeedback. The objective is to provide a firmly neurophysiological account of neurofeedback, which goes beyond traditional behaviorist interpretations that attempt to explain psychological processes solely from a descriptive standpoint whilst treating the brain as a ‘black box’. To this end, we interlink evidence from experimental findings that encompass a broad range of intrinsic brain phenomena: starting from ‘bottom-up’ mechanisms of neural synchronization, followed by ‘top-down’ regulation of internal brain states, moving to dynamical systems plus control-theoretic principles, and concluding with activity-dependent as well as homeostatic forms of brain plasticity. In support of our framework, we examine the effects of neurofeedback in several brain disorders, including attention-deficit hyperactivity (ADHD and post-traumatic stress disorder (PTSD. The central thesis put forward is that neurofeedback tunes brain oscillations toward a homeostatic set-point which maintains optimal network flexibility and stability (i.e. self-organized criticality.

  8. A Framework of Performance Measurement System for Manufacturing Company

    Directory of Open Access Journals (Sweden)

    Dermawan Wibisono

    2012-04-01

    Full Text Available In the current dynamic environment, measuring a company’s performance becomes exceedingly complex since Performance Measurements Systems (PMS not only measure a company’s performance but also reflect their organizational culture and philosophy. Designing and implementing PMS is an integral part of management control systems. However, traditional PMS are criticized for being obsolete, irrelevant to managerial decisionmaking, unrelated to strategic objectives and detrimental to organizational improvements. Given the shortcomings of traditional PMS, there is need for a new framework that canlead to the design of a PMS that balances short-term and long-term measures, internal and external measures, and financial and operational measures. This paper presents issuesassociated with the needs of a dynamic PMS, observe past research achievements in PMS and review past PMS frameworks that have been introduced. The paper then proposes animproved methodology for the design of a realistic PMS and its effective implementation in a manufacturing environment with case for Indonesia’s company.

  9. A Framework of Performance Measurement System for Manufacturing Company

    Directory of Open Access Journals (Sweden)

    Dermawan Wibisono

    2011-10-01

    Full Text Available In the current dynamic environment, measuring a company’s performance becomes exceedingly complex since Performance Measurements Systems (PMS not only measure a company’s performance but also reflect their organizational culture and philosophy. Designing and implementing PMS is an integral part of management control systems. However, traditional PMS are criticized for being obsolete, irrelevant to managerial decision making, unrelated to strategic objectives and detrimental to organizational improvements. Given the shortcomings of traditional PMS, there is need for a new framework that can lead to the design of a PMS that balances short-term and long-term measures, internal and external measures, and financial and operational measures. This paper presents issues associated with the needs of a dynamic PMS, observe past research achievements in PMS and review past PMS frameworks that have been introduced. The paper then proposes an improved methodology for the design of a realistic PMS and its effective implementation in a manufacturing environment with case for Indonesia’s company.

  10. EMP protection procedure for electrical/electronic systems

    International Nuclear Information System (INIS)

    Latorre, V.R.

    1976-01-01

    This paper presents a procedure for the protection engineer to follow in assessing a system with respect to its susceptibility to an electromagnetic pulse (EMP), and in determining whether the system requires protection. If the system is determined to be vulnerable to EMP, the procedure also indicates how to decide upon the most suitable protection scheme. The discussion centers on two flow charts, which illustrate the step-by-step procedure which utilizes the necessary ingredients of EMP protection engineering discussed in a previous paper. The description of the protection procedure is divided into two parts: the first dealing with issues on the macroscopic or large-scale system level, while the second is concerned with operations on the subsystem level or lower

  11. Architecture and Fault Identification of Wide-area Protection System

    Directory of Open Access Journals (Sweden)

    Yuxue Wang

    2012-09-01

    Full Text Available Wide-area protection system (WAPS is widely studied for the purpose of improvng the performance of conventional backup protection. In this paper, the system architecture of WAPS is proposed and its key technologies are discussed in view of engineering projects. So a mixed structurecentralized-distributed structure which is more suitable for WAPS in limited power grid region, is obtained based on the advantages of the centralized structure and distributed structure. Furthermore, regional distance protection algorithm was taken as an example to illustrate the functions of the constituent units. Faulted components can be detected based on multi-source imformation fuse in the algorithm. And the algorithm cannot only improve the selectivity, the rapidity, and the reliability of relaying protection but also has high fault tolerant capability. A simulation of 220 kV grid systems in Easter Hubei province shows the effectiveness of the wide-area protection system presented by this paper.

  12. New measuring and protection system at VR-1 training reactor

    International Nuclear Information System (INIS)

    Kropik, M.; Jurickova, M.

    2006-01-01

    The contribution describes the new measuring and protection system of the VR-1 training reactor. The measuring and protection system upgrade is an integral part of the reactor I and C upgrade. The new measuring and protection system of the VR-1 reactor consists of the operational power measuring and the independent power protection systems. Both systems measure the reactor power and power rate, initiate safety action if safety limits are exceeded and send data (power, power rate, status, etc.) to the reactor control system. The operational power measuring system is a full power range system that receives signal from a fission chamber. The signal is evaluated according to the reactor power either in the pulse or current mode. The current mode utilizes the DC current and Campbell techniques. The new independent power protection system operates in the two highest reactor power decades. It receives signals from a boron chamber and evaluates it in the pulse mode. Both systems are computer based. The operational power measuring and independent power protection systems are diverse - different types and location of chambers, completely different hardware, software algorithms for the power and power rate calculations, software development tools and teems for the software manufacturing. (author)

  13. Protection of Distribution Systems with Distributed Energy Resources

    DEFF Research Database (Denmark)

    Bak-Jensen, Birgitte; Browne, Matthew; Calone, Roberto

    of 17 months of work of the Joint Working Group B5/C6.26/CIRED “Protection of Distribution Systems with Distributed Energy Resources”. The working group used the CIGRE report TB421 “The impact of Renewable Energy Sources and Distributed Generation on Substation Protection and Automation”, published...... by WG B5.34 as the entry document for the work on this report. In doing so, the group aligned the content and the scope of this report, the network structures considered, possible islanding, standardized communication and adaptive protection, interface protection, connection schemes and protection...... are listed (chapter 3). The first main part of the report starts with a summary of the backgrounds on DER and current practices in protection at the distribution level (chapter 4). This chapter contains an analysis of CIGRE TB421, protection relevant characteristics of DER, a review of current practices...

  14. Discussion on some problems in evolution of radiation protection system

    International Nuclear Information System (INIS)

    Pan Ziqiang

    2003-01-01

    In radiation protection practice in China, the appropriate simplification and better coordination for the existing radiation protection system are necessary. The human-based protective measures alone could not meet the requirements of the environmental protection in many circumstances. Protecting the environment from ionizing radiation would be implicated in radiation protection. Collective dose is an useful index, its applicable scope should be well defined. Using such an quantity can help increase radiation protection level, but applicable conditions should be defined, such as time and space. Natural radiation is the largest contributor of the radiation exposure to human. Occupational exposure from natural radiation should be controlled, such as to underground miners and air crew. Controlling both man-made and natural radiation exposure to pregnant women and children needs to be enhanced, especially radiological diagnosis and therapy

  15. Reliability analysis of protection system of advanced pressurized water reactor - APR 1400

    International Nuclear Information System (INIS)

    Varde, P. V.; Choi, J. G.; Lee, D. Y.; Han, J. B.

