WorldWideScience

Sample records for vessel security plan

  1. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  2. Analisa Greenwater Akibat Gerakan Offshore Security Vessel

    Directory of Open Access Journals (Sweden)

    Maulidya Octaviani Bustamin

    2012-09-01

    Full Text Available Analisa  Tugas  Akhir  ini,  terdiri  atas  beberapa  tahapan.  Yang pertama yaitu perancangan struktur Offshore Security Vessel (OSV dengan bantuan software MAXSURF guna mendapatkan Lines Plan. Offset data yang diperoleh digunakan dalam pemodelan menggunakan MOSES,  kemudian  dilakukan  analisa  gerak  OSV  dalam  gelombang  regular  dan dinyatakan dalam grafik RAO. Analisa gerak relatif vertikal  haluan dihitung dari RAO gerakan, dan kemudian melakukan evaluasi perilaku di gelombang acak dengan analisis spektra gelombang. Dari analisa spektra didapatkan parameter greenwater sehingga dapat dihitung peluang, intensitas dan tekanan greenwater. Dari hasil analisa diperoleh RAO gerak vertikal Offshore Security Vessel (OSV pada  gelombang  reguler yang dipengaruhi  oleh  kecepatan,  kondisi  muatan  dan arah gelombang. Peluang terjadinya greenwater terbesar terjadi pada sudut datang gelombang following sea (0o dimana harga terbesar terjadi pada ω = 0.2 rad/sec dengan periode 29 detik mencapai 0.477. Intensitas greenwater terbesar terjadi pada saat sudut datang gelombang following sea (0o adalah sebanyak 59.265 per jam dan 0.378 per detik. Tekanan greenwater terbesar terjadi pada saat sudut datang gelombang head sea (180o sebesar 1678x10-6 MPa. Dengan nilai tersebut, deck mampu menahan beban akibat tekanan greenwater.

  3. PLANNING VESSEL BODY SECTION PRODUCTION

    Directory of Open Access Journals (Sweden)

    A. G. Grivachevsky

    2015-01-01

    Full Text Available A problem of planning production of a vessel body section is considered. The problem is reduced to the classic Johnson’s tree-machine flow-shop scheduling problem. A genetic algorithm and computer experiment to compare efficiency of this algorithm and the algorithm of full enumeration are described.

  4. Report of the DHS Small Vessel Security Institute

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  5. Report of the DHS National Small Vessel Security Summit

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  6. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  7. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  8. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  9. Fast Generation of Container Vessel Stowage Plans

    DEFF Research Database (Denmark)

    Pacino, Dario

    that the vessel is stable and seaworthy, and at the same time arrange the cargo such that the time at port is minimized. Moreover, stowage coordinators only have a limited amount of time to produce the plan. This thesis addresses the question of whether it is possible to automatically generate stowage plans...... test instances provided by a major liner shipping company. Improvements to the modeling of vessel stability and an analysis of its accuracy together with an analysis of the computational complexity of the container stowage problem are also included in the thesis, resulting in an overall in...

  10. 6 CFR 37.41 - Security plan.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security plan. 37.41 Section 37.41 Domestic... Security plan. (a) In General. States must have a security plan that addresses the provisions in paragraph (b) of this section and must submit the security plan as part of its REAL ID certification under § 37...

  11. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  12. Report of the DHS Small Vessel Security Institute

    Science.gov (United States)

    2007-10-19

    Local Government Interests: LtCol Don Holway; Florida Fish and Wildlife Conservation Commission Maj John Fetterman , Maine Department of Marine...AWW program to help fill gaps in law enforcement patrols. 68 National Small Vessel Security Summit Major John C. Fetterman – State of Maine...Major Fetterman currently serves as Vice President of the National Association of State Boating Law Administrators and for the last 30 years has been a

  13. 33 CFR 103.505 - Elements of the Area Maritime Security (AMS) Plan.

    Science.gov (United States)

    2010-07-01

    ... port in case of security threats or breaches of security; (j) Procedures for periodic plan review... (CSO), Vessel Security Officers (VSO), public safety officers, emergency response personnel, and crisis management organization representatives within the port, including 24-hour contact details; (m) Measures to...

  14. Planning Security Services for IT Systems

    OpenAIRE

    Henderson, Marie; Page, Howard Philip

    2014-01-01

    Often the hardest job is to get business representatives to look at security as something that makes managing their risks and achieving their objectives easier, with security compliance as just part of that journey. This paper addresses that by making planning for security services a 'business tool'.

  15. 76 FR 27897 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port...

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...

  16. Integrated Nuclear Security Support Plan (INSSP)

    International Nuclear Information System (INIS)

    Moore, G.M.

    2010-01-01

    Integrated Nuclear Security Support Plan (INSSP) purposes the framework for a comprehensive approach to addressing specific national security needs. It provides means for coordinating nuclear security assistance to member states. Identifies responsible parties for completion of nuclear security activities which are necessary to build sustainable nuclear security programs. International Atomic Energy Agency INSSP development process is based on findings and recommendations from a range of nuclear security missions and other information needs assessments. Takes into account of the ongoing work activities of other bilateral assistance.

  17. Research program plan: reactor vessels. Volume 1

    International Nuclear Information System (INIS)

    Vagins, M.; Taboada, A.

    1985-07-01

    The ability of the licensing staff of the NRC to make decisions concerning the present and continuing safety of nuclear reactor pressure vessels under both normal and abnormal operating conditions is dependent upon the existence of verified analysis methods and a solid background of applicable experimental data. It is the role of this program to provide both the analytical methods and the experimental data needed. Specifically, this program develops fracture mechanics analysis methods and design criteria for predicting the stress levels and flaw sizes required for crack initiation, propagation, and arrest in LWR pressure vessels under all known and postulated operations conditions. To do this, not only must the methods be developed but they must be experimentally validated. Further, the materials data necessary for input to these analytical methods must be developed. Thus, in addition to methods development and large scale experimental verification this program also develops data to show that slow-load fracture toughness, rapid-load fracture toughness, and crack arrest toughness obtained from small laboratory specimens are truly representative of the toughness characteristics of the material behavior in pressure vessels in both the unirradiated and the irradiated conditions

  18. National Security Technology Incubation Project Continuation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-09-30

    This document contains a project continuation plan for the National Security Technology Incubator (NSTI). The plan was developed as part of the National Security Preparedness Project (NSPP) funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This continuation plan describes the current status of NSTI (staffing and clients), long-term goals, strategies, and long-term financial solvency goals.The Arrowhead Center of New Mexico State University (NMSU) is the operator and manager of the NSTI. To realize the NSTI, Arrowhead Center must meet several performance objectives related to planning, development, execution, evaluation, and sustainability. This continuation plan is critical to the success of NSTI in its mission of incubating businesses with security technology products and services.

  19. 49 CFR 659.23 - System security plan: contents.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: contents. 659.23 Section 659... State Oversight Agency § 659.23 System security plan: contents. The system security plan must, at a... system security plan; and (e) Document the rail transit agency's process for making its system security...

  20. ADP Security Plan, Math Building, Room 1139

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.

    1985-08-27

    This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

  1. 33 CFR 165.1151 - Security Zones; liquefied hazardous gas tank vessels, San Pedro Bay, California.

    Science.gov (United States)

    2010-07-01

    ... a tank vessel as liquefied petroleum gas, liquefied natural gas, or similar liquefied gas products... Eleventh Coast Guard District § 165.1151 Security Zones; liquefied hazardous gas tank vessels, San Pedro... the sea floor, within a 500 yard radius around any liquefied hazardous gas (LHG) tank vessel that is...

  2. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-04-24

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... channel's entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai... entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai Harbor...

  3. Trajectory planning of tokamak flexible in-vessel inspection robot

    International Nuclear Information System (INIS)

    Wang, Hesheng; Chen, Weidong; Lai, Yinping; He, Tao

    2015-01-01

    Highlights: • A tokamak flexible in-vessel inspection robot is designed. • Two trajectory planning methods are used to ensure the full coverage of the first wall scanning. • The method is tested on a simulated platform of EAST with the flexible in-vessel inspection robot. • Experimental results show the effectiveness of the proposed algorithm. - Abstract: Tokamak flexible in-vessel inspection robot is mainly designed to carry a camera for close observation of the first wall of the vacuum vessel, which is essential for the maintenance of the future tokamak reactor without breaking the working condition of the vacuum vessel. A tokamak flexible in-vessel inspection robot is designed. In order to improve efficiency of the remote maintenance, it is necessary to design a corresponding trajectory planning algorithm to complete the automatic full coverage scanning of the complex tokamak cavity. Two different trajectory planning methods, RS (rough scanning) and FS (fine scanning), according to different demands of the task, are used to ensure the full coverage of the first wall scanning. To quickly locate the damage position, the first trajectory planning method is targeted for quick and wide-ranging scan of the tokamak D-shaped section, and the second one is for careful observation. Furthermore, both of the two different trajectory planning methods can ensure the full coverage of the first wall scanning with an optimal end posture. The method is tested on a simulated platform of EAST (Experimental Advanced Superconducting Tokamak) with the flexible in-vessel inspection robot, and the results show the effectiveness of the proposed algorithm.

  4. Trajectory planning of tokamak flexible in-vessel inspection robot

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Hesheng [Department of Automation, Shanghai Jiao Tong University, 200240 Shanghai (China); Key Laboratory of System Control and Information Processing, Ministry of Education of China, 200240 Shanghai (China); Chen, Weidong, E-mail: wdchen@sjtu.edu.cn [Department of Automation, Shanghai Jiao Tong University, 200240 Shanghai (China); Key Laboratory of System Control and Information Processing, Ministry of Education of China, 200240 Shanghai (China); Lai, Yinping; He, Tao [Department of Automation, Shanghai Jiao Tong University, 200240 Shanghai (China); Key Laboratory of System Control and Information Processing, Ministry of Education of China, 200240 Shanghai (China)

    2015-10-15

    Highlights: • A tokamak flexible in-vessel inspection robot is designed. • Two trajectory planning methods are used to ensure the full coverage of the first wall scanning. • The method is tested on a simulated platform of EAST with the flexible in-vessel inspection robot. • Experimental results show the effectiveness of the proposed algorithm. - Abstract: Tokamak flexible in-vessel inspection robot is mainly designed to carry a camera for close observation of the first wall of the vacuum vessel, which is essential for the maintenance of the future tokamak reactor without breaking the working condition of the vacuum vessel. A tokamak flexible in-vessel inspection robot is designed. In order to improve efficiency of the remote maintenance, it is necessary to design a corresponding trajectory planning algorithm to complete the automatic full coverage scanning of the complex tokamak cavity. Two different trajectory planning methods, RS (rough scanning) and FS (fine scanning), according to different demands of the task, are used to ensure the full coverage of the first wall scanning. To quickly locate the damage position, the first trajectory planning method is targeted for quick and wide-ranging scan of the tokamak D-shaped section, and the second one is for careful observation. Furthermore, both of the two different trajectory planning methods can ensure the full coverage of the first wall scanning with an optimal end posture. The method is tested on a simulated platform of EAST (Experimental Advanced Superconducting Tokamak) with the flexible in-vessel inspection robot, and the results show the effectiveness of the proposed algorithm.

  5. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-01-13

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... vessel SAFARI EXPLORER to its intended berth in the harbor. Entry into the temporary security zone is... operation of the SAFARI EXPLORER into Molokai has been voluntarily suspended by the operating company...

  6. School Security: Planning and Costs.

    Science.gov (United States)

    Hunter, Richard C.; Mazingo, Terri H.

    2003-01-01

    Describes efforts by two school districts to address the potential threats of shootings and other school disruptions: Baltimore City Public Schools in Maryland and Charlotte-Mecklenburg Public Schools in North Carolina. Also describes the growing costs of providing safety and security in elementary and secondary schools. (Contains 13 references.)…

  7. Vessels Route Planning Problem with Uncertain Data

    Directory of Open Access Journals (Sweden)

    Tomasz Neumann

    2016-09-01

    Full Text Available The purpose of this paper is to find a solution for route planning in a transport networks, where the costs of tracks, factor of safety and travel time are ambiguous. This approach is based on the Dempster-Shafer theory and well known Dijkstra's algorithm. In this approach important are the influencing factors of the mentioned coefficients using uncertain possibilities presented by probability intervals. Based on these intervals the quality intervals of each route can be determined. Applied decision rules can be described by the end user.

  8. 6 CFR 27.225 - Site security plans.

    Science.gov (United States)

    2010-01-01

    ... Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.225 Site security plans. (a) The Site Security Plan must... chemical facility security. (b) Except as provided in § 27.235, a covered facility must complete the Site...

  9. Sampling and Analysis Plan for PUREX canyon vessel flushing

    International Nuclear Information System (INIS)

    Villalobos, C.N.