    2003-04-01

    Reliability analysis was carried out for the protection system of the Korean Advanced Pressurized Water Reactor - APR 1400. The main focus of this study was the reliability analysis of digital protection system, however, towards giving an integrated statement of complete protection reliability an attempt has been made to include the shutdown devices and other related aspects based on the information available to date. The sensitivity analysis has been carried out for the critical components / functions in the system. Other aspects like importance analysis and human error reliability for the critical human actions form part of this work. The framework provided by this study and the results obtained shows that this analysis has potential to be utilized as part of risk informed approach for future design / regulatory applications

  16. Framework for generating expert systems to perform computer security risk analysis

    International Nuclear Information System (INIS)

    Smith, S.T.; Lim, J.J.

    1985-01-01

    At Los Alamos we are developing a framework to generate knowledge-based expert systems for performing automated risk analyses upon a subject system. The expert system is a computer program that models experts' knowledge about a topic, including facts, assumptions, insights, and decision rationale. The subject system, defined as the collection of information, procedures, devices, and real property upon which the risk analysis is to be performed, is a member of the class of systems that have three identifying characteristics: a set of desirable assets (or targets), a set of adversaries (or threats) desiring to obtain or to do harm to the assets, and a set of protective mechanisms to safeguard the assets from the adversaries. Risk analysis evaluates both vulnerability to and the impact of successful threats against the targets by determining the overall effectiveness of the subject system safeguards, identifying vulnerabilities in that set of safeguards, and determining cost-effective improvements to the safeguards. As a testbed, we evaluate the inherent vulnerabilities and risks in a system of computer security safeguards. The method considers safeguards protecting four generic targets (physical plant of the computer installation, its hardware, its software, and its documents and displays) against three generic threats (natural hazards, direct human actions requiring the presence of the adversary, and indirect human actions wherein the adversary is not on the premises-perhaps using such access tools as wiretaps, dialup lines, and so forth). Our automated procedure to assess the effectiveness of computer security safeguards differs from traditional risk analysis methods

  17. A Decision Framework to Protect Coral Reefs in Guánica Bay, Puerto Rico

    Science.gov (United States)

    A Watershed Management Plan (WMP) for Guánica Bay, Puerto Rico, was introduced in 2008 by a nonprofit organization, the Center for Watershed Protection, with the intent of protecting coral reefs from damage related to watershed discharges. The plan was initially generated with th...

  18. LEA in Private: A Privacy and Data Protection Framework for a Learning Analytics Toolbox

    Science.gov (United States)

    Steiner, Christina M.; Kickmeier-Rust, Michael D.; Albert, Dietrich

    2016-01-01

    To find a balance between learning analytics research and individual privacy, learning analytics initiatives need to appropriately address ethical, privacy, and data protection issues. A range of general guidelines, model codes, and principles for handling ethical issues and for appropriate data and privacy protection are available, which may…

  19. Learning Frameworks for Cooperative Spectrum Sensing and Energy-Efficient Data Protection in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Vinh Quang Do

    2018-05-01

    Full Text Available This paper studies learning frameworks for energy-efficient data communications in an energy-harvesting cognitive radio network in which secondary users (SUs harvest energy from solar power while opportunistically accessing a licensed channel for data transmission. The SUs perform spectrum sensing individually, and send local decisions about the presence of the primary user (PU on the channel to a fusion center (FC. We first design a new cooperative spectrum-sensing technique based on a convolutional neural network in which the FC uses historical sensing data to train the network for classification problem. The system is assumed to operate in a time-slotted manner. At the beginning of each time slot, the FC uses the current local decisions as input for the trained network to decide whether the PU is active or not in that time slot. In addition, legitimate transmissions can be vulnerable to a hidden eavesdropper, which always passively listens to the communication. Therefore, we further propose a transfer learning actor–critic algorithm for an SU to decide its operation mode to increase the security level under the constraint of limited energy. In this approach, the SU directly interacts with the environment to learn its dynamics (i.e., an arrival of harvested energy; then, the SU can either stay idle to save energy or transmit to the FC secured data that are encrypted using a suitable private-key encryption method to maximize the long-term effective security level of the network. We finally present numerical simulation results under various configurations to evaluate our proposed schemes.

  20. Systems Reliability Framework for Surface Water Sustainability and Risk Management

    Science.gov (United States)

    Myers, J. R.; Yeghiazarian, L.

    2016-12-01

    With microbial contamination posing a serious threat to the availability of clean water across the world, it is necessary to develop a framework that evaluates the safety and sustainability of water systems in respect to non-point source fecal microbial contamination. The concept of water safety is closely related to the concept of failure in reliability theory. In water quality problems, the event of failure can be defined as the concentration of microbial contamination exceeding a certain standard for usability of water. It is pertinent in watershed management to know the likelihood of such an event of failure occurring at a particular point in space and time. Microbial fate and transport are driven by environmental processes taking place in complex, multi-component, interdependent environmental systems that are dynamic and spatially heterogeneous, which means these processes and therefore their influences upon microbial transport must be considered stochastic and variable through space and time. A physics-based stochastic model of microbial dynamics is presented that propagates uncertainty using a unique sampling method based on artificial neural networks to produce a correlation between watershed characteristics and spatial-temporal probabilistic patterns of microbial contamination. These results are used to address the question of water safety through several sustainability metrics: reliability, vulnerability, resilience and a composite sustainability index. System reliability is described uniquely though the temporal evolution of risk along watershed points or pathways. Probabilistic resilience describes how long the system is above a certain probability of failure, and the vulnerability metric describes how the temporal evolution of risk changes throughout a hierarchy of failure levels. Additionally our approach allows for the identification of contributions in microbial contamination and uncertainty from specific pathways and sources. We expect that this

  1. IEPLC Framework, Automated Communication in a Heterogeneous Control System Environment

    CERN Document Server

    Locci, F

    2014-01-01

    In CERN accelerators control system several components are essential such as: Programmable Logic Controller (PLC), PCI Extensions for Instrumentation (PXI), and other micro-controller families. Together with their weaknesses and their strength points they typically present custom communication protocols and it is therefore difficult to federate them into the control system using a single communication strategy. Furthermore this dependency to the physical device interfaces and protocols makes most of the code not reusable and the replacement of old technology a difficult problem. The purpose of IEPLC ([1]) is to mitigate the communication issues given by this heterogeneity; it proposes a framework to define communication interfaces in a hardware independent manner. In addition it automatically generates all the resources needed on master side (typically represented by a FEC: Front-End Computer) and slave side (typically represented by the controller) to implement a common and generic Ethernet communication. Th...

  2. A Cause-Consequence Chart of a Redundant Protection System

    DEFF Research Database (Denmark)

    Nielsen, Dan Sandvik; Platz, O.; Runge, B.

    1975-01-01

    A cause-consequence chart is applied in analysing failures of a redundant protection system (a core spray system in a nuclear power plant). It is shown how the diagram provides a basis for calculating two probability measures for malfunctioning of the protection system. The test policy of compone...... of components is taken into account. The possibility of using parameter variation as a basis for the choice of test policy is indicated.......A cause-consequence chart is applied in analysing failures of a redundant protection system (a core spray system in a nuclear power plant). It is shown how the diagram provides a basis for calculating two probability measures for malfunctioning of the protection system. The test policy...