    1995-01-01

    A sampling and analysis plan is necessary to provide direction for the sampling and analytical activities determined by the data quality objectives. This document defines the sampling and analysis necessary to support the deactivation of the Plutonium-Uranium Extraction (PUREX) facility vessels that are regulated pursuant to Washington Administrative Code 173-303

  10. Ghana's Integrated Nuclear Security Support Plan

    International Nuclear Information System (INIS)

    Dahlstrom, Danielle

    2013-01-01

    At the Korle Bu Teaching Hospital outside Accra, Pearl Lovelyn Lawson checks the records of the next patient to undergo radiotherapy and adjusts the dose settings of the teletherapy machine. It is business as usual at the facility that treats over fifty patients each day. But Lawson's routine now includes additional procedures to ensure that the highly radioactive cobalt-60 source located inside the machine remains secure. Nuclear security devices and systems such as double locks, motion sensors, and cameras that transmit images to a central alarm system have been installed to ensure that the source cannot be stolen, the facility sabotaged, or unauthorized access gained. At Korle Bu physical protection measures were upgraded as part of Ghana's Integrated Nuclear Security Support Plan (INSSP). Preventing, detecting and responding to criminal acts like the theft or illegal transfer of a radioactive source, is an international priority that could be addressed through an INSSP. As one of its key nuclear security services, the IAEA assists Member States in drafting such plans. An INSSP is developed jointly with the Member State, using a holistic approach to nuclear security capacity building. It reinforces the primary objective of a State's nuclear security regime to protect people, society, and the environment from the harmful consequences of a nuclear security event. Addressing five components - the legal and regulatory framework, prevention, detection, and sustainability - the jointly developed plan identifies the needs, responsible entities and organizations within the State, as well as the timeframe for the implementation of agreed nuclear security related activities. Ghana's INSSP, tailored to its specific needs, is based on findings and recommendations from advisory service missions carried out in Ghana, including an International Nuclear Security Advisory Service mission and an International Physical Protection Advisory Service mission. Ghana's INSSP was

  11. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  12. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  13. National Security Technology Incubator Business Plan

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2007-12-31

    This document contains a business plan for the National Security Technology Incubator (NSTI), developed as part of the National Security Preparedness Project (NSPP) and performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This business plan describes key features of the NSTI, including the vision and mission, organizational structure and staffing, services, evaluation criteria, marketing strategies, client processes, a budget, incubator evaluation criteria, and a development schedule. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety, security, and protection of the homeland. The NSTI is operated and managed by the Arrowhead Center, responsible for leading the economic development mission of New Mexico State University (NMSU). The Arrowhead Center will recruit business with applications for national security technologies recruited for the NSTI program. The Arrowhead Center and its strategic partners will provide business incubation services, including hands-on mentoring in general business matters, marketing, proposal writing, management, accounting, and finance. Additionally, networking opportunities and technology development assistance will be provided.

  14. Corporate strategic plan for safeguards and security

    International Nuclear Information System (INIS)

    1997-06-01

    Department of Energy (DOE) safeguards and security (S and S) is a team effort, consisting of Field, National Laboratories, Program Office, and Headquarters units cooperating to support the Department's diverse security needs. As an integral part of the nation's security structure, the DOE S and S Program regularly supports and works in cooperation with other US Government agencies and private industry to improve the national security posture. Thus, inter- and intra-agency partnerships play an invaluable role in the continuing efforts to integrate and implement improved ways of doing business. Their Corporate Strategic Plan provides a road map to guide, track, and provide feedback for the incorporation and implementation of S and S activities within DOE. Part 1 Planning Framework, describes those overarching factors which influence the planning endeavors. Part 2, Strategic Perspective, outlines where the S and S Program has been and how they will move to the future through core competencies, changing cultural thinking, and implementing their strategies. Part 3, Strategic and Operational Integration, details critical focus areas, strategies, and success indicators designed to enhance inter-agency S and S integration and promote cooperation with external agencies. This Plan will be reviewed annually to ensure it remains supportive and fully-engaged with the nation's and international security environments

  15. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... baggage; and (vi) Vessel stores; (2) Threat assessments, including the purpose and methodology of the assessment, for the area or areas in which the vessel operates or at which passengers embark or disembark; (3... and control procedures; (ii) Identification systems; (iii) Surveillance and monitoring equipment; (iv...

  16. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge...) Methods of physical screening of persons, personal effects, baggage, cargo, and vessel stores; and (m) The...

  17. Plan Colombia or development as security

    Directory of Open Access Journals (Sweden)

    Juan Pablo Guevara Latorre

    2015-01-01

    the most relevant policy for the construction of the State in 21st-century Colombia from a critical standpoint. The document makes it possible to show that Plan Colombia is a privatized form of development, interpreted in terms of security based on an incomplete understanding of the Colombian conflict that prevails into our present

  18. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ...-AA87 Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... (NCSM 710) which include all waters within 100 yards from the vessels while underway in the Puget Sound... authorized by the COTP, Puget Sound or Designated Representative. DATES: This rule is effective from 8 a.m...

  19. 77 FR 50926 - Security Zones; Certain Dangerous Cargo Vessels, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... (LPG), and ammonium nitrate. The security zones will start at buoys 3 and 4 in Tampa Bay ``F'' cut... propane gas, and ammonium nitrate. The security zones prohibit any vessel from entering within 500 yards.... We seek any comments or information that may lead to the discovery of a significant environmental...

  20. 76 FR 63547 - Security Zone; Columbia and Willamette Rivers, Dredge Vessels Patriot and Liberty

    Science.gov (United States)

    2011-10-13

    ... or his designated representative. The security zone will be in effect while the Dredge Vessels are... its effects on them and participate in the rulemaking process. Small businesses may send comments on... requirements. (c) Enforcement period. The security zone created by this section will be in effect from 7 a.m...

  1. 76 FR 40617 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington

    Science.gov (United States)

    2011-07-11

    ... better evaluate its effects on them and participate in the rulemaking process. Small businesses may send... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0505] RIN 1625-AA87 Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington AGENCY...

  2. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-07-01

    ...) Understanding of the importance of creating and maintaining safe working and living conditions for passengers... responsibility to preserve the marine environment; and (B) Basic working knowledge of pollution prevention... space numbering; and (B) Understanding of various vessel types; and working knowledge of nautical terms...

  3. VESSEL-SOURCED POLLUTION: A SECURITY THREAT IN ...

    African Journals Online (AJOL)

    and some other conventions make provisions concerning protection of ma- ... the pollution of the marine in Malaysia, it appears that pollution by vessels .... pollution from ships and maritime safety; providing effective legal, technical and scientific ..... of the offence after the service of the notice on the offending ship through.

  4. 49 CFR 659.21 - System security plan: general requirements.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false System security plan: general requirements. 659.21... State Oversight Agency § 659.21 System security plan: general requirements. (a) The oversight agency shall require the rail transit agency to implement a system security plan that, at a minimum, complies...

  5. Report of the DHS National Small Vessel Security Summit

    Science.gov (United States)

    2007-10-19

    Fetterman , Maine Department of Marine Resources Lt Bill Krul, Marine Patrol, St. Clair County, Michigan Sgt Jim Lambert, Marine Patrol, Alameda...Major John C. Fetterman – State of Maine Major Fetterman currently serves as Vice President of the National Association of State Boating Law...or seemingly out of place vessel enters a maritime community, it will attract the attention of his officers. Major Fetterman was concerned that

  6. Computer Security Incident Response Planning at Nuclear Facilities

    International Nuclear Information System (INIS)

    2016-06-01

    The purpose of this publication is to assist Member States in developing comprehensive contingency plans for computer security incidents with the potential to impact nuclear security and/or nuclear safety. It provides an outline and recommendations for establishing a computer security incident response capability as part of a computer security programme, and considers the roles and responsibilities of the system owner, operator, competent authority, and national technical authority in responding to a computer security incident with possible nuclear security repercussions

  7. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  8. 33 CFR 155.1045 - Response plan requirements for vessels carrying oil as a secondary cargo.

    Science.gov (United States)

    2010-07-01

    ... PREVENTION REGULATIONS FOR VESSELS Tank Vessel Response Plans for Oil § 155.1045 Response plan requirements... actions. (4) The organizational structure that will be used to manage the response actions. This structure... with government agencies; (v) Spill response operations; (vi) Planning; (vii) Logistics support; and...

  9. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ...-AA87 Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... temporary rule, call or email Lieutenant Junior Grade Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you...

  10. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  11. 33 CFR 165.103 - Safety and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone...

    Science.gov (United States)

    2010-07-01

    ... within a 500-yard radius of any Liquefied Petroleum Gas (LPG) vessel while it is moored at the LPG... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; LPG... and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth...

  12. Information Security: USDA Needs to Implement Its Departmentwide Information Security Plan

    National Research Council Canada - National Science Library

    2000-01-01

    USDA has taken positive steps to begin improving its information security by developing its August 1999 Action Plan with recommendations to strengthen department-wide information security and hiring...

  13. Security administration plan for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-09-29

    This document encompasses and standardizes the integrated approach for security within the PP and Ps applications, It also identifies the security tools and methods to be used. The Security Administration Plan becomes effective as of this document`s acceptance and will provide guidance through implementation efforts and, as a ``living document`` will support the operations and maintenance of the system.

  14. Information security management system planning for CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeu, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  15. Information security management system planning for CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeu, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    The focus of this document is to provide guidance for the development of information security management system planning documents at chemical, biological, radiological, or nuclear (CBRN) facilities. It describes a risk-based approach for planning information security programs based on the sensitivity of the data developed, processed, communicated, and stored on facility information systems.

  16. 49 CFR 172.802 - Components of a security plan.

    Science.gov (United States)

    2010-10-01

    ... from origin to destination, including shipments stored incidental to movement. (b) The security plan must also include the following: (1) Identification by job title of the senior management official... business and must make the security plan available upon request, at a reasonable time and location, to an...

  17. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  18. A different paradigm for security planning

    International Nuclear Information System (INIS)

    Hagengruber, R.

    2002-01-01

    Full text: Security costs at nuclear facilities have been relatively high for many years. Since the 1970s, these expenditures in the United States have grown much faster than inflation. After the tragedy of September 11, the rate of increase appears to be exponential. Within the National Nuclear Security Administration, the cost of security now is about 10 % of the entire budget. Research and Development (R and D) has played a role in modern security, but the rate of advancement of security technology has not been sufficient to moderate the increasing costs and performance demands. Part of this problem is associated with both an inadequate investment level and the lack of a visionary roadmap for security technology. The other element of the problem is the lack of a strategic framework or architecture that would allow security technology to be effectively placed in an overall context of functionality. A new concept for an architecture for security will be presented. Within this architecture, a different approach to design, use of technology, and evaluation of effectiveness will be offered. Promising areas of technology and design will be illustrated by specific examples and suggestions for advanced R and D will be made. (author)

  19. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  20. Plan for radiological security at a university health center

    International Nuclear Information System (INIS)

    Huiaman Mendoza, G.M.; Sanchez Riojas, M.M.; Felix JImenez, D.

    1998-01-01

    This work shows a radiological security plan applied to a Basic Radiological Service at a university health center. Factors taken into account were installation designs, equipment operation parameters, work procedures, image system and responsibilities

  1. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  2. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  3. 78 FR 51754 - Request To Modify License by Replacing Security Plan With New Radiation Safety Plan; U.S...

    Science.gov (United States)

    2013-08-21

    ... Replacing Security Plan With New Radiation Safety Plan; U.S. Department of the Army, Jefferson Proving... security plan with a new radiation safety plan. DATES: Submit comments by September 20, 2013. Requests for.... The proposed change is to modify License Condition No. 12 D which refers to the security plan of...

  4. Security-Constrained Resource Planning in Electricity Market

    International Nuclear Information System (INIS)

    Roh, Jae Hyung; Shahidehpour, Mohammad; Yong Fu

    2007-06-01

    We propose a market-based competitive generation resource planning model in electricity markets. The objective of the model is to introduce the impact of transmission security in a multi-GENCO generation resource planning. The proposed approach is based on effective decomposition and coordination strategies. Lagrangian relaxation and Benders decomposition like structure are applied to the model. Locational price signal and capacity signal are defined for the simulation of competition among GENCOs and the coordination of security between GENCOs and the regulatory body (ISO). The numerical examples exhibit the effectiveness of the proposed generation planning model in electricity markets.

  5. Security plan for the energy sector

    International Nuclear Information System (INIS)

    Tapias Stahelin, Fernando

    1998-01-01

    The explosion of pipelines is so alone the tip of the iceberg of a violent situation that, for many, sinks the economic and social panorama of Colombia in an uncertainty difficult to clarify. Although it is certain that we have the elements to build a country with a floating economy and in development, it is also certain that our own war doesn't allow leaving but there. At the moment 3,2% of the Gross Domestic Product - GDP of the country is dedicated to the military expense, it calculates alarming if one keeps in mind that the average of Latin America is of 1.7% and the world average has lowered ostensibly in the last 10 years, passing from 5.1% to so single 2.7 investments. Of continuing this way, in the 2004 the projected inversion of the GDP of Colombia for military expense will overcome 5%. A conscientious analysis reveals the data of this situation that it affects all the contour of the national life. When we speak of violence in the country we should refer to all those factors and actors that destabilize the society and the legally established political institutions, creating it keels and fear in the whole population. In a same way, it becomes necessary to speak of the security and the national defense that should be guaranteed by the government instances. The security of a state of tranquility and well being; the defense, is an activity situation so that in the case that the security loses temper, it can return to the situation of initial security

  6. [Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].