  3. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  4. Practical Approach on Lightning and Grounding Protection System

    OpenAIRE

    Shan Jose Varghese

    2015-01-01

    Lightning Protection and Grounding of Electrical and Mechanical equipment’s for the Protection of the Human Beings, Structure of the building and equipment protection, safe working of the Worker at Industry as per my latest practical knowledge in the site environment in extreme climatic condition of low lying areas of the Gulf Region in the challenging projects. All the conductor calculation, Lightning Risk Factor calculations, all the system information regarding the ...

  5. Annexes to the lecture on reactor protection system including engineered features actuation system

    International Nuclear Information System (INIS)

    Palmaers, W.

    1982-01-01

    The present paper deals with the fundamentals for a reactor protection system and discusses the following topics: - System lay-out - Analog measured data acquisition - Analog measured data processing - Limit value generation and logical gating - Procesing of the reactor protection actuation signals - Decoupling of the reactor protection system - Mechanical lay-out - Monitoring system and - Emergency control station. (orig./RW)

  6. The new control system of J-TEXT divertor power supply system using J-TEXT real-time framework

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Ming; Zheng, Guozhen; Chen, Zhi [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China); College of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074 (China); Zheng, Wei, E-mail: zhengwei@hust.edu.cn [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China); College of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074 (China); Yuan, Tao; Li, Yang [State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Huazhong University of Science and Technology, Wuhan 430074 (China); College of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074 (China)

    2016-11-15

    Highlights: • The most highlight of this paper is the J-TEXT Real-Time Framework (JRTF). JRTF is a flexible real-time software framework which allows users to develop real-time applications rapidly without compromise on the performance. It makes a clear separation between control functions and hard/software administration, developers just need to focus on the control logic and algorithms. • The JRTF based control system can achieve a precise control loop cycle of 1 ms and a jitter under 0.01 ms on Linux operation system. The real-time performance meets the requirement of the real-time control tasks in J-TEXT. • Several days of operation with no faults were already achieved with the system running and in real-time 8 h per day. The stability of the new system is qualified for discharging experiment. - Abstract: The J-TEXT divertor power supply system is designed as a parallel connection, 12-pulse rectifier which is powered by a 100 MVA pulse generator unit. To achieve robust current feedback control, high performance real-time control system is required. The new control system adopts a more powerful software framework named J-TEXT real-time framework (JRTF). JRTF is a flexible real-time software framework designed for the implementation of real-time control systems. A JRTF application contains various Application Blocks (AB) which execute specific functions such as feedback computing and protection. JRTF is compatible with ITER standard PFC (Plant Fast Controller) hardware and ITER CODAC (Control, Data Access and Communication) Core software, so it can be monitored and configured by any EPICS based control system. The hardware of the new control system is upgraded to standard ITER fast controller which are much faster and more reliable than former controllers. This control system is the first application of JRTF, and the result shows that the new control system is running properly and stably. It provides an instance for real-time control schemes in J-TEXT, and

  7. The new control system of J-TEXT divertor power supply system using J-TEXT real-time framework

    International Nuclear Information System (INIS)

    Zhang, Ming; Zheng, Guozhen; Chen, Zhi; Zheng, Wei; Yuan, Tao; Li, Yang

    2016-01-01

    Highlights: • The most highlight of this paper is the J-TEXT Real-Time Framework (JRTF). JRTF is a flexible real-time software framework which allows users to develop real-time applications rapidly without compromise on the performance. It makes a clear separation between control functions and hard/software administration, developers just need to focus on the control logic and algorithms. • The JRTF based control system can achieve a precise control loop cycle of 1 ms and a jitter under 0.01 ms on Linux operation system. The real-time performance meets the requirement of the real-time control tasks in J-TEXT. • Several days of operation with no faults were already achieved with the system running and in real-time 8 h per day. The stability of the new system is qualified for discharging experiment. - Abstract: The J-TEXT divertor power supply system is designed as a parallel connection, 12-pulse rectifier which is powered by a 100 MVA pulse generator unit. To achieve robust current feedback control, high performance real-time control system is required. The new control system adopts a more powerful software framework named J-TEXT real-time framework (JRTF). JRTF is a flexible real-time software framework designed for the implementation of real-time control systems. A JRTF application contains various Application Blocks (AB) which execute specific functions such as feedback computing and protection. JRTF is compatible with ITER standard PFC (Plant Fast Controller) hardware and ITER CODAC (Control, Data Access and Communication) Core software, so it can be monitored and configured by any EPICS based control system. The hardware of the new control system is upgraded to standard ITER fast controller which are much faster and more reliable than former controllers. This control system is the first application of JRTF, and the result shows that the new control system is running properly and stably. It provides an instance for real-time control schemes in J-TEXT, and

  8. Radiation protection of vitamins in aqueous systems

    International Nuclear Information System (INIS)

    Kishore, K.; Moorthy, P.N.; Rao, K.N.

    1976-01-01

    A study of the radiation induced decomposition of the B-group vitamins has been carried out in aqueous media at room temperature as well as in rigid matrices at low temperature. The detailed results on the effect of glucose and oxygen as protective additives at the different temperatures are presented in the case of Thiamine (Vitamin B 1 ). Comparative data are given on the extent of decomposition of this and other vitamins of the B-group at room temperature and at 193 K. The importance of these results in connection with the radiation sterilization of pharmaceutical preparations is indicated. (author)

  9. Radiation protection of vitamins in aqueous systems

    International Nuclear Information System (INIS)

    Kishore, K.; Moorthy, P.N.; Rao, K.N.

    1976-01-01

    Thiamine and other vitamins of the B complex group are highly sensitive to γ radiation in aqueous solution owing to their high reactivity with the primary species formed by radiolysis of water, viz. hydrated electrons and hydroxyl radicals. In order to protect these compounds from radiolytic degradation, nitrous oxide and oxygen have been used as scavengers for the hydrated electrons and glucose for the hydroxyl radicals. By comparison of uv spectra it is shown that the above vitamins do not undergo radiolytic degradation in presence of nitrous oxide and glucose or oxygen and glucose. The importance of these results in connection with the sterilization of vitamin preparations is discussed. (author)

  10. Distributed Power-Generation Systems and Protection

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Yang, Yongheng; Yang, Dongsheng

    2017-01-01

    the challenging issues and, more importantly, to leverage the energy generation, stringent demands from both utility operators and consumers have been imposed on the DPGS. Furthermore, as the core of energy conversion, numerous power electronic converters employing advanced control techniques have been developed...... for the DPGS to consolidate the integration. In light of the above, this paper reviews the power-conversion and control technologies used for DPGSs. The impacts of the DPGS on the distributed grid are also examined, and more importantly, strategies for enhancing the connection and protection of the DPGS...

  11. Design principles for radiological protection instrumentation systems

    International Nuclear Information System (INIS)

    Wells, F.H.; Powell, R.G.

    1981-02-01

    This Code of Practice takes the form of recommendations intended for designers and installers of Radiological Protection Instrumentation, and should also be of value to the newcomer to the R.P.I. field. Topics are discussed under the following headings: outline of R.P.I. requirements, specifying the requirement, satisfying the requirements, (overall design, availability and reliability, information display, human factors, power supplies, manufacture, quality assurance, testing, and cost analysis), supply, location and operation of the equipment, importance of documentation. (U.K.)

  12. Criminal law repercussions on the Civil Protection System

    Science.gov (United States)

    Altamura, M.; Musso, L.

    2009-09-01

    The legal systems of our Countries provide the citizenship with a high level of protection. Personal safety and the protection of property are guaranteed by the State through organized structures among which we can include the Civil Protection. The progress of science and technology has greatly improved monitoring tools, currently used by the Civil Protection, which allow, to a certain extent, to predict and prevent risk and natural hazards. The assertion of an individual right, which in some cases has reached a constitutional rank, to benefit from Civil Protection services and the widespread perception throughout the citizenship of the competence of the system to prevent disasters, often causes people to take legal action against Civil Protection authorities should they fail in their duties to protect. However, the attempt of having both recognized an economic compensation for the suffered loss and the punishment of those whom misled, frequently undergoes criminal law. This process could have results that may jeopardize the effectiveness of Civil Protection service without meeting citizens’ demands. A dual effort is thus necessary in order to solve such a problem. On the one hand, an interdisciplinary knowledge needs to pervade criminal law in an attempt to relieve its self-referentiality and pretended supremacy. On the other hand an alternative, and more agile, system -such as civil or administrative law- has to be identified in order to respond to the legitimate requests for protection in the case of a faulty behaviour of the authorities.

  13. Framework for Certification of Fish Propagation, Protection and Monitoring Facilities. Final Report.

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, Thomas J.; Costello, Ronald J.

    1997-06-01

    A conceptual framework for certification of fish production and monitoring facilities including software templates to expedite implementation of the framework are presented. The framework is based on well established and widely utilized project management techniques. The implementation templates are overlays for Microsoft Professional Office software products: Excel, Word, and Project. Use of the software templates requires Microsoft Professional Office. The certification framework integrates two classical project management processes with a third process for facility certification. These processes are: (1) organization and definition of the project, (2) acquisition and organization of project documentation, and (3) facility certification. The certification process consists of systematic review of the production processes and the characteristics of the produced product. The criteria for certification review are the plans and specifications for the products and production processes that guided development of the facility. The facility is certified when the production processes are operating as designed and the product produced meets specifications. Within this framework, certification is a performance based process, not dissimilar from that practiced in many professions and required for many process, or a product meets professional/industry standards of performance. In the case of fish production facilities, the certifying authority may be diffuse, consisting of many entities acting through a process such as NEPA. A cornerstone of certification is accountability, over the long term, for the operation and products of a facility. This is particularly important for fish production facilities where the overall goal of the facility may require decades to accomplish.

  14. A generic finite state machine framework for the ACNET control system

    International Nuclear Information System (INIS)

    Carmichael, L.; Warner, A.

    2009-01-01

    A significant level of automation and flexibility has been added to the ACNET control system through the development of a Java-based Finite State Machine (FSM) infrastructure. These FSMs are integrated into ACNET and allow users to easily build, test and execute scripts that have full access to ACNET's functionality. In this paper, a description will be given of the FSM design and its ties to the Java-based Data Acquisition Engine (DAE) framework. Each FSM is part of a client-server model with FSM display clients using Remote Method Invocation (RMI) to communicate with DAE servers heavily coupled to ACNET. A web-based monitoring system that allows users to utilize browsers to observe persistent FSMs will also be discussed. Finally, some key implementations such as the crash recovery FSM developed for the Electron Cooling machine protection system will be presented.

  15. Systemic Thinking in Career Development Theory: Contributions of the Systems Theory Framework

    Science.gov (United States)

    McMahon, Mary; Patton, Wendy

    2018-01-01

    This article considers systemic thinking in relation to the Systems Theory Framework (STF) and to career theory. An overview of systems theory and its applications is followed by a discussion of career theory to provide a context for the subsequent description of STF. The contributions of STF to career theory and to theory integration are…

  16. Sustainable Water Systems for the City of Tomorrow—A Conceptual Framework

    Directory of Open Access Journals (Sweden)

    Xin (Cissy Ma

    2015-09-01

    Full Text Available Urban water systems are an example of complex, dynamic human–environment coupled systems which exhibit emergent behaviors that transcend individual scientific disciplines. While previous siloed approaches to water services (i.e., water resources, drinking water, wastewater, and stormwater have led to great improvements in public health protection, sustainable solutions for a growing global population facing increased resource constraints demand a paradigm shift based on holistic management to maximize the use and recovery of water, energy, nutrients, and materials. The objective of this review paper is to highlight the issues in traditional water systems including water demand and use, centralized configuration, sewer collection systems, characteristics of mixed wastewater, and to explore alternative solutions such as decentralized water systems, fit for purpose and water reuse, natural/green infrastructure, vacuum sewer collection systems, and nutrient/energy recovery. This review also emphasizes a system thinking approach for evaluating alternatives that should include sustainability indicators and metrics such as emergy to assess global system efficiency. An example paradigm shift design for urban water system is presented, not as the recommended solution for all environments, but to emphasize the framework of system-level analysis and the need to visualize water services as an organic whole. When water systems are designed to maximize the resources and optimum efficiency, they are more prevailing and sustainable than siloed management because a system is more than the sum of its parts.

  17. Discussion on radiation protection system from ethical issues

    International Nuclear Information System (INIS)

    Li, Xutong; Guo, Qiuju

    2002-01-01

    This paper discussed the relationship between radiation protection system and ethical principle, viz. equity and efficiency. According to the authors' opinions, the main problem that the system of radiation protection facing now is the dose-limitation principle cannot incarnate the equity principle completely. Even though the distinguishing between practice and intervention is no other than solving the problem, but the scheme is not perfect still. Ethical issues should be given more attention and be more researched when we try to modify the radiation protection system today

  18. A Proposed Business Intelligent Framework for Recommender Systems

    Directory of Open Access Journals (Sweden)

    Sitalakshmi Venkatraman

    2017-11-01

    Full Text Available In this Internet age, recommender systems (RS have become popular, offering new opportunities and challenges to the business world. With a continuous increase in global competition, e-businesses, information portals, social networks and more, websites are required to become more user-centric and rely on the presence and role of RS in assisting users in better decision making. However, with continuous changes in user interests and consumer behavior patterns that are influenced by easy access to vast information and social factors, raising the quality of recommendations has become a challenge for recommender systems. There is a pressing need for exploring hybrid models of the five main types of RS, namely collaborative, demographic, utility, content and knowledge based approaches along with advancements in Big Data (BD to become more context-aware of the technology and social changes and to behave intelligently. There is a gap in literature with a research focus in this direction. This paper takes a step to address this by exploring a new paradigm of applying business intelligence (BI concepts to RS for intelligently responding to user changes and business complexities. A BI based framework adopting a hybrid methodology for RS is proposed with a focus on enhancing the RS performance. Such a business intelligent recommender system (BIRS can adopt On-line Analytical Processing (OLAP tools and performance monitoring metrics using data mining techniques of BI to enhance its own learning, user profiling and predictive models for making a more useful set of personalised recommendations to its users. The application of the proposed framework to a B2C e-commerce case example is presented.