    Science.gov (United States)

    Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo

    2016-01-01

    Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes.

  7. A Practice of Secure Development and Operational Environment Plan

    International Nuclear Information System (INIS)

    Park, Jaekwan; Seo, Sangmun; Suh, Yongsukl; Park, Cheol

    2017-01-01

    This paper suggests a practice of plan for SDOE establishment in a nuclear I and C. First, it is necessary to perform a requirements analysis to define key regulatory issues and determine the target systems. The analysis includes a survey to find out the applicable measures credited internationally. Based on the analysis results, this paper proposes an implementation plan including a process harmonizing security activities with legacy software activities and applicable technical, operational, and management measures for target systems. Recently, nuclear I and C has been faced with two security issues, cyber security (CS) and secure development and operational environment (SDOE). Unlike cyber security, few studies on planning SDOE have been presented. This paper suggests a plan for establishing an SDOE in a nuclear I and C. This paper defines three key considerations to comply with the regulatory position of RG. 1.152(R3) and proposes a process harmonizing the security activities with legacy software activities. In addition, this paper proposes technical, operational, and management measures applicable for SDOE.

  8. Generating Optimal Stowage Plans for Container Vessel Bays

    DEFF Research Database (Denmark)

    Delgado-Ortegon, Alberto; Jensen, Rune Møller; Schulte, Christian

    2009-01-01

    collaboration to date with a liner shipping company on automated stowage planning. We then show how to solve this model ef- ficiently in - to our knowledge - the first application of CP to stowage planning using state-of-the-art techniques such as extensive use of global constraints, viewpoints, static...

  9. Minimizing Lid Overstows in Master Stowage Plans for Container Vessels is NP-Complete

    DEFF Research Database (Denmark)

    Ajspur, Mai Lise; Jensen, Rune Møller; Guilbert, Nicolas

    Container vessel stowage is a particularly hard combinatorial problem within the shipping industry. The currently most successful approaches decompose the problem hierarchically and first generate a master plan that handle highlevel constraints and objectives such as balance and stress moments...... that it is an NP -complete problem to generate master plans that minimize the number of these lid overstows. Since any efficient approach to container vessel stowage most likely must include a master plan, the implication of this result is that future research must focus and developing good heuristics...

  10. Plan de negocio Security Info Consultores

    OpenAIRE

    Cardona Cubillos, Diego Alejandro

    2013-01-01

    La empresa a crear tiene como razón social Security Info Consultores, con domicilio principal en la ciudad de Bogotá, y su servicio principal consiste en implementar un modelo de seguridad informática acorde a cada empresa, en dar charlas y conferencia sobre normatividad, correcta custodia de la información, concientización sobre la importancia del manejo de la información, capacitar al personal para que tengan un conocimiento detallado y claro sobre le modelo implantado, desarrollar audito...

  11. Evaluation Plan on In-vessel Source Term in PGSFR

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Seung Won; Ha, Kwi-Seok; Ahn, Sang June; Lee, Kwi Lim; Jeong, Taekyeong [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    This strategy requires nuclear plants to have features that prevent radionuclide release and multiple barriers to the escape from the plants of any radionuclides that are released despite preventive measures. Considerations of the ability to prevent and mitigate release of radionuclides arise at numerous places in the safety regulations of nuclear plants. The effectiveness of mitigative capabilities in nuclear plants is subject to quantitative analysis. The radionuclide input to these quantitative analyses of effectiveness is the Source Term (ST). All features of the composition, magnitude, timing, chemical form and physical form of accidental radionuclide release constitute the ST. Also, ST is defined as the release of radionuclides from the fuel and coolant into the containment, and subsequently to the environment. The in-vessel STs of PGSFR will be estimated using the methodology of ANL-ART-38 report in additional to 4S methodology. The in-vessel STs are calculated through several phases: The inventory of each radionuclide is calculated by ORIGEN-2 code using the realistic burnup conditions. ST in the release from the core to primary sodium is calculated by using the assumption of ANL methodology. Lastly, ST in the release from the primary sodium to cover gas space is calculated by using equation and experimental materials.

  12. Evaluation Plan on In-vessel Source Term in PGSFR

    International Nuclear Information System (INIS)

    Lee, Seung Won; Ha, Kwi-Seok; Ahn, Sang June; Lee, Kwi Lim; Jeong, Taekyeong

    2016-01-01

    This strategy requires nuclear plants to have features that prevent radionuclide release and multiple barriers to the escape from the plants of any radionuclides that are released despite preventive measures. Considerations of the ability to prevent and mitigate release of radionuclides arise at numerous places in the safety regulations of nuclear plants. The effectiveness of mitigative capabilities in nuclear plants is subject to quantitative analysis. The radionuclide input to these quantitative analyses of effectiveness is the Source Term (ST). All features of the composition, magnitude, timing, chemical form and physical form of accidental radionuclide release constitute the ST. Also, ST is defined as the release of radionuclides from the fuel and coolant into the containment, and subsequently to the environment. The in-vessel STs of PGSFR will be estimated using the methodology of ANL-ART-38 report in additional to 4S methodology. The in-vessel STs are calculated through several phases: The inventory of each radionuclide is calculated by ORIGEN-2 code using the realistic burnup conditions. ST in the release from the core to primary sodium is calculated by using the assumption of ANL methodology. Lastly, ST in the release from the primary sodium to cover gas space is calculated by using equation and experimental materials

  13. The Maritime Infrastructure Recovery Plan for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2006-01-01

    ... to the jurisdiction of the United States. The MIRP, the Maritime Commerce Security Plan, and the Maritime Transportation System Security Plan were developed in close coordination under the National Strategy for Maritime Security (NSMS...

  14. TECHNIQUE OF OPTIMAL AUDIT PLANNING FOR INFORMATION SECURITY MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    F. N. Shago

    2014-03-01

    Full Text Available Complication of information security management systems leads to the necessity of improving the scientific and methodological apparatus for these systems auditing. Planning is an important and determining part of information security management systems auditing. Efficiency of audit will be defined by the relation of the reached quality indicators to the spent resources. Thus, there is an important and urgent task of developing methods and techniques for optimization of the audit planning, making it possible to increase its effectiveness. The proposed technique gives the possibility to implement optimal distribution for planning time and material resources on audit stages on the basis of dynamics model for the ISMS quality. Special feature of the proposed approach is the usage of a priori data as well as a posteriori data for the initial audit planning, and also the plan adjustment after each audit event. This gives the possibility to optimize the usage of audit resources in accordance with the selected criteria. Application examples of the technique are given while planning audit information security management system of the organization. The result of computational experiment based on the proposed technique showed that the time (cost audit costs can be reduced by 10-15% and, consequently, quality assessments obtained through audit resources allocation can be improved with respect to well-known methods of audit planning.

  15. PLANNING INTELLIGENCE ACTIVITIES IN A DYNAMIC SECURITY ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Anca Pavel

    2016-10-01

    Full Text Available The hypothesis introduced by this article is that, in order to perform intelligence missions and to obtain valuable intelligence for the consumers it is necessary to implement processes and tools to support planning activities. Today's challenges consist rather in the ability of intelligence organizations to identify and initiate new connections, processes and communication flows with other partners operating in the security environment than to plan in their own name secret operations. From this point of view, planning activities should focus on new procedures, at a much more extensive level in order to align institutional efforts beyond the boundaries of their own organization and the national community of information. Also, in order to coordinate intelligence activities, strategic planning must be anchored into a complex analysis of the potential impact of existing and possible future global phenomena that shape the security environment and thus identify better ways of improving results.

  16. Principles of Vessel Route Planning in Ice on the Northern Sea Route

    Directory of Open Access Journals (Sweden)

    Tadeusz Pastusiak

    2016-12-01

    Full Text Available A complex of ice cover characteristics and the season of the year were considered in relation to vessel route planning in ice-covered areas on the NSR. The criteria for navigation in ice - both year-round and seasonal were analyzed. The analysis of the experts knowledge, dissipated in the literature, allowed to identify some rules of route planning in ice-covered areas. The most important processes from the navigation point of view are the development and disintegration of ice, the formation and disintegration of fast ice and behavior of the ice massifs and polynyas. The optimal route is selected on basis of available analysis and forecast maps of ice conditions and ice class, draught and seaworthiness of the vessel. The boundary of the ice indicates areas accessible to vessels without ice class. Areas with a concentration of ice from 0 to 6/10 are used for navigation of vessels of different ice classes. Areas of concentration of ice from 7/10 up are eligible for navigation for icebreakers and vessels with a high ice class with the assistance of icebreakers. These rules were collected in the decision tree. Following such developed decision-making model the master of the vessel may take decision independently by accepting grading criteria of priorities resulting from his knowledge, experience and the circumstances of navigation. Formalized form of decision making model reduces risk of the "human factor" in the decision and thereby help improve the safety of maritime transport.

  17. Stability, structure and scale: improvements in multi-modal vessel extraction for SEEG trajectory planning.

    Science.gov (United States)

    Zuluaga, Maria A; Rodionov, Roman; Nowell, Mark; Achhala, Sufyan; Zombori, Gergely; Mendelson, Alex F; Cardoso, M Jorge; Miserocchi, Anna; McEvoy, Andrew W; Duncan, John S; Ourselin, Sébastien

    2015-08-01

    Brain vessels are among the most critical landmarks that need to be assessed for mitigating surgical risks in stereo-electroencephalography (SEEG) implantation. Intracranial haemorrhage is the most common complication associated with implantation, carrying significantly associated morbidity. SEEG planning is done pre-operatively to identify avascular trajectories for the electrodes. In current practice, neurosurgeons have no assistance in the planning of electrode trajectories. There is great interest in developing computer-assisted planning systems that can optimise the safety profile of electrode trajectories, maximising the distance to critical structures. This paper presents a method that integrates the concepts of scale, neighbourhood structure and feature stability with the aim of improving robustness and accuracy of vessel extraction within a SEEG planning system. The developed method accounts for scale and vicinity of a voxel by formulating the problem within a multi-scale tensor voting framework. Feature stability is achieved through a similarity measure that evaluates the multi-modal consistency in vesselness responses. The proposed measurement allows the combination of multiple images modalities into a single image that is used within the planning system to visualise critical vessels. Twelve paired data sets from two image modalities available within the planning system were used for evaluation. The mean Dice similarity coefficient was 0.89 ± 0.04, representing a statistically significantly improvement when compared to a semi-automated single human rater, single-modality segmentation protocol used in clinical practice (0.80 ± 0.03). Multi-modal vessel extraction is superior to semi-automated single-modality segmentation, indicating the possibility of safer SEEG planning, with reduced patient morbidity.

  18. Marketing Plan for the National Security Technology Incubator

    Energy Technology Data Exchange (ETDEWEB)

    None

    2008-03-31

    This marketing plan was developed as part of the National Security Preparedness Project by the Arrowhead Center of New Mexico State University. The vision of the National Security Technology Incubator program is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The plan defines important aspects of developing the incubator, such as defining the target market, marketing goals, and creating strategies to reach the target market while meeting those goals. The three main marketing goals of the incubator are: 1) developing marketing materials for the incubator program; 2) attracting businesses to become incubator participants; and 3) increasing name recognition of the incubator program on a national level.

  19. Security's role in morgue operations: needed--a foolproof plan.

    Science.gov (United States)

    White, John M

    2012-01-01

    If handling the remains of dead patients is a responsibility of your security department, or you are being pressured to take on the role because of budget cuts, the need to anticipate and plan for complications which may arise is critical, the author points out.

  20. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Marutzky, Sam; Farnham, Irene

    2014-10-01

    The purpose of the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan) is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing the extent of groundwater contamination from underground nuclear testing. This Plan identifies locations to be sampled by corrective action unit (CAU) and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well-purging requirements, detection levels, and accuracy requirements; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling of interest to UGTA. This Plan does not address compliance with requirements for wells that supply the NNSS public water system or wells involved in a permitted activity.

  1. 33 CFR 155.1052 - Response plan development and evaluation criteria for vessels carrying group V petroleum oil as a...

    Science.gov (United States)

    2010-07-01

    ... evaluation criteria for vessels carrying group V petroleum oil as a primary cargo. 155.1052 Section 155.1052....1052 Response plan development and evaluation criteria for vessels carrying group V petroleum oil as a primary cargo. (a) Owners and operators of vessels that carry group V petroleum oil as a primary cargo...

  2. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planning assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  3. 33 CFR Appendix B to Part 155 - Determining and Evaluating Required Response Resources for Vessel Response Plans

    Science.gov (United States)

    2010-07-01

    ... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) POLLUTION OIL OR HAZARDOUS MATERIAL POLLUTION PREVENTION REGULATIONS FOR VESSELS Pt. 155, App. B Appendix B to Part 155—Determining and... environment. For example, vessels moving from the ocean to a river port must identify appropriate equipment...