  19. Developing a sustainability framework for the assessment of bioenergy systems

    International Nuclear Information System (INIS)

    Elghali, Lucia; Clift, Roland; Sinclair, Philip; Panoutsou, Calliope; Bauen, Ausilio

    2007-01-01

    The potential for biomass to contribute to energy supply in a low-carbon economy is well recognised. However, for the sector to contribute fully to sustainable development in the UK, specific exploitation routes must meet the three sets of criteria usually recognised as representing the tests for sustainability: economic viability in the market and fiscal framework within which the supply chain operates; environmental performance, including, but not limited to, low carbon dioxide emissions over the complete fuel cycle; and social acceptability, with the benefits of using biomass recognised as outweighing any negative social impacts. This paper describes an approach to developing a methodology to establish a sustainability framework for the assessment of bioenergy systems to provide practical advice for policy makers, planners and the bioenergy industry, and thus to support policy development and bioenergy deployment at different scales. The approach uses multi-criteria decision analysis (MCDA) and decision-conferencing, to explore how such a process is able to integrate and reconcile the interests and concerns of diverse stakeholder groups

  20. APPLICATION FRAMEWORK IN ENGINEERING SERVICE ORIENTED ARCHITECTURE SYSTEM SERVICE

    Directory of Open Access Journals (Sweden)

    Ade Hodijah

    2017-03-01

    Full Text Available The Service Engineering (SE is understood as a framework to create innovative services in application development of information technology approach to Service Oriented Architecture (SOA. Implementing SOA is required methodology to identify services that can be used again in the application and organization of a company. in this research, software development model used is object-oriented methodologies, SOA itself is a collection consisting of tools, technologies, frameworks, and best practices that facilitate the implementation of a service quickly. in a study this uses the tools of Business Process Management System (BPMS to support the implementation of service-oriented software. the purpose of this study is to produce a model of activities and artifacts of the application software development models of the SE with a case study Rate Loans. Validation to the design of the model is done through testing of the software produced. The results showed that the application of the SE in the development of service-oriented software can use the object-oriented methodology by providing additional value-added analysis and redesign of business processes to be implemented on a BPMS. BPMS usage of the application of the SE on the SOA has the advantage of visualization in the management of business processes.

  1. Foundations for Protecting Renewable-Rich Distribution Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Ellis, Abraham [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Brahma, Sukumar [New Mexico State Univ., Las Cruces, NM (United States); Ranade, Satish [New Mexico State Univ., Las Cruces, NM (United States)

    2016-11-01

    High proliferation of Inverter Interfaced Distributed Energy Resources (IIDERs) into the electric distribution grid introduces new challenges to protection of such systems. This is because the existing protection systems are designed with two assumptions: 1) system is single-sourced, resulting in unidirectional fault current, and (2) fault currents are easily detectable due to much higher magnitudes compared to load currents. Due to the fact that most renewables interface with the grid though inverters, and inverters restrict their current output to levels close to the full load currents, both these assumptions are no longer valid - the system becomes multi-sourced, and overcurrent-based protection does not work. The primary scope of this study is to analyze the response of a grid-tied inverter to different faults in the grid, leading to new guidelines on protecting renewable-rich distribution systems.

  2. Distance Protection of Cross-Bonded Transmission Cable-Systems

    DEFF Research Database (Denmark)

    Bak, Claus Leth; F. Jensen, Christian

    2014-01-01

    In this paper the problems of protecting a cross-bonded cable system using distance protection are analysed. The combination of the desire to expand the high voltage transmission grid and the public's opinion towards new installations of overhead lines (OHL), more and more transmission cable syst...

  3. Centralized Coordination of Load Shedding & Protection System of Transmission Lines

    DEFF Research Database (Denmark)

    Hoseinzadeh, Bakhtyar; Bak, Claus Leth

    2018-01-01

    The power system integrity is vulnerable to thermal limit of transmission lines due to overloading and consequently activation of their protection devices following severe contingencies. In this paper, the loading rate of transmission lines is monitored online and is considered in the centralized......, over current protection....

  4. Selectivity of power system protections at power swings in power system

    Directory of Open Access Journals (Sweden)

    Jan Machowski

    2012-12-01

    Full Text Available The paper discusses out-of-step protection systems such as: generator pole slip protections, out of step tripping protections, distance protections of step-up transformer, distance protections of transmission lines and transformers, power swing blocking, and special out-of-step protection. It is shown that all these protections make up a protection system, to which a setting concept uniform for the entire power system has to be applied. If a power system is inappropriately equipped with these protections, or their settings are inappropriate, they may operate unselectively, thus contributing to the development of power system blackouts. In the paper the concepts for a real power system are given for the two stages: target stage fully compliant with selectivity criteria, and transitional stage between the current and target stages.

  5. Protection of personal information in South Africa: a framework for biometric data collection security

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-11-01

    Full Text Available personal information. Like many other countries, South Africa, in 2013 officially approved and enacted the Protection of Personal Information Act, which gives guidelines that should be followed when processing personal information. The Act regards biometric...

  6. The development of an international framework for the radiation protection of the environment

    International Nuclear Information System (INIS)

    Gonzalez, A.; Jova Sed, L.

    2004-01-01

    This paper comprises an overview of the Agency responsibilities, related to environmental radiation protection; its historical involvement in this issue; the context of its current work programme; and a number of issues for further consideration. (authors)

  7. A Risk-Free Protection Index Model for Portfolio Selection with Entropy Constraint under an Uncertainty Framework

    Directory of Open Access Journals (Sweden)

    Jianwei Gao

    2017-02-01

    Full Text Available This paper aims to develop a risk-free protection index model for portfolio selection based on the uncertain theory. First, the returns of risk assets are assumed as uncertain variables and subject to reputable experts’ evaluations. Second, under this assumption, combining with the risk-free interest rate we define a risk-free protection index (RFPI, which can measure the protection degree when the loss of risk assets happens. Third, note that the proportion entropy serves as a complementary means to reduce the risk by the preset diversification requirement. We put forward a risk-free protection index model with an entropy constraint under an uncertainty framework by applying the RFPI, Huang’s risk index model (RIM, and mean-variance-entropy model (MVEM. Furthermore, to solve our portfolio model, an algorithm is given to estimate the uncertain expected return and standard deviation of different risk assets by applying the Delphi method. Finally, an example is provided to show that the risk-free protection index model performs better than the traditional MVEM and RIM.

  8. Defra Soil Protection Research in the Context of the Soil Natural Capital / Ecosystem Services Framework

    OpenAIRE

    Robinson, David A.; Cooper, David; Emmett, Bridget A.; Evans, Chris D.; Keith, Aidan; Lebron, Inma; Lofts, Stephen; Norton, Lisa; Reynolds, Brian; Tipping, Edward; Rawlins, Barry G.; Tye, Andrew M.; Watts, Chris W.; Whalley, W. Richard; Black, Helaina I.J.

    2011-01-01

    Summary: "A Nation that destroys its soil destroys itself." This quote from, F.D. Roosevelt, 1937, from a letter written to all state Governors in the USA following the dust bowl, encapsulates the importance of soil protection. The dust bowl brought about legislation to protect and conserve soils as a fundamental natural resource in the USA between 1930 and 1936. In current times we are facing unprecedented pressure on land resources from multiple uses here in the UK and across Euro...

  9. Strengthening the human rights framework to protect breastfeeding: a focus on CEDAW

    OpenAIRE

    Galtry, Judith

    2015-01-01

    Background There have been recent calls for increased recognition of breastfeeding as a human right. The United Nations Convention on the Elimination of All Forms of Discrimination against Women, 1979 (CEDAW) is the core human rights treaty on women. CEDAW?s approach to breastfeeding is considered from an historical perspective. A comparison is drawn with breastfeeding protection previously outlined in the International Labour Organization?s Maternity Protection Convention, 1919 (ILO C3), and...

  10. The Order of Protection in the Romanian Legal System

    Directory of Open Access Journals (Sweden)

    Natalia Saharov

    2015-05-01

    Full Text Available The phenomenon of domestic violence, quite common in the countries of Eastern Europe, including Romania, can be perceived as a consequence of shortcomings in the education of person, or a faulty education. The aims of current study is to present and analyze the legal instruments designed in the area of civil law due to combat and prevent domestic violence, with a special regard to the protective order governed by the law No. 217/ 2003, as amended and republished. Legal provisions are analyzed with regarded to the person who may apply for order of protection, the conditions for the admissibility of the petition for the issuance of the protective order, the measures which may be imposed by an protection order, the duration of these measures, the conditions for revocation of the protective order etc. The study reveals the practical application of analyzed legal provisions, by referring to the decisions given by Romania courts in cases involving the “protective order”. Finally are exposed the advantages and shortcomings of normative framework already existing, as well as the effectiveness of the legal provisions in practice.

  11. Adaptive Overcurrent Protection for Microgrids in Extensive Distribution Systems

    DEFF Research Database (Denmark)

    Lin, Hengwei; Guerrero, Josep M.; Jia, Chenxi

    2016-01-01

    Microgrid is regarded as a new form to integrate the increasing penetration of distributed generation units (DGs) in the extensive distribution systems. This paper proposes an adaptive overcurrent protection strategy for a microgrid network. The protection coordination of the overcurrent relays...... measurements in another neural network model. Reconfigurations can be performed to modify the settings of the on-field relays to enhance the reliable operation for the different operational situations. The test results show that the adaptive overcurrent protection scheme with the assistance of estimation model...... can modify the protective settings for the new operation state accurately and intelligently....

  12. Real-Time Framework for Energy Management System of a Smart Microgrid Using Multiagent Systems

    Directory of Open Access Journals (Sweden)

    Roberto S. Netto

    2018-03-01

    Full Text Available This paper presents a framework to analyze the problem of real-time management of Smart Grids. For this purpose, the energy management is integrated with the power system through a telecommunication system. The use of Multiagent Systems (MAS leads the proposed algorithm to find the best-integrated solution, taking into consideration the operating scenario and the system characteristics. With this framework it was possible to evaluate the design of the energy management and the impact of the algorithm developed in the MAS. In the same way, the data sent from the power system to be used for energy management have a direct impact on his behavior. The proposed framework is tested with the help of a microgrid, so the results may be replicated.

  13. 75 FR 972 - Nomination of Existing Marine Protected Areas to the National System of Marine Protected Areas

    Science.gov (United States)

    2010-01-07

    ... Marine Protected Areas to the National System of Marine Protected Areas AGENCY: NOAA, Department of... Federal, State and territorial marine protected area programs to join the National System of Marine Protected Areas. SUMMARY: NOAA and the Department of the Interior (DOI) invited Federal, State, commonwealth...

  14. Titan TTCN-3 Based Test Framework for Resource Constrained Systems

    Directory of Open Access Journals (Sweden)

    Yushev Artem

    2016-01-01

    Full Text Available Wireless communication systems more and more become part of our daily live. Especially with the Internet of Things (IoT the overall connectivity increases rapidly since everyday objects become part of the global network. For this purpose several new wireless protocols have arisen, whereas 6LoWPAN (IPv6 over Low power Wireless Personal Area Networks can be seen as one of the most important protocols within this sector. Originally designed on top of the IEEE802.15.4 standard it is a subject to various adaptions that will allow to use 6LoWPAN over different technologies; e.g. DECT Ultra Low Energy (ULE. Although this high connectivity offers a lot of new possibilities, there are several requirements and pitfalls coming along with such new systems. With an increasing number of connected devices the interoperability between different providers is one of the biggest challenges, which makes it necessary to verify the functionality and stability of the devices and the network. Therefore testing becomes one of the key components that decides on success or failure of such a system. Although there are several protocol implementations commonly available; e.g., for IoT based systems, there is still a lack of according tools and environments as well as for functional and conformance testing. This article describes the architecture and functioning of the proposed test framework based on Testing and Test Control Notation Version 3 (TTCN-3 for 6LoWPAN over ULE networks.

  15. Framework for Design of Traceability System on Organic Rice Certification

    Science.gov (United States)

    Purwandoko, P. B.; Seminar, K. B.; Sutrisno; Sugiyanta

    2018-05-01

    Nowadays, the preferences of organic products such as organic rice have been increased. It because of the people awareness of the healthy and eco-friendly food product consumption has grown. Therefore, it is very important to ensure organic quality of the product that will be produced. Certification is a series of process that holds to ensure the quality of products meets all criteria of organic standards. Currently, there is a problem that traceability information system for organic rice certification has been not available. The current system still conducts manually caused the loss of information during storage process. This paper aimed at developing a traceability framework on organic rice certification process. First, the main discussed issues are organic certification process. Second, unified modeling language (UML) is used to build the model of user requirement in order to develop traceability system for all actors in the certification process. Furthermore, the information captured model along certification process will be explained in this paper. The model shows the information flow that has to be recorded for each actor. Finally, the challenges in the implementation system will be discussed in this paper.

  16. Integrated crop protection as a system approach

    NARCIS (Netherlands)

    Haan, de J.J.; Wijnands, F.G.; Sukkel, W.

    2005-01-01

    New farming systems in vegetable production are required as demands for high quality products that do not pollute the environment are rising, and production risks are large and incomes low. The methodology of prototyping new systems is described, especially the themes, parameters and target values

  17. Understanding of radiation protection in medicine. Pt. 2. Occupational exposure and system of radiation protection

    International Nuclear Information System (INIS)

    Iida, Hiroji; Yamamoto, Tomoyuki; Shimada, Yasuhiro

    1997-01-01

    Using a questionnaire we investigated whether radiation protection is correctly understood by medical doctors (n=140) and nurses (n=496). Although medical exposure is usually understood by medical doctors and dentists, their knowledge was found to be insufficient. Sixty-eight percent of medical doctors and 50% of dentists did not know about the system of radiation protection. Dose monitoring was not correctly carried out by approximately 20% of medical staff members, and medical personnel generally complained of anxiety about occupational exposure rather than medical exposure. They did not receive sufficient education on radiation exposure and protection in school. In conclusion, the results of this questionnaire suggested that they do not have adequate knowledge about radiation exposure and protection. The lack of knowledge about protection results in anxiety about exposure. To protect oneself from occupational exposure, individual radiation doses must be monitored, and medical practice should be reconsidered based on the results of monitoring. To eliminate unnecessary medical and occupational exposure and to justify practices such as radiological examinations, radiation protection should be well understood and appropriately carried out by medical doctors and dentists. Therefore, the education of medical students on the subject of radiation protection is required as is postgraduate education for medical doctors, dentists and nurses. (author)