  4. ITER vacuum vessel fabrication plan and cost study (D 68) for the international thermonuclear experimental reactor

    International Nuclear Information System (INIS)

    1995-01-01

    ITER Task No. 8, Vacuum Vessel Fabrication Plan and Cost Study (D68), was initiated to assess ITER vacuum vessel fabrication, assembly, and cost. The industrial team of Raytheon Engineers ampersand Constructors and Chicago Bridge ampersand Iron (Raytheon/CB ampersand I) reviewed the current vessel basis and prepared a manufacturing plan, assembly plan, and cost estimate commensurate with the present design. The guidance for the Raytheon/CB ampersand I assessment activities was prepared by the ITER Garching Work Site. This guidance provided in the form of work descriptions, sketches, drawings, and costing guidelines for each of the presently identified vacuum vessel Work Breakdown Structure (WBS) elements was compiled in ITER Garching Joint Work Site Memo (Draft No. 9 - G 15 MD 01 94-17-05 W 1). A copy of this document is provided as Appendix 1 to this report. Additional information and clarifications required for the Raytheon/CB ampersand I assessments were coordinated through the US Home Team (USHT) and its technical representative. Design details considered essential to the Task 8 assessments but not available from the ITER Joint Central Team (JCT) were generated by Raytheon/CB ampersand I and documented accordingly

  5. Design and implementation of motion planning of inspection and maintenance robot for ITER-like vessel

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Hesheng; Lai, Yinping [Department of Automation, Shanghai Jiao Tong University, Shanghai 200240 (China); Key Laboratory of System Control and Information Processing, Ministry of Education of China (China); Chen, Weidong, E-mail: wdchen@sjtu.edu.cn [Department of Automation, Shanghai Jiao Tong University, Shanghai 200240 (China); Key Laboratory of System Control and Information Processing, Ministry of Education of China (China); Cao, Qixin [Institute of Robotics, Shanghai Jiao Tong University, Shanghai 200240 (China)

    2015-12-15

    Robot motion planning is a fundamental problem to ensure the robot executing the task without clashes, fast and accurately in a special environment. In this paper, a motion planning of a 12 DOFs remote handling robot used for inspecting the working state of the ITER-like vessel and maintaining key device components is proposed and implemented. Firstly, the forward and inverse kinematics are given by analytic method. The work space and posture space of this manipulator are both considered. Then the motion planning is divided into three stages: coming out of the cassette mover, moving along the in-vessel center line, and inspecting the D-shape section. Lastly, the result of experiments verified the performance of the motion design method. In addition, the task of unscrewing/screwing the screw demonstrated the feasibility of system in function.

  6. 78 FR 261 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2013-01-03

    ... provides for enhanced protection of escorted vessels while causing little if any disruption to other routine navigation since most vessels will be allowed to transit within the outer 250 yards of the...

  7. A locking mechanism for securing a loading buoy to a vessel. Lsemekanisme for fastgjring av en lastebye til et farty

    Energy Technology Data Exchange (ETDEWEB)

    Breivik, K.; Smedal, A.

    1994-07-04

    The invention relates to a locking mechanism for securing a loading/unloading buoy on a vessel. The buoy is of the type to be introduced into a submerged downwardly open receiving space in the vessel, and to be fastened in a releasable manner in the receiving space. The mechanism comprises hydraulically actuated locking elements, mounted about horizontal axes at the sides of the receiving space, to pivot between the locking and releasing positions, the buoy having a peripheral collar having a downwards facing abutment edge for engagement with the locking elements in the locking position thereof. 6 figs.

  8. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planing assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  9. 76 FR 45645 - 10-Day Notice of Proposed Information Collection: Technology Security/Clearance Plans, Screening...

    Science.gov (United States)

    2011-07-29

    ...: Technology Security/Clearance Plans, Screening Records, and Non-Disclosure Agreements ACTION: Notice of... Information Collection: Technology Security/ Clearance Plans, Screening Records, and Non-Disclosure Agreements...: None. Respondents: Business and Nonprofit Organizations, Foreign Governments. Estimated Number of...

  10. 6 CFR 27.245 - Review and approval of site security plans.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Review and approval of site security plans. 27.245 Section 27.245 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.245 Review and approval of site...

  11. The Planning, Licensing, Modifications, and Use of a Russian Vessel for Shipping Spent Nuclear Fuel by Sea in Support of the DOE RRRFR Program

    International Nuclear Information System (INIS)

    Tyacke, Michael; Bolshinsky, Igor; Tomczak, Wlodzimierz; Naletov, Sergey; Pichugin, Oleg

    2001-01-01

    The Russian Research Reactor Fuel Return (RRRFR) Program, under the U.S. Department of Energy's Global Threat Reduction Initiative, began returning Russian-supplied high-enriched uranium (HEU) spent nuclear fuel (SNF), stored at Russian-designed research reactors throughout the world, to Russia in January 2006. During the first years of making HEU SNF shipments, it became clear that the modes of transportation needed to be expanded from highway and railroad to include sea and air to meet the extremely aggressive commitment of completing the first series of shipments by the end of 2010. The first shipment using sea transport was made in October 2008 and used a non-Russian flagged vessel. The Russian government reluctantly allowed a one-time use of the foreign-owned vessel into their highly secured seaport, with the understanding that any future shipments would be made using a vessel owned and operated by a Russian company. ASPOL-Baltic of St. Petersburg, Russia, owns and operates a small fleet of vessels and has a history of shipping nuclear materials. ASPOL-Baltic's vessels were licensed for shipping nuclear materials; however, they were not licensed to transport SNF materials. After a thorough review of ASPOL Baltic's capabilities and detailed negotiations, it was agreed that a contract would be let with ASPOL-Baltic to license and refit their MCL Trader vessel for hauling SNF in support of the RRRFR Program. This effort was funded through a contract between the RRRFR Program, Idaho National Laboratory, and Radioactive Waste Management Plant of Swierk, Poland. This paper discusses planning, Russian and international maritime regulations and requirements, Russian authorities reviews and approvals, licensing, design, and modifications made to the vessel in preparation for SNF shipments. A brief summary of actual shipments using this vessel, experiences, and lessons learned also are described.

  12. The Planning, Licensing, Modifications, and Use of a Russian Vessel for Shipping Spent Nuclear Fuel by Sea in Support of the DOE RRRFR Program

    Energy Technology Data Exchange (ETDEWEB)

    Michael Tyacke; Dr. Igor Bolshinsky; Wlodzimierz Tomczak; Sergey Naletov; Oleg Pichugin

    2001-10-01

    The Russian Research Reactor Fuel Return (RRRFR) Program, under the U.S. Department of Energy’s Global Threat Reduction Initiative, began returning Russian-supplied high-enriched uranium (HEU) spent nuclear fuel (SNF), stored at Russian-designed research reactors throughout the world, to Russia in January 2006. During the first years of making HEU SNF shipments, it became clear that the modes of transportation needed to be expanded from highway and railroad to include sea and air to meet the extremely aggressive commitment of completing the first series of shipments by the end of 2010. The first shipment using sea transport was made in October 2008 and used a non-Russian flagged vessel. The Russian government reluctantly allowed a one-time use of the foreign-owned vessel into their highly secured seaport, with the understanding that any future shipments would be made using a vessel owned and operated by a Russian company. ASPOL-Baltic of St. Petersburg, Russia, owns and operates a small fleet of vessels and has a history of shipping nuclear materials. ASPOL-Baltic’s vessels were licensed for shipping nuclear materials; however, they were not licensed to transport SNF materials. After a thorough review of ASPOL Baltic’s capabilities and detailed negotiations, it was agreed that a contract would be let with ASPOL-Baltic to license and refit their MCL Trader vessel for hauling SNF in support of the RRRFR Program. This effort was funded through a contract between the RRRFR Program, Idaho National Laboratory, and Radioactive Waste Management Plant of Swierk, Poland. This paper discusses planning, Russian and international maritime regulations and requirements, Russian authorities’ reviews and approvals, licensing, design, and modifications made to the vessel in preparation for SNF shipments. A brief summary of actual shipments using this vessel, experiences, and lessons learned also are described.

  13. 33 CFR 165.114 - Safety and Security Zones: Escorted Vessels-Boston Harbor, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.114 Safety and Security Zones: Escorted Vessels—Boston Harbor, Massachusetts. (a...

  14. Testing plan for critical heat flux measurement during in-vessel retention

    International Nuclear Information System (INIS)

    Aoki, Kazuyoshi; Iwaki, Chikako; Sato, Hisaki; Mimura, Satoshi; Kanamori, Daisuke

    2015-01-01

    In-Vessel Retention (IVR) is a method to maintain molten debris in a reactor vessel (RV) by RV outer surface cooling. Structural integrity of RV and cooling capacity on RV outer surface are important to verify IVR strategy. Critical Heat Flux (CHF) data is necessary to estimate cooling capacity on the RV outer surface. And there are some CHF data to estimate cooling capacity on the RV outer surface. However, these data were obtained for specific plants. Thus, the objective of this study is developing a CHF correlation for various PWR plants. The objectives of this paper are developing test equipment and testing plan for the CHF correlation. Firstly, plant conditions during severe accidents were organized. Then, ranges of testing parameters were estimated with the plant conditions. And specifications of the test equipment were set to cover the range of parameters. Secondly, testing cases were set based on design of experiments. The test cases are suitable to develop experimental correlations. (author)

  15. Construction Progress and Science Planning for the New Research Vessel R/V Sikuliaq

    Science.gov (United States)

    Whitledge, T. E.

    2011-12-01

    The research vessel R/V Sikuliaq (pronounced [see-KOO-lee-auk]) is currently being constructed on behalf of the NSF to support future scientific studies in high latitude waters. The 261 foot global class vessel will be capable of breaking 2.5 foot thick ice at 2 knots with an endurance of 45 days at sea and cruising at 11 knots. The R/V Sikuliaq will have a beam of 52 feet and a draft of 18.9 feet that will carry 26 scientists and a crew of 20. Berthing accommodations are a combination of single/double rooms with one stateroom and the common areas of the vessel are designed for ADA access and accommodations. The total laboratory space (main, analytical, electronics, wet, upper, and Baltic room will be 2100 square feet. The 4360 square foot working deck that is approximately 70 feet in length will accommodate 2-4 vans and multiple science operations. The vessel design strives to have the lowest possible environmental impact, including a low underwater-radiated noise signature. The science systems are prescribed to be state-of-the-art for bottom mapping, over-the-side "hands free" gear handling, broad band communications and scientific walk-in freezer and environmental chamber. More details and photos of the construction progress are available on the website at www.sfos.uaf.edu/arrv. The tentative shipyard schedule has a launch date of June 2012 and delivery to the University of Alaska Fairbanks in June 2013. Scientific operations following trials and testing is planned to start in January 2014. A Sikuliaq science planning workshop has been arranged for 18-19 February 2012 in Salt Lake City, UT just prior to the 2012 Ocean Sciences meeting. Interested participants should contact Terry Whitledge (terry@ims.uaf.edu).

  16. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  17. Acceptance criteria for the evaluation of nuclear power reactor security plans

    International Nuclear Information System (INIS)

    1982-08-01

    This guidance document contains acceptance criteria to be used in the NRC license review process. It contains specific criteria for use in evaluating the acceptability of nuclear power reactor security programs as detailed in security plans

  18. Tools for an effective annual review of the Security Management Plan.

    Science.gov (United States)

    Daniel, Matthew

    2014-01-01

    A hospital's Security Management Plan, required by the Joint Commission, can also be used by security management professionals, the author points out, to ensure that they are continually monitoring and improving the program in a changing healthcare environment.

  19. Nevada National Security Site Integrated Groundwater Sampling Plan, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene

    2018-03-01

    The purpose is to provide a comprehensive, integrated approach for collecting and analyzing groundwater samples to meet the needs and objectives of the DOE/EM Nevada Program’s UGTA Activity. Implementation of this Plan will provide high-quality data required by the UGTA Activity for ensuring public protection in an efficient and cost-effective manner. The Plan is designed to ensure compliance with the UGTA Quality Assurance Plan (QAP) (NNSA/NFO, 2015); Federal Facility Agreement and Consent Order (FFACO) (1996, as amended); and DOE Order 458.1, Radiation Protection of the Public and the Environment (DOE, 2013). The Plan’s scope comprises sample collection and analysis requirements relevant to assessing both the extent of groundwater contamination from underground nuclear testing and impact of testing on water quality in downgradient communities. This Plan identifies locations to be sampled by CAU and location type, sampling frequencies, sample collection methodologies, and the constituents to be analyzed. In addition, the Plan defines data collection criteria such as well purging, detection levels, and accuracy requirements/recommendations; identifies reporting and data management requirements; and provides a process to ensure coordination between NNSS groundwater sampling programs for sampling analytes of interest to UGTA. Information used in the Plan development—including the rationale for selection of wells, sampling frequency, and the analytical suite—is discussed under separate cover (N-I, 2014) and is not reproduced herein. This Plan does not address compliance for those wells involved in a permitted activity. Sampling and analysis requirements associated with these wells are described in their respective permits and are discussed in NNSS environmental reports (see Section 5.2). In addition, sampling for UGTA CAUs that are in the Closure Report (CR) stage are not included in this Plan. Sampling requirements for these CAUs are described in the CR

  20. A guide for developing an ADP security plan for Navy Finance Center, Cleveland, Ohio

    OpenAIRE

    Barber, Daniel E.; Hodnett, Elwood Thomas, Jr.