  18. Internet of Things Based Combustible Ice Safety Monitoring System Framework

    Science.gov (United States)

    Sun, Enji

    2017-05-01

    As the development of human society, more energy is requires to meet the need of human daily lives. New energies play a significant role in solving the problems of serious environmental pollution and resources exhaustion in the present world. Combustible ice is essentially frozen natural gas, which can literally be lit on fire bringing a whole new meaning to fire and ice with less pollutant. This paper analysed the advantages and risks on the uses of combustible ice. By compare to other kinds of alternative energies, the advantages of the uses of combustible ice were concluded. The combustible ice basic physical characters and safety risks were analysed. The developments troubles and key utilizations of combustible ice were predicted in the end. A real-time safety monitoring system framework based on the internet of things (IOT) was built to be applied in the future mining, which provide a brand new way to monitoring the combustible ice mining safety.

  19. A Decision Fusion Framework for Treatment Recommendation Systems.

    Science.gov (United States)

    Mei, Jing; Liu, Haifeng; Li, Xiang; Xie, Guotong; Yu, Yiqin

    2015-01-01

    Treatment recommendation is a nontrivial task--it requires not only domain knowledge from evidence-based medicine, but also data insights from descriptive, predictive and prescriptive analysis. A single treatment recommendation system is usually trained or modeled with a limited (size or quality) source. This paper proposes a decision fusion framework, combining both knowledge-driven and data-driven decision engines for treatment recommendation. End users (e.g. using the clinician workstation or mobile apps) could have a comprehensive view of various engines' opinions, as well as the final decision after fusion. For implementation, we leverage several well-known fusion algorithms, such as decision templates and meta classifiers (of logistic and SVM, etc.). Using an outcome-driven evaluation metric, we compare the fusion engine with base engines, and our experimental results show that decision fusion is a promising way towards a more valuable treatment recommendation.

  20. Protecting HVAC systems from bio-terrorism.

    Science.gov (United States)

    Arterburn, Tom

    2003-01-01

    The FBI, in the wake of the September 11 attacks, issued an advisory to state and local law enforcement authorities and the public asking to remain especially alert to any unusual activities around ventilation systems. It noted that while the Bureau possessed no specific threats regarding the release of toxic chemicals into air handling systems, building owners and managers should be well-aware of the potential for contamination of such systems. This article presents recommendations of air-handling experts and associations for operators to consider.

  1. Kinetic Integrated Thermal Protection System (KnITPS)

    Data.gov (United States)

    National Aeronautics and Space Administration — Use the flexibility and shape formation possibilities inherent in knitting to form thermal protection systems that can be custom fitted to a heat shield carrier...

  2. NDE for Ablative Thermal Protection Systems, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — This program addresses the need for non-destructive evaluation (NDE) methods for quality assessment and defect evaluation of thermal protection systems (TPS),...

  3. NDE for Ablative Thermal Protection Systems, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — This program addresses the need for non-destructive evaluation (NDE) methods for quality assessment and defect evaluation of thermal protection systems (TPS). Novel...

  4. Thermal Protection System Materials (TPSM): 3D MAT

    Data.gov (United States)

    National Aeronautics and Space Administration — The 3D MAT Project seeks to design and develop a game changing Woven Thermal Protection System (TPS) technology tailored to meet the needs of the Orion Multi-Purpose...

  5. Short circuit protection for a power distribution system

    Science.gov (United States)

    Owen, J. R., III

    1969-01-01

    Sensing circuit detects when the output from a matrix is present and when it should be present. The circuit provides short circuit protection for a power distribution system where the selection of the driven load is accomplished by digital logic.

  6. CNSS: Interagency Partnering to Protect Our National Security Systems

    National Research Council Canada - National Science Library

    Grimes, John G

    2008-01-01

    .... The CNSS performs the vital function of mobilizing the full, interagency National Security Community for the protection of telecommunications and information systems that support U.S. national security...

  7. Monitoring, control and protection of interconnected power systems

    CERN Document Server

    Häger, Ulf; Voropai, Nikolai

    2014-01-01

    This book presents new tools and methods for monitoring, control and protection of large scale power systems, adapting Smart Grid technologies based on wide area data exchange in combination with modern measurement devices and advanced network controllers.

  8. A control system of radiation protection at HESYRL

    International Nuclear Information System (INIS)

    Li Yuxiong; Li Juexin; Ning Xinquan

    1990-01-01

    A control system for radiation protection at Hefei National Synchrotron Radiation Laboratory (HESYRL) consists of three parts. They are a personal radiation safety interlock system, an automatic environmental radiation monitoring system and a data logging and management system for area radiation monitoring. Two-year operating experiments have shown that this system is reasonably designed, reliable, high-sensitive and automatic. The design principle, construction and operating status of each part of the system are introduced

  9. Next generation framework for aquatic modeling of the Earth System

    Science.gov (United States)

    Fekete, B. M.; Wollheim, W. M.; Wisser, D.; Vörösmarty, C. J.

    2009-03-01

    Earth System model development is becoming an increasingly complex task. As scientists attempt to represent the physical and bio-geochemical processes and various feedback mechanisms in unprecedented detail, the models themselves are becoming increasingly complex. At the same time, the complexity of the surrounding IT infrastructure is growing as well. Earth System models must manage a vast amount of data in heterogeneous computing environments. Numerous development efforts are on the way to ease that burden and offer model development platforms that reduce IT challenges and allow scientists to focus on their science. While these new modeling frameworks (e.g. FMS, ESMF, CCA, OpenMI) do provide solutions to many IT challenges (performing input/output, managing space and time, establishing model coupling, etc.), they are still considerably complex and often have steep learning curves. The Next generation Framework for Aquatic Modeling of the Earth System (NextFrAMES, a revised version of FrAMES) have numerous similarities to those developed by other teams, but represents a novel model development paradigm. NextFrAMES is built around a modeling XML that lets modelers to express the overall model structure and provides an API for dynamically linked plugins to represent the processes. The model XML is executed by the NextFrAMES run-time engine that parses the model definition, loads the module plugins, performs the model I/O and executes the model calculations. NextFrAMES has a minimalistic view representing spatial domains and treats every domain (regardless of its layout such as grid, network tree, individual points, polygons, etc.) as vector of objects. NextFrAMES performs computations on multiple domains and interactions between different spatial domains are carried out through couplers. NextFrAMES allows processes to operate at different frequencies by providing rudimentary aggregation and disaggregation facilities. NextFrAMES was designed primarily for

  10. Control rod blow out protection system

    International Nuclear Information System (INIS)

    Dietrich, J.R.; Flinn, W.S.; Groves, M.D.

    1976-01-01

    A control system is described which is comprised of a plurality of low worth absorber elements with individual hydraulic actuator assemblies, positioned within the reactor vessel. Axial distortions and safety hazards are minimized by this arrangement. (E.C.B.)