    1982-01-01

    Approved for public release; distribution is unlimited This paper is intended to be used as a guide by personnel at the Navy Finance Center (NFC) Cleveland, Ohio in developing an Automatic Data Processing (ADP) Security Plan. An effort has been made to combine the requirements for an ADP security plan established by OPNAVINST5239.1A with pertinent information from other selected readings. The importance of the devotion of personnel, time and funds to ADP security planning has been emphas...

  1. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    This thesis proposes to overhaul the state and urban area homeland security strategy program by improving the strategic planning process guidance and assistance and strategy review in collaboration...

  2. 76 FR 30374 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-25

    ... http://www.regulations.gov on or before July 25, 2011 or reach the Docket Management Facility by that... that occur on the vessel, and provide law enforcement officials in the course and scope of an... industry best practices for placement and retention of video recording devices exist? If yes, please...

  3. 78 FR 13691 - Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security Program

    Science.gov (United States)

    2013-02-28

    ...-level approach would enable the Coast Guard to apply traditional inspection methods to newly reflagged... enrolled MSP vessels would continue to be inspected by the Coast Guard in a manner similar to traditional... oversight, and evaluations of Authorized Class Society (ACS) survey activities. We received eight public...

  4. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    Science.gov (United States)

    2015-12-01

    two decades have demonstrated that attacks of this type are indeed possible, and that current security measures may not be sufficient to mitigate such...attack by small surface crafts. The past two decades have demonstrated that attacks of this type are indeed possible, and that current security measures ...xiii LIST OF ACRONYMS AND ABBREVIATIONS ADAPT AP ARA AT/FP COTS DARPA DOD DODINST EF-21 GPS GUI IEEE ISR LCS LiDAR LTE MAC MAGTF

  5. State and Urban Area Homeland Security Plans and Exercises: Issues for the 110th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2007-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans and the conduct of exercises to test the plans...

  6. State and Urban Area Homeland Security Plans and Exercises: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Reese, Shawn

    2006-01-01

    ... for both terrorist attacks and natural disasters. Two potential activities that Congress might choose to focus on are the certification of state and urban area homeland security plans, and the conduct of exercises to test the plans...

  7. Comparison of API 510 pressure vessels inspection planning with API 581 risk-based inspection planning approaches

    International Nuclear Information System (INIS)

    Shishesaz, Mohammad Reza; Nazarnezhad Bajestani, Mohammad; Hashemi, Seyed Javad; Shekari, Elahe

    2013-01-01

    To ensure mechanical integrity, all pressure vessels shall be inspected at the intervals provided in inspection codes or based on a risk-based inspection (RBI) assessment. The RBI assessment may allow previously established inspection intervals to be extended. This paper describes the methodology, analysis and results of two RBI studies conducted on 293 pressure vessel components in two crude oil distillation units. Based on API RBI methodology in API 581 (2008), risk target concept was used for determining inspection dates. It was shown that when thinning is the major active damage, the RBI recommended intervals are as long as twice the API 510 intervals. This paper summarizes that, as a fundamental step in the risk calculation, RBI has a more defined methodology for evaluating equipment for multiple damage mechanisms and a more defined approach to specify the use of other inspection technologies beyond the traditional visual, ultrasonic, and radiography tests. -- Highlights: • RBI calculated inspection intervals are as long as twice of API 510 inspection code. • Two case studies verified the advantage of RBI in inspection planning. • RBI is a more reliable methodology when evaluating multiple damage mechanisms. • Damage factor calculations can be used for determining RSFa value in FFS assessments

  8. Cost-Benefit Analysis Methodology: Install Commercially Compliant Engines on National Security Exempted Vessels?

    Science.gov (United States)

    2015-11-05

    environment track record. Commercial compliance measures are checked to ensure the vessel can meet all intact and damage stability (center of gravity...From NAVSEA, the authors would like to thank Mr. Abe Boughner (NAVSEA 05D4); and Mr. Philip McCormick and Mr. Brittany Basilone, [NAVSEA 05C...sourceapportionmentbpttsd.pdf US EPA, 40 CFR 94 (Title 40—Protection of Environment , Chapter I – EPA, Subchapter C – Air Programs, Part 94 – Control

  9. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Science.gov (United States)

    2010-07-26

    ... National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... National Health Security Strategy (NHSS) of the United States of America (2009) and build upon the NHSS Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  10. 48 CFR 652.239-70 - Information Technology Security Plan and Accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Information Technology... Clauses 652.239-70 Information Technology Security Plan and Accreditation. As prescribed in 639.107-70(a), insert the following provision: Information Technology Security Plan and Accreditation (SEP 2007) All...

  11. 48 CFR 1252.239-71 - Information technology security plan and accreditation.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information technology... Provisions and Clauses 1252.239-71 Information technology security plan and accreditation. As prescribed in (TAR) 48 CFR 1239.70, insert the following provision: Information Technology Security Plan and...

  12. Plan on test to failure of a prestressed concrete containment vessel model

    International Nuclear Information System (INIS)

    Takumi, K.; Nonaka, A.; Umeki, K.; Nagata, K.; Soejima, M.; Yamaura, Y.; Costello, J.F.; Riesemann, W.A. von.; Parks, M.B.; Horschel, D.S.

    1992-01-01

    A summary of the plans to test a prestressed concrete containment vessel (PCCV) model to failure is provided in this paper. The test will be conducted as a part of a joint research program between the Nuclear Power Engineering Corporation (NUPEC), the United States Nuclear Regulatory Commission (NRC), and Sandia National Laboratories (SNL). The containment model will be a scaled representation of a PCCV for a pressurized water reactor (PWR). During the test, the model will be slowly pressurized internally until failure of the containment pressure boundary occurs. The objectives of the test are to measure the failure pressure, to observe the mode of failure, and to record the containment structural response up to failure. Pre- and posttest analyses will be conducted to forecast and evaluate the test results. Based on these results, a validated method for evaluating the structural behavior of an actual PWR PCCV will be developed. The concepts to design the PCCV model are also described in the paper

  13. Considerations to Enhance the Florida Domestic Security Strategic Plan

    Science.gov (United States)

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  14. 76 FR 44880 - Security Zone; Escorted Vessels in Captain of the Port Ohio Valley Zone

    Science.gov (United States)

    2011-07-27

    ... potential terrorist acts and would enhance public and maritime safety and security. DATES: Comments and... coast of Yemen and the prior attack on the USS COLE demonstrate the maritime terrorism threat. These attacks manifest a continuing threat to U.S. maritime assets as described in the President's finding in...

  15. Analysis of the security during power system expansion planning

    Directory of Open Access Journals (Sweden)

    Osak Alexey

    2017-01-01

    Full Text Available Increasing the intelligent level of the EPS control systems, caused by the implementation of Smart technologies, changes the structure and the properties of EPS and increases the importance of system reliability analysis. System reliability analysis includes two components – for the balance and for the regime. On the one hand, there is a large number of studies to assess the reliability of the power system, which examines various aspects and methods of solving this problem. On the other hand, in Russia there is no generally accepted methodology with clear criteria that could be used for feasibility studies of various technical solutions taking into consideration system reliability aspects. In practice, the security analysis is limited by the calculations of power flows, static and dynamic stability for a number of forecast periods for the normal and repair circuits considering the most severe disturbances. The existing approach allows defining the requirements and adjusting emergency control systems, but does not allow evaluating and comparing solutions for power grid constructions. The authors propose a new method for power system reliability evaluation, which is suitable for planning development and operation of power systems. The method includes a general description of the algorithm which allows to compare various development scenarios, as well as to assess the reliability level of their implementation. In particular, the method allows to determine where it is needed only the relay protection and emergency control system development, and where it is necessary grid, protection and control development and reconstruction.

  16. Bechtel Hanford, Inc. Network Security Plan for the Environmental Restoration Contract

    International Nuclear Information System (INIS)

    Slade, B.E.

    2000-01-01

    This document was created to address ERC computer security needs that are outlined by DOE Order 1360.2B, Unclassified Computer Security Program. DOE Order 1360.2B has been canceled and replaced with DOE Notice 205.1, Unclassified Cyber Security Program. The ERC response to DOE Notice 205.1 is to generate BHI-01343, Cyber Security Program Plan, which is not available for public access or viewing

  17. Hepatic vessel segmentation for 3D planning of liver surgery experimental evaluation of a new fully automatic algorithm.

    Science.gov (United States)

    Conversano, Francesco; Franchini, Roberto; Demitri, Christian; Massoptier, Laurent; Montagna, Francesco; Maffezzoli, Alfonso; Malvasi, Antonio; Casciaro, Sergio

    2011-04-01

    The aim of this study was to identify the optimal parameter configuration of a new algorithm for fully automatic segmentation of hepatic vessels, evaluating its accuracy in view of its use in a computer system for three-dimensional (3D) planning of liver surgery. A phantom reproduction of a human liver with vessels up to the fourth subsegment order, corresponding to a minimum diameter of 0.2 mm, was realized through stereolithography, exploiting a 3D model derived from a real human computed tomographic data set. Algorithm parameter configuration was experimentally optimized, and the maximum achievable segmentation accuracy was quantified for both single two-dimensional slices and 3D reconstruction of the vessel network, through an analytic comparison of the automatic segmentation performed on contrast-enhanced computed tomographic phantom images with actual model features. The optimal algorithm configuration resulted in a vessel detection sensitivity of 100% for vessels > 1 mm in diameter, 50% in the range 0.5 to 1 mm, and 14% in the range 0.2 to 0.5 mm. An average area overlap of 94.9% was obtained between automatically and manually segmented vessel sections, with an average difference of 0.06 mm(2). The average values of corresponding false-positive and false-negative ratios were 7.7% and 2.3%, respectively. A robust and accurate algorithm for automatic extraction of the hepatic vessel tree from contrast-enhanced computed tomographic volume images was proposed and experimentally assessed on a liver model, showing unprecedented sensitivity in vessel delineation. This automatic segmentation algorithm is promising for supporting liver surgery planning and for guiding intraoperative resections. Copyright © 2011 AUR. Published by Elsevier Inc. All rights reserved.

  18. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    Science.gov (United States)

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  19. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... Maritime Transportation Security Act (MTSA) on international voyages through or in designated high risk... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  20. Performance of evaluation techniques for planning preventive repair of leakages on BWR vessel stub tubes

    International Nuclear Information System (INIS)

    Prat, J.P.

    1985-01-01

    Stub tubes have been installed on the control rod drive assemblies of the majority of boiling water reactor vessel bottoms. These stub tubes can undergo a slow process of cracking, producing no potential hazard but occasional plant unavailability due to leakage in excess of specification limits. In the case considered here, the development and application of remotely controlled equipment permitting access both from inside and outside the housing, and of crack evolution and location techniques, has made the progressive development, selection and planning of repairs a possibility, thus minimizing the risk of leakages appearing between refuelling outages. The example used here is of a Nuclear Power Plant in which a first leak appeared in 1981. Since that time extensive and progressive laboratory and field development work has been carried out. This paper presents the experience gained with customized, remote-control inspection equipment, and several developed or adapted techniques, as the basis for an in-service repair decision tree, the case in question being that of a BWR plant in which a cracking process, not affecting safety but potentially affecting availability, has given rise to leaks after ten years of operation

  1. 75 FR 54026 - Salvage and Marine Firefighting Requirements; Vessel Response Plans for Oil

    Science.gov (United States)

    2010-09-03

    ... information for resource providers for each vessel with appropriate equipment and resources located in each... appropriate salvage and marine firefighting resources were identified and available for responding to...

  2. Strategic Sustainability Performance Plan. Discovering Sustainable Solutions to Power and Secure America’s Future

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2010-09-01

    Sustainability is fundamental to the Department of Energy’s research mission and operations as reflected in the Department’s Strategic Plan. Our overarching mission is to discover the solutions to power and secure America’s future.

  3. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  4. State and Urban Area Homeland Security Strategy v3.0: Evolving Strategic Planning

    National Research Council Canada - National Science Library

    Chen, Darren

    2006-01-01

    ... with state and local stakeholders. Federal state and local reviewers regard the current state and urban homeland security strategies as generally inadequate and indicative of limited strategic planning processes...

  5. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  6. Interim format and content for a physical security plan for nuclear power plants

    International Nuclear Information System (INIS)

    1977-02-01

    The document serves as interim guidance to assist the licensee or applicant in the preparation of a physical security plan. It is to be used in conjunction with interim acceptance criteria for physical security programs, which will be distributed at a later date

  7. New fire and security rules change USA nuclear power plant emergency plans

    International Nuclear Information System (INIS)

    Garrou, A.L.

    1978-01-01

    New safety and security rules for nuclear power plants have resulted from the Energy Reorganisation Act and also from a review following the Browns Ferry fire. The content of the emergency plan which covers personnel, plant, site, as well as a general emergency, is outlined. New fire protection rules, the plan for security, local and state government assistance are also discussed, with a brief reference to the impact of the new rules on continuity of operations. (author)

  8. Alternate Futures for 2025: Security Planning to Avoid Surprise

    National Research Council Canada - National Science Library

    Engelbrecht, Joseph

    1996-01-01

    .... The methodology details how the study participants identified the three drivers, created the strategic planning space, selected the worlds of interest, created the plausible histories, and developed...

  9. Design of security scheme of the radiotherapy planning administration system based on the hospital information system

    International Nuclear Information System (INIS)

    Zhuang Yongzhi; Zhao Jinzao

    2010-01-01

    Objective: To design a security scheme of radiotherapy planning administration system. Methods: Power Builder 9i language was used to program the system through the model of client-server machine. Oracle 9i was used as the database server. Results In this system, user registration management, user login management, application-level functions of control, database access control, and audit trail were designed to provide system security. Conclusions: As a prototype for the security analysis and protection of this scheme provides security of the system, application system, important data and message, which ensures the system work normally. (authors)

  10. Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan.

    Science.gov (United States)

    Sahi, Aqeel; Lai, David; Li, Yan

    2016-11-01

    Cloud computing was introduced as an alternative storage and computing model in the health sector as well as other sectors to handle large amounts of data. Many healthcare companies have moved their electronic data to the cloud in order to reduce in-house storage, IT development and maintenance costs. However, storing the healthcare records in a third-party server may cause serious storage, security and privacy issues. Therefore, many approaches have been proposed to preserve security as well as privacy in cloud computing projects. Cryptographic-based approaches were presented as one of the best ways to ensure the security and privacy of healthcare data in the cloud. Nevertheless, the cryptographic-based approaches which are used to transfer health records safely remain vulnerable regarding security, privacy, or the lack of any disaster recovery strategy. In this paper, we review the related work on security and privacy preserving as well as disaster recovery in the eHealth cloud domain. Then we propose two approaches, the Security-Preserving approach and the Privacy-Preserving approach, and a disaster recovery plan. The Security-Preserving approach is a robust means of ensuring the security and integrity of Electronic Health Records, and the Privacy-Preserving approach is an efficient authentication approach which protects the privacy of Personal Health Records. Finally, we discuss how the integrated approaches and the disaster recovery plan can ensure the reliability and security of cloud projects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  11. 10 CFR 72.186 - Change to physical security and safeguards contingency plans.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Change to physical security and safeguards contingency... contingency plans. (a) The licensee shall make no change that would decrease the safeguards effectiveness of... licensee safeguards contingency plan without prior approval of the Commission. A licensee desiring to make...

  12. 29 CFR 2509.75-3 - Interpretive bulletin relating to investments by employee benefit plans in securities of...

    Science.gov (United States)

    2010-07-01

    ... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... Interpretive bulletin relating to investments by employee benefit plans in securities of registered investment.... That section provides that an investment by an employee benefit plan in securities issued by an...

  13. 75 FR 54025 - Vessel and Facility Response Plans for Oil: 2003 Removal Equipment Requirements and Alternative...

    Science.gov (United States)

    2010-09-03

    ... responders for each vessel or facility with appropriate equipment and resources located in each zone of operation; specific lists of equipment that the resource providers will make available in case of an...

  14. Background Information for the Nevada National Security Site Integrated Sampling Plan, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene; Marutzky, Sam

    2014-12-01

    This document describes the process followed to develop the Nevada National Security Site (NNSS) Integrated Sampling Plan (referred to herein as the Plan). It provides the Plan’s purpose and objectives, and briefly describes the Underground Test Area (UGTA) Activity, including the conceptual model and regulatory requirements as they pertain to groundwater sampling. Background information on other NNSS groundwater monitoring programs—the Routine Radiological Environmental Monitoring Plan (RREMP) and Community Environmental Monitoring Program (CEMP)—and their integration with the Plan are presented. Descriptions of the evaluations, comments, and responses of two Sampling Plan topical committees are also included.

  15. Contraceptive security, information flow, and local adaptations: family planning Morocco.

    Science.gov (United States)

    Chandani, Y; Breton, G

    2001-12-01

    Many developing countries increasingly recognize and acknowledge family planning as a critical part of socio-economic development. However, with few health dollars to go around, countries tend to provide essential drugs for curative care, rather than for family planning products. Donors have historically provided free contraceptives for family planning services. Whether products are donated or purchased by the country, a successful family planning program depends on an uninterrupted supply of products, beginning with the manufacturer and ending with the customer. Any break in the supply chain may cause a family planning program to fail. A well-functioning logistics system can manage the supply chain and ensure that the customers have the products they need, when they need them. Morocco was selected for the case study. The researchers had ready access to key informants and information about the Logistics Management Information System. Because the study had time and resource constraints, research included desktop reviews and interview, rather than data collection in the field. The case study showed that even in a challenging environment an LMIS can be successfully deployed and fully supported by the users. It is critical to customize the system to a country-specific situation to ensure buy-in for the implementation. Significant external support funding and technical expertise are critical components to ensure the initial success of the system. Nonetheless, evidence from the case study shows that, after a system has been implemented, the benefits may not ensure its institutionalization. Other support, including local funding and technical expertise, is required.

  16. Plan Nacional de Desarrollo y Seguridad 1971-1975 (National Plan for Development and Security, 1971-1975).

    Science.gov (United States)

    Boletin del Centro Nacional de Documentacion e Informacion Educativa, 1971

    1971-01-01

    This article discusses the education provisions established in the Argentine Plan for Development and Security (1971-1975). The statements on educational development call for a diagnostic study of the current cultural and educational situation, the establishment of objectives and strategies, goals for each level of education, steps for the…

  17. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  18. TMI-2 reactor-vessel head removal and damaged-core-removal planning

    International Nuclear Information System (INIS)

    Logan, J.A.; Hultman, C.W.; Lewis, T.J.

    1982-01-01

    A major milestone in the cleanup and recovery effort at TMI-2 will be the removal of the reactor vessel closure head, planum, and damaged core fuel material. The data collected during these operations will provide the nuclear power industry with valuable information on the effects of high-temperature-dissociated coolant on fuel cladding, fuel materials, fuel support structural materials, neutron absorber material, and other materials used in reactor structural support components and drive mechanisms. In addition, examination of these materials will also be used to determine accident time-temperature histories in various regions of the core. Procedures for removing the reactor vessel head and reactor core are presented

  19. Visits to Australia by nuclear powered or armed vessels: contingency planning for the accidental release of ionizing radiation

    International Nuclear Information System (INIS)

    1989-01-01

    The report refers to the adequacy of current contingency planning by the Australian Federal and Senate authorities to deal with the accidental release of ionizating radiation from visiting nuclear powered or armed vessels in Australian waters and ports. Much of the material was obtained in response to questions put in writing by the Senate Standing Committee to the Department of Defence, ANSTO and others. In addition, the report contains relevant information from Commonwealth documents as well as the Committee findings and recommendations. Issues considered include: types of visiting nuclear powered vessels, accident likelihood and consequences, differences between naval and land-based reactors, safety records. The persons or organizations who made submissions or appeared in all public hearings are listed in the appendixes, along with all visits to Australian ports by nuclear powered warships from 1976 to 1988

  20. FORMATION OF FINANCIAL SECURITY OF THE ENTERPRISE BASED ON STRATEGIC PLANNING

    Directory of Open Access Journals (Sweden)

    Nadiya Rushchyshyn

    2017-09-01

    Full Text Available The purpose of the study is to improve ways of forming financial security of the enterprise based onstrategic planning. The subject of the research: formation of financial security of the enterprise on the basis of strategicplanning. The methodological background of the research is a set of theoretical and general scientific methods:analysis and synthesis, theoretical and logical generalization, grouping, abstraction, and others. The paper providesa general description of the core approaches defining the concept of “financial security of the enterprise”. Functionalgoals of financial security of the enterprise are outlined, namely: ensuring financial stability and independence;achievement of high competitiveness in the market of goods, works, services; ensuring high efficiency of financialand economic activity; ensuring high liquidity of assets, and increasing the market value of the enterprise; supportfor the appropriate level of business activity and image; formation of information security and commercialsecrets; efficient organization of security of share capital and assets of the enterprise. The scheme of organizationof financial security organization is considered based on strategic planning. It is determined that the strategicplanning results in strategic plan (strategy for ensuring the financial security of the enterprise. Such a strategyshould be consistent with both financial and the company’s overall strategies, as well as main goals and objectives.For the most effective implementation of the chosen financial security strategy at the enterprise, it is expedientto develop and implement a system of plans covering all aspects of the strategic planning process, including thetarget program, strategic, tactical, calendar, and individual plans. The system of plans should specify: the purpose ofchanges in the functioning of internal systems of the enterprise; terms of making changes; the work that needs tobe done to make changes; their

  1. The Security Plan for the Joint Euratom/IAEA Remote Monitoring Network

    International Nuclear Information System (INIS)

    Stronkhorst, J.; Schoop, K.; Ruuska, K.; Kurek, S.; Levert, J.F.

    2015-01-01

    The European Commission and the IAEA have installed surveillance systems in all larger civil European nuclear facilities. The monitoring data is gathered by optical surveillance systems, electronic sealing systems and numerous measuring devices. The on-site joint Euratom/IAEA monitoring networks operate in general completely isolated from the operator's IT systems. To largely improve data security and reliability, remote data transmission (RDT) is installed on a growing number of sites, and the inspection data is daily transferred to the Data Collect Servers in Luxembourg and Vienna. A growing number of RDT connections and a growing number of security threats require an IT security policy that is pro-active as well as reactive in an efficient way. The risk based approach used in setting up the security plans assesses all elements of the monitoring network, from the implemented technical solution and the assessment of the security needs and threats, up to the incident handling and lessons learned. The results of the assessments are, for each individual RDT connection, described in the technical paragraphs and annexes, including system descriptions, network plans and contact information. The principles of secure data handling as implemented in the shared Euratom /IAEA monitoring network can apply to a broad range of industrial monitoring systems, where human interaction is in general the largest security risk. (author)

  2. Compliance with federal and state regulations regarding the emergency response plan and physical security plan at the Oregon State TRIGA reactor

    International Nuclear Information System (INIS)

    Johnson, A.G.; Ringle, J.C.; Anderson, T.V.

    1976-01-01

    Recent legislative actions within the State of Oregon have had a significant impact upon the OSU TRIGA Emergency Response Plan, and to a lesser extent upon the Physical Security Plan. These state imposed changes will be reviewed in light of existing federal requirements. With the upcoming acquisition of FLIP fuel in August 1976, NRC required several major changes to the existing Physical Security Plan. Within the limitations of public disclosure, these changes will be contrasted to the present plan. (author)

  3. Development of automated welding process for field fabrication of thick walled pressure vessels: management plan

    International Nuclear Information System (INIS)

    1979-01-01

    A Westinghouse Electric Corp. management plan is presented that consists of the following: management structure; management processes; contract work breakdown structure; schedules; cost plan; contract change control procedures; and government owned property

  4. Fast Generation of Near-Optimal Plans for Eco-Efficient Stowage of Large Container Vessels

    DEFF Research Database (Denmark)

    Pacino, Dario; Delgado, Alberto; Jensen, Rune Møller

    2011-01-01

    Eco-efficient stowage plans that are both competitive and sustainable have become a priority for the shipping industry. Stowage planning is NP-hard and is a challenging optimization problem in practice. We propose a new 2-phase approach that generates near-optimal stowage plans and fulfills indus...

  5. Underground Test Area Activity Communication/Interface Plan, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States); Rehfeldt, Kenneth [Navarro, Las Vegas, NV (United States)

    2016-10-01

    The purpose of this plan is to provide guidelines for effective communication and interfacing between Underground Test Area (UGTA) Activity participants, including the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) and its contractors. This plan specifically establishes the following: • UGTA mission, vision, and core values • Roles and responsibilities for key personnel • Communication with stakeholders • Guidance in key interface areas • Communication matrix

  6. US energy security plans threatened by militant Venezuela

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Faced with the need to import increasing volumes of crude oil and the desire to avoid over-dependence on the Middle East, the United States is looking to its own hemisphere for more oil. Unfortunately for Washington, the continent's largest oil exporter does not appear to want to co-operate. Venezuela's President, Hugo Chavez, wants to reduce his country's political and economic ties with the US and is seeking other markets for its oil. He has also picked a fight with US oil companies operating in Venezuela, disputing their taxes and refusing to approve their upstream investment programmes, giving rise to fears that oil and gas production will not grow as planned, thereby reducing future export levels. (author)

  7. Planning for Success: Constructing a First Responder Planning Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Jankowski, Thaddeus K., Sr

    2005-01-01

    .... This thesis argues that the fire service and others in the first responder community will be able to contribute to homeland security missions much more effectively, and efficiently, by switching...