  11. PAYROLL SYSTEM AND SOCIAL PROTECTION IN GERMANY

    Directory of Open Access Journals (Sweden)

    NĂSTASIE MIHAELA – ANDREEA

    2015-03-01

    Full Text Available Any payment system must establish a connection between the entity and the revenue performance of employees between the financial balance of the entity and needs to satisfy some needs of the individuals. A goal is not always easy to follow is to establish fairness in the workplace in relation to the report results. Even if the system is a fair wage, it is necessary that employees perceive and understand this. German economic success was achieved thanks to a competent management and an effort from employees, which is characterized by more order, competent and highly skilled, resulting in a competition between the management and the german economy. German management uses the tools of the pay system and the welfare system.

  12. Penetration testing protecting networks and systems

    CERN Document Server

    Henry, Kevin M

    2012-01-01

    This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization's computer systems.

  13. Computer-aided protective system (CAPS)

    International Nuclear Information System (INIS)

    Squire, R.K.

    1988-01-01

    A method of improving the security of materials in transit is described. The system provides a continuously monitored position location system for the transport vehicle, an internal computer-based geographic delimiter that makes continuous comparisons of actual positions with the preplanned routing and schedule, and a tamper detection/reaction system. The position comparison is utilized to institute preprogrammed reactive measures if the carrier is taken off course or schedule, penetrated, or otherwise interfered with. The geographic locater could be an independent internal platform or an external signal-dependent system utilizing GPS, Loran or similar source of geographic information; a small (micro) computer could provide adequate memory and computational capacity; the insurance of integrity of the system indicates the need for a tamper-proof container and built-in intrusion sensors. A variant of the system could provide real-time transmission of the vehicle position and condition to a central control point for; such transmission could be encrypted to preclude spoofing

  14. Protecting solar collector systems from corrosion

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    The main cause of the reduced life of a solar heating system is corrosion of the exterior parts and the internal components. This report outlines ways of reducing the cost of solar heating by reducing the corrosion in solar heating systems, and hence increasing the system's service life. Mechanisms for corrosion are discussed: these include galvanic corrosion and crevice corrosion. Means of minimizing corrosion at the design stage are then described. Such methods, when designing the solar collector, involve ensuring proper drainage of exterior water; eliminating situations where moisture, dirt and pollutants may collect; preventing condensation inside the collector; using proper gaskets and sealants at appropriate places; and selecting optimum materials and coatings. Interior corrosion can be minimized at the design stage by choosing a good heat transfer fluid and corrosion inhibitor, in the case of systems where liquids are used; ensuring a low enough flow rate to avoid erosion; designing the system to avoid crevices; and avoiding situations where galvanic corrosion could occur. Other procedures are given for minimizing corrosion in the construction and operation of solar heating systems. 7 figs., 7 tabs.

  15. Multi Agent System Based Wide Area Protection against Cascading Events

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Liu, Leo

    2012-01-01

    In this paper, a multi-agent system based wide area protection scheme is proposed in order to prevent long term voltage instability induced cascading events. The distributed relays and controllers work as a device agent which not only executes the normal function automatically but also can...... the effectiveness of proposed protection strategy. The simulation results indicate that the proposed multi agent control system can effectively coordinate the distributed relays and controllers to prevent the long term voltage instability induced cascading events....

  16. Relay protection coordination with generator capability curve, excitation system limiters and power system relay protections settings

    OpenAIRE

    Buha Danilo; Buha Boško; Jačić Dušan; Gligorov Saša; Božilov Marko; Marinković Savo; Milosavljević Srđan

    2016-01-01

    The relay protection settings performed in the largest thermal powerplant (TE "Nikola Tesla B") are reffered and explained in this paper. The first calculation step is related to the coordination of the maximum stator current limiter settings, the overcurrent protection with inverse characteristics settings and the permitted overload of the generator stator B1. In the second calculation step the settings of impedance generator protection are determined, and the methods and criteria according ...

  17. A Distributed Framework for Real Time Path Planning in Practical Multi-agent Systems

    KAUST Repository

    Abdelkader, Mohamed; Jaleel, Hassan; Shamma, Jeff S.

    2017-01-01

    We present a framework for distributed, energy efficient, and real time implementable algorithms for path planning in multi-agent systems. The proposed framework is presented in the context of a motivating example of capture the flag which

  18. The Philosophy of the New Radiation Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Wikman, P.

    2004-07-01

    The International Commission on Radiological Protection has proposed a new philosophy of radiation protection. An important component in the proposed system of protection is the principle ''If the individual is sufficiently protected from a source, then society is also protected from that source''. This principle is here analysed and found to be subject to several problems. The principle reflects the controversial ethical position that the likely harm to several people can be ignored as long as the individual risk is small. The ICRP states that the new system involves a change from a previous utilitarian ethics to an individual-oriented philosophy. It is argued that a rights-based or a duty-based ethic requires a more risk avert interpretation of when an individual is sufficiently protected than what the proposal suggests. It is concluded that the proposed principle contradicts the other important principle in the new system - the optimisation principle. Due to these problems it is suggested that the ICRP ought to discard the proposed principle from the new system of radiation protection. (Author) 7 refs.

  19. The Philosophy of the New Radiation Protection System

    International Nuclear Information System (INIS)

    Wikman, P.

    2004-01-01

    The International Commission on Radiological Protection has proposed a new philosophy of radiation protection. An important component in the proposed system of protection is the principle I f the individual is sufficiently protected from a source, then society is also protected from that source . This principle is here analysed and found to be subject to several problems. The principle reflects the controversial ethical position that the likely harm to several people can be ignored as long as the individual risk is small. The ICRP states that the new system involves a change from a previous utilitarian ethics to an individual-oriented philosophy. It is argued that a rights-based or a duty-based ethic requires a more risk avert interpretation of when an individual is sufficiently protected than what the proposal suggests. It is concluded that the proposed principle contradicts the other important principle in the new system - the optimisation principle. Due to these problems it is suggested that the ICRP ought to discard the proposed principle from the new system of radiation protection. (Author) 7 refs

  20. Displacements of Metallic Thermal Protection System Panels During Reentry

    Science.gov (United States)

    Daryabeigi, Kamran; Blosser, Max L.; Wurster, Kathryn E.

    2006-01-01

    Bowing of metallic thermal protection systems for reentry of a previously proposed single-stage-to-orbit reusable launch vehicle was studied. The outer layer of current metallic thermal protection system concepts typically consists of a honeycomb panel made of a high temperature nickel alloy. During portions of reentry when the thermal protection system is exposed to rapidly varying heating rates, a significant temperature gradient develops across the honeycomb panel thickness, resulting in bowing of the honeycomb panel. The deformations of the honeycomb panel increase the roughness of the outer mold line of the vehicle, which could possibly result in premature boundary layer transition, resulting in significantly higher downstream heating rates. The aerothermal loads and parameters for three locations on the centerline of the windward side of this vehicle were calculated using an engineering code. The transient temperature distributions through a metallic thermal protection system were obtained using 1-D finite volume thermal analysis, and the resulting displacements of the thermal protection system were calculated. The maximum deflection of the thermal protection system throughout the reentry trajectory was 6.4 mm. The maximum ratio of deflection to boundary layer thickness was 0.032. Based on previously developed distributed roughness correlations, it was concluded that these defections will not result in tripping the hypersonic boundary layer.