  8. Information security in academic libraries: the role of the librarian in planning and introducing institutional policies

    Directory of Open Access Journals (Sweden)

    Juliana Soares Lima

    2017-04-01

    Full Text Available This study presents a short discussion about the role of the librarian as a mediator at planning, developing and implementing an Information Security Policy in Academic Libraries, by working together with professionals in the field of Information Technology. It also discusses the main virtual threats and some risks that are prone to infect computers in libraries. Based on the current legislation and on some normative documents about information security, it is confirmed the importance of the librarian take part in the main decision-making related to information security, such as planning a consistent Information Security Policy which be able to see the specific needs of Academic Libraries as institutions prone to cyberattacks. The main topics and guidelines to carry out an Information Security Policy are presented based on the results that were obtained through an action research, by visiting libraries to fill in application forms and to compose reports whose content was analyzed. Finally, the study concludes that Information Security Policy must be validated by managers of sectors or departments which the Academic Library is hierarchically subordinate to.

  9. Homeland Security is Hometown Security: Comparison and Case Studies of Vertically Synchronized Catastrophe Response Plans

    Science.gov (United States)

    2015-09-01

    Hurricanes Andrew, Hugo , and Katrina resonate as failures where there was little, if any, federal response in the initial hours, which left the depleted...was also initiated by several large scale incidents, including the Three Mile Island Disaster and Hurricanes Hugo and Andrew.67 This evolved at the...persist during large scale disasters, as was demonstrated during Hurricane Katrina and Super Storm Sandy. Catastrophe response planning at the

  10. Integrated Food and Nutrition Security Programming to Address Undernutrition : The Plan Approach

    NARCIS (Netherlands)

    Boer, de F.A.; Verdonk, I.

    2012-01-01

    From a technical point of view, it is widely recognised that an integrated approach to food and nutrition security is an effective way to promote child nutritional well-being. In this desk review, based on project documents of the countries which took part in the PLAN NL supported Food and Nutrition

  11. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    Energy Technology Data Exchange (ETDEWEB)

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material.

  12. Acceptance criteria for the evaluation of Category 1 fuel cycle facility physical security plans

    International Nuclear Information System (INIS)

    Dwyer, P.A.

    1991-10-01

    This NUREG document presents criteria developed from US Nuclear Regulatory Commission regulations for the evaluation of physical security plans submitted by Category 1 fuel facility licensees. Category 1 refers to those licensees who use or possess a formula quantity of strategic special nuclear material

  13. 75 FR 10973 - Hazardous Materials: Risk-Based Adjustment of Transportation Security Plan Requirements

    Science.gov (United States)

    2010-03-09

    ... (explosive) material; (3) More than 1 L (1.06 qt.) per package of a material poisonous by inhalation in... controlled; and 6.1 materials poisonous by inhalation. We also proposed to require security plans for any... happens very rapidly, and in the process, the propane combines readily with air to form fuel air mixtures...

  14. 76 FR 80205 - Instituting a National Action Plan On Women, Peace, And Security

    Science.gov (United States)

    2011-12-23

    ... strengthen its efforts to prevent--and protect women and children from--harm, exploitation, discrimination... systems through the integration of gender perspectives, and invest in women and girls' health, education... Instituting a National Action Plan On Women, Peace, And Security By the authority vested in me as President by...

  15. Energy planning and security of supply in Spain and their compliance with the European legal framework

    International Nuclear Information System (INIS)

    Dolader, J.

    2004-01-01

    The electricity and gas markets in Spain were liberalized by the 1997 Electricity Act and the 1998 Hydrocarbons Act, respectively. The final step of the liberalization process was completed in January 2003 with the full eligibility of Spanish electricity and gas consumers. The liberalization Acts include in addition a two-way long-term energy planning process within a ten-year time scope. On the one hand the planning process involves binding planning concerning the so called 'basic infrastructures' (which include the electricity and gas transmission networks plus the total re-gasification capacity), and on the other hand, an indicative energy planning aimed at facilitating the decision making of administrations and agents by forecasting energy demand, and analyzing its coverage under the premises of security of supply. The present paper describes the current energy planning system in Spain, the provisions to ensure the security of supply and their compliance with the new European legislation - both the proposed and the existent one - regarding the security of supply in the EU.(author)

  16. Exclusión y seguridad social en el plan de desarrollo Exclusion and social security in the Development Plan

    Directory of Open Access Journals (Sweden)

    Rodríguez Salazar Oscar

    1999-06-01

    Full Text Available Este articulo analiza la forma en que el Plan de Desarrollo "Cambio para contruir la Paz" trata el sistema de seguridad social y su interpretacion sobre las causas de la exclusion social. El plan carece de una vision de conjunto del sistema por cuanto no aborda los aspectos reisgos profesionles y pensiones; articula el concepto de solidaridad a las relaciones interpersonales y, asi, subestima el papel del Estado en el logro de esa meta. Por otra parte, las politicas laborales esbozadas en el Plan conducen en forma inexorable a una mayor exclusion social. En cuanto al sistema de seguridad social en salud, dado que la cobertura se ha extendido mediante el regimen subsidiado, la ausencia de una politica que promueva el control social puede acentuar la clientelizacion que Estado manifiesta querer combatir.This article analyzes the way that the Development Plan "Changeto Build Peace" treats the social security system and its interpretation of the causes of social exclusion. The Plan lacks a vision of the system as a whole as it does not address the aspects of professional risks and pensions; it articula tes the concept of solidarity to interpersonal relations and thus underestimates the role of the State in achieving that goal. Moreover, the labor policies outlined in the Plan lead inexorably to greater social exclusion. As far as the social security system for health, given that coverage has been extended by meansof the subsidized regime, the absence of a policy that promotes social control may accentuate the clientelization of the State which the Plan claims to want to combato.

  17. CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Nielsen, Roy S. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-02

    3d Imagination is a new company that bases its business on selling and improving 3d open source related hardware. The devices that they sell include 3d imagers, 3d printers, pick and place machines and laser etchers. They have a fast company intranet for ease in sharing, storing and printing large, complex 3d designs. They have an employee set that requires a variety of operating systems including Windows, Mac and a variety of Linux both for running business services as well as design and test machines. There are a wide variety of private networks for testing transfer rates to and from the 3d devices, without interference with other network tra c. They do video conferencing conferencing with customers and other designers. One of their machines is based on the project found at delta.firepick.org(Krassenstein, 2014; Biggs, 2014), which in future, will perform most of those functions. Their devices all include embedded systems, that may have full blown operating systems. Most of their systems are designed to have swappable parts, so when a new technology is born, it can be quickly adopted by people with 3d Imagination hardware. This company is producing a fair number of systems and components, however to get the funding they need to mass produce quality parts, so they are preparing for an IPO to raise the funds they need. They would like to have a cyber-security audit performed so they can give their investors con dence that they are protecting their data, customers information and printers in a proactive manner.

  18. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  19. Bechtel Hanford, Inc. network security plan for the environmental restoration contract

    International Nuclear Information System (INIS)

    McCaffrey, M.B.

    1997-01-01

    As part of the Computer Protection Program, this Network Security Plan identifies the specific security measures used to protect the Bechtel Hanford, Inc. (BHI) enterprise network. The network consists of the communication infrastructure and information systems used by BHI to perform work related to the Environmental Restoration Contract (ERC) at the Hanford Site. It provides electronic communication between the ERC-leased facilities in Richland, Washington and other facilities located on the Hanford Site. Network gateways to other site and offsite networks provide electronic communication with the rest of the Hanford community. The enterprise network is comprised of several individual networks that operate under different conditions and perform different functions. The principal network used by BHI is the Bechtel Local Area Network (BLAN). This document identifies specific security issues surrounding the BLAN and the measures BHI takes to protect it. The other BHI-operated networks are discussed from the perspective of the security impact they have on the BLAN. This plan addresses security for individual and shared computer systems connected to the BHI networks as well as the gateways between other site and external networks. It specifically does not address computer-based information systems that store or process particularly sensitive data, computer systems connected to other site networks (e.g., Hanford Local Area Network), or standalone computers located in ERC facilities

  20. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2011-05-17

    ... determination based on the fact that the security zones created by this rule will only be in effect during the... its effects on them and participate in the rulemaking process. Small businesses may send comments on... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2009-1134] RIN 1625...

  1. Careful treatment planning enables safe ablation of liver tumors adjacent to major blood vessels by percutaneous irreversible electroporation (IRE).

    Science.gov (United States)

    Kos, Bor; Voigt, Peter; Miklavcic, Damijan; Moche, Michael

    2015-09-01

    Irreversible electroporation (IRE) is a tissue ablation method, which relies on the phenomenon of electroporation. When cells are exposed to a sufficiently electric field, the plasma membrane is disrupted and cells undergo an apoptotic or necrotic cell death. Although heating effects are known IRE is considered as non-thermal ablation technique and is currently applied to treat tumors in locations where thermal ablation techniques are contraindicated. The manufacturer of the only commercially available pulse generator for IRE recommends a voltage-to-distance ratio of 1500 to 1700 V/cm for treating tumors in the liver. However, major blood vessels can influence the electric field distribution. We present a method for treatment planning of IRE which takes the influence of blood vessels on the electric field into account; this is illustrated on a treatment of 48-year-old patient with a metastasis near the remaining hepatic vein after a right side hemi-hepatectomy. Output of the numerical treatment planning method shows that a 19.9 cm3 irreversible electroporation lesion was generated and the whole tumor was covered with at least 900 V/cm. This compares well with the volume of the hypodense lesion seen in contrast enhanced CT images taken after the IRE treatment. A significant temperature raise occurs near the electrodes. However, the hepatic vein remains open after the treatment without evidence of tumor recurrence after 6 months. Treatment planning using accurate computer models was recognized as important for electrochemotherapy and irreversible electroporation. An important finding of this study was, that the surface of the electrodes heat up significantly. Therefore the clinical user should generally avoid placing the electrodes less than 4 mm away from risk structures when following recommendations of the manufacturer.

  2. Long-term optimal energy mix planning towards high energy security and low GHG emission

    International Nuclear Information System (INIS)

    Thangavelu, Sundar Raj; Khambadkone, Ashwin M.; Karimi, Iftekhar A.

    2015-01-01

    Highlights: • We develop long-term energy planning considering the future uncertain inputs. • We analyze the effect of uncertain inputs on the energy cost and energy security. • Conventional energy mix prone to cause high energy cost and energy security issues. • Stochastic and optimal energy mix show benefits over conventional energy planning. • Nuclear option consideration reduces the energy cost and carbon emissions. - Abstract: Conventional energy planning focused on energy cost, GHG emission and renewable contribution based on future energy demand, fuel price, etc. Uncertainty in the projected variables such as energy demand, volatile fuel price and evolution of renewable technologies will influence the cost of energy when projected over a period of 15–30 years. Inaccurate projected variables could affect energy security and lead to the risk of high energy cost, high emission and low energy security. The energy security is an ability of generation capacity to meet the future energy demand. In order to minimize the risks, a generic methodology is presented to determine an optimal energy mix for a period of around 15 years. The proposed optimal energy mix is a right combination of energy sources that minimize the risk caused due to future uncertainties related to the energy sources. The proposed methodology uses stochastic optimization to address future uncertainties over a planning horizon and minimize the variations in the desired performance criteria such as energy security and costs. The developed methodology is validated using a case study for a South East Asian region with diverse fuel sources consists of wind, solar, geothermal, coal, biomass and natural gas, etc. The derived optimal energy mix decision outperformed the conventional energy planning by remaining stable and feasible against 79% of future energy demand scenarios at the expense of 0–10% increase in the energy cost. Including the nuclear option in the energy mix resulted 26

  3. Collaborative Adaptation Planning for Water Security: Preliminary Lessons, Challenges, and the Way Forward for Maipo Basin Adaptation Plan, Chile

    Science.gov (United States)

    Vicuna, S.; Scott, C. A.; Bonelli, S.; Bustos, E.; Meza, F. J.

    2014-12-01

    The Maipo basin holds 40% of Chile's total population and almost half of the country's Gross Domestic Product. The basin is located in the semiarid central region of the country and, aside from the typical pressures of growth in developing country basins, the Maipo river faces climate change impacts associated with a reduction in total runoff and changes in its seasonality. Surface water is the main water source for human settlements and economic activities including agriculture. In 2012 we started a research project to create a climate variability and climate change adaptation plan for the basin. The pillars of the plan are co-produced by researchers and a Scenario Building Team (SBT) with membership of relevant water and land use stakeholders (including from civil society, public and private sectors) in the basin. Following similar experiences in other regions in the world that have faced the challenges of dealing with long term planning under uncertainty, the project has divided the task of developing the plan into a series of interconnected elements. A critical first component is to work on the desired vision(s) of the basin for the future. In this regards, the "water security" concept has been chosen as a framework that accommodates all objectives of the SBT members. Understanding and quantifying the uncertainties that could affect the future water security of the basin is another critical aspect of the plan. Near and long term climate scenarios are one dimension of these uncertainties that are combined with base development uncertainties such as urban growth scenarios. A third component constructs the models/tools that allows the assessment of impacts on water security that could arise under these scenarios. The final critical component relates to the development of the adaptation measures that could avoid the negative impacts and/or capture the potential opportunities. After two years in the development of the adaptation plan a series of results has been

  4. Bio-inspired motion planning algorithms for autonomous robots facilitating greater plasticity for security applications

    Science.gov (United States)

    Guo, Yi; Hohil, Myron; Desai, Sachi V.

    2007-10-01

    Proposed are techniques toward using collaborative robots for infrastructure security applications by utilizing them for mobile sensor suites. A vast number of critical facilities/technologies must be protected against unauthorized intruders. Employing a team of mobile robots working cooperatively can alleviate valuable human resources. Addressed are the technical challenges for multi-robot teams in security applications and the implementation of multi-robot motion planning algorithm based on the patrolling and threat response scenario. A neural network based methodology is exploited to plan a patrolling path with complete coverage. Also described is a proof-of-principle experimental setup with a group of Pioneer 3-AT and Centibot robots. A block diagram of the system integration of sensing and planning will illustrate the robot to robot interaction to operate as a collaborative unit. The proposed approach singular goal is to overcome the limits of previous approaches of robots in security applications and enabling systems to be deployed for autonomous operation in an unaltered environment providing access to an all encompassing sensor suite.

  5. Planning of vessel grafts for reconstructive surgery in congenital heart diseases

    Science.gov (United States)

    Rietdorf, U.; Riesenkampff, E.; Schwarz, T.; Kuehne, T.; Meinzer, H.-P.; Wolf, I.

    2010-02-01

    The Fontan operation is a surgical treatment for patients with severe congenital heart diseases, where a biventricular correction of the heart can't be achieved. In these cases, a uni-ventricular system is established. During the last step of surgery a tunnel segment is placed to connect the inferior caval vein directly with the pulmonary artery, bypassing the right atrium and ventricle. Thus, the existing ventricle works for the body circulation, while the venous blood is passively directed to the pulmonary arteries. Fontan tunnels can be placed intra- and extracardially. The location, length and shape of the tunnel must be planned accurately. Furthermore, if the tunnel is placed extracardially, it must be positioned between other anatomical structures without constraining them. We developed a software system to support planning of the tunnel location, shape, and size, making pre-operative preparation of the tunnel material possible. The system allows for interactive placement and adjustment of the tunnel, affords a three-dimensional visualization of the virtual Fontan tunnel inside the thorax, and provides a quantification of the length, circumferences and diameters of the tunnel segments. The visualization and quantification can be used to plan and prepare the tunnel material for surgery in order to reduce the intra-operative time and to improve the fit of the tunnel patch.

  6. Emergency medical consequence planning and management for national special security events after September 11: Boston 2004.

    Science.gov (United States)

    Kade, Kristy A; Brinsfield, Kathryn H; Serino, Richard A; Savoia, Elena; Koh, Howard K

    2008-10-01

    The post-September 11 era has prompted unprecedented attention to medical preparations for national special security events (NSSE), requiring extraordinary planning and coordination among federal, state, and local agencies. For an NSSE, the US Secret Service (USSS) serves as the lead agency for all security operations and coordinates with relevant partners to provide for the safety and welfare of participants. For the 2004 Democratic National Convention (DNC), designated an NSSE, the USSS tasked the Boston Emergency Medical Services (BEMS) of the Boston Public Health Commission with the design and implementation of health services related to the Convention. In this article, we describe the planning and development of BEMS' robust 2004 DNC Medical Consequence Management Plan, addressing the following activities: public health surveillance, on-site medical care, surge capacity in the event of a mass casualty incident, and management of federal response assets. Lessons learned from enhanced medical planning for the 2004 DNC may serve as an effective model for future mass gathering events.

  7. Underground Test Area Quality Assurance Project Plan Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Irene Farnham

    2011-05-01

    This Quality Assurance Project Plan (QAPP) provides the overall quality assurance (QA) program requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) Sub-Project (hereafter the Sub-Project) activities. The requirements in this QAPP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). The QAPP Revision 0 supersedes DOE--341, Underground Test Area Quality Assurance Project Plan, Nevada Test Site, Nevada, Revision 4.

  8. Fast Generation of Container Vessel Stowage Plans:Using mixed integer programming for optimal master planning and constraint based local search for slot planning

    OpenAIRE

    Pacino, Dario

    2012-01-01

    Containerization has changed the way the world perceives shipping. It is now possible to establish complex international supply chains that have minimized shipping costs. Over the past two decades, the demand for cost efficient containerized transportation has seen a continuous increase. In order to answer to this demand, shipping companies have deployed bigger container vessels, that nowadays can transport up to 18,000 containers and are wider than the extended Panama Canal. Like busses, con...

  9. Coast guard : better logistics planning needed to aid operational decisions related to the deployment of the national security cutter and its support assets.

    Science.gov (United States)

    2009-07-01

    As part of its more than $$24 billion Deepwater program to replace aging vessels and aircraft with new or upgraded assets, the Coast Guard is preparing the National Security Cutter (NSC) for service. GAO previously reported on Deepwater assets' deplo...

  10. Theater Security Cooperation Planning with Article 98: How the 2002 Servicemembers' Protection Act Fosters China's Quest for Global Influence

    National Research Council Canada - National Science Library

    Hernandez, Jaime A

    2005-01-01

    The Combatant Commander is hindered in constructing Theater Security Cooperation plans due to the restrictions placed upon foreign military aid dispersal as a result of the 2002 American Servicemembers' Protection Act...

  11. Ex-vessel remote maintenance development plans for the Burning Plasma Experiment

    International Nuclear Information System (INIS)

    Burgess, T.W.; Davis, F.C.

    1991-01-01

    Remote maintenance (RM) is fundamental to the basic design requirements of the Burning Plasma Experiment (BPX), and an extensive RM development and demonstration program is planned to meet these requirements. The program first draws from the experience base that exists in the fission community and Europe's Joint European Torus (JET) Project. Successful solutions are applied where possible and, in many cases, improved in order to achieve the performance demanded by a multiyear program that must be capable of efficiently executing RM procedures. Early, concurrent efforts in the design and fabrication of prototype remote handling (RH) equipment, remote tooling, and maintainable machine components will precede an extensive use of mock-up equipment in order to test, develop, and demonstrate the technology. 7 refs,. 5 figs

  12. Soil Management Plan for the Oak Ridge Y-12 National Security Complex Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2005-03-02

    This Soil Management Plan applies to all activities conducted under the auspices of the National Nuclear Security Administration (NNSA) Oak Ridge Y-12 National Security Complex (Y-12) that involve soil disturbance and potential management of waste soil. The plan was prepared under the direction of the Y-12 Environmental Compliance Department of the Environment, Safety, and Health Division. Soil disturbances related to maintenance activities, utility and building construction projects, or demolition projects fall within the purview of the plan. This Soil Management Plan represents an integrated, visually oriented, planning and information resource tool for decision making involving excavation or disturbance of soil at Y-12. This Soil Management Plan addresses three primary elements. (1) Regulatory and programmatic requirements for management of soil based on the location of a soil disturbance project and/or the regulatory classification of any contaminants that may be present (Chap. 2). Five general regulatory or programmatic classifications of soil are recognized to be potentially present at Y-12; soil may fall under one or more these classifications: (a) Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) pursuant to the Oak Ridge Reservation (ORR) Federal Facilities Agreement; (b) Resource Conservation and Recovery Act (RCRA); (c) RCRA 3004(u) solid waste managements units pursuant to the RCRA Hazardous and Solid Waste Amendments Act of 1984 permit for the ORR; (d) Toxic Substances and Control Act-regulated soil containing polychlorinated biphenyls; and (e) Radiologically contaminated soil regulated under the Atomic Energy Act review process. (2) Information for project planners on current and future planned remedial actions (RAs), as prescribed by CERCLA decision documents (including the scope of the actions and remedial goals), land use controls implemented to support or maintain RAs, RCRA post-closure regulatory requirements for

  13. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  14. MRP-227 Reactor vessel internals inspection planning and initial results at the Oconee nuclear station unit 2

    International Nuclear Information System (INIS)

    Davidsaver, S.B.; Fyfitch, S.; Whitaker, D.E.; Doss, R.L.

    2015-01-01

    The U.S. PWR industry has pro-actively developed generic inspection requirements and standards for reactor vessel (RV) internals. The Electric Power Research Institute (EPRI) Pressurized Water Reactor (PWR) Materials Reliability Program (MRP) has issued MRP-227-A and MRP-228 with mandatory and needed requirements based on the Nuclear Energy Institute (NEI) document NEI 03-08. The inspection and evaluation guidelines contained in MRP-227-A consider eight age-related degradation mechanisms: stress corrosion cracking (SCC), irradiation-assisted stress corrosion cracking (IASCC), wear, fatigue, thermal aging embrittlement, irradiation embrittlement, void swelling and irradiation growth, and thermal and irradiation-enhanced stress relaxation or irradiation-enhanced creep. This paper will discuss the decision planning efforts required for implementing the MRP-227-A and MRP-228 requirements and the results of these initial inspections at the Oconee Nuclear power station (ONS) units. Duke Energy and AREVA overcame a significant technology and NDE challenge by successfully completing the first-of-a-kind MRP-227-A scope requirements at ONS-1 in one outage below the estimated dose and with zero safety issues or events. This performance was repeated at ONS-2 a year later. The remote NDE tooling and processes developed to examine the MRP-227-A scope for ONS-1 and ONS-2 are transferable to other PWRs

  15. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada.

    Science.gov (United States)

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.

  16. Y-12 National Security Complex National Historic Preservation Act Historic Preservation Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    The Historic Preservation Plan (HPP) recognizes that the Y-12 National Security Complex is a vital and long-term component of DOE and NNSA. In addition to NNSA missions, the Office of Science and Energy, the Office of Nuclear Energy, and the Office of Environmental Management have properties located at Y-12 that must be taken into consideration. The HPP also recognizes that the challenge for cultural resource management is incorporating the requirements of NNSA, SC, NE, and EM missions while preserving and protecting its historic resources. The HPP seeks to find an effective way to meet the obligations at Y-12 for historic and archeological protection while at the same time facilitating effective completion of ongoing site mission activities, including removal of obsolete or contaminated facilities, adaptive reuse of existing facilities whenever feasible, and construction of new facilities in order to meet site mission needs. The Y-12 Historic Preservation Plan (HPP) defines the preservation strategy for the Y-12 National Security Complex and will direct efficient compliance with the NHPA and federal archaeological protection legislation at Y-12 as DOE and NNSA continues mission activities of the site.

  17. Vessel Operating Units (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data for vessels that are greater than five net tons and have a current US Coast Guard documentation number. Beginning in1979, the NMFS...

  18. 33 CFR 90.3 - Pushing vessel and vessel being pushed: Composite unit.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pushing vessel and vessel being... HOMELAND SECURITY INLAND NAVIGATION RULES INLAND RULES: INTERPRETATIVE RULES § 90.3 Pushing vessel and vessel being pushed: Composite unit. Rule 24(b) of the Inland Rules states that when a pushing vessel and...

  19. 33 CFR 82.3 - Pushing vessel and vessel being pushed: Composite unit.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pushing vessel and vessel being... HOMELAND SECURITY INTERNATIONAL NAVIGATION RULES 72 COLREGS: INTERPRETATIVE RULES § 82.3 Pushing vessel and vessel being pushed: Composite unit. Rule 24(b) of the 72 COLREGS states that when a pushing vessel and a...

  20. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    Energy Technology Data Exchange (ETDEWEB)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services.

  1. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    International Nuclear Information System (INIS)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services

  2. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada

    Directory of Open Access Journals (Sweden)

    Myriam Fillion

    2014-08-01

    Full Text Available Background: Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives: To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR, Northwest Territories (NWT, Canada. Design: A qualitative study using group discussions during a workshop. Methods: A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results: The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a capacity building within communities; (b promotion of the use of traditional foods to address food security; (c research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions: The results of the planning workshop provide a blueprint for future research and intervention projects.

  3. 75 FR 12250 - Notification of the Imposition of Conditions of Entry for Certain Vessels Arriving to the United...

    Science.gov (United States)

    2010-03-15

    ..., 2010. ADDRESSES: This notice will be available for inspection and copying at the Docket Management... conducted pursuant to the provisions of 46 U.S.C. 70108 and the International Ship and Port Facility... five port calls. Vessels must: Implement measures per the ship's security plan equivalent to ``Security...

  4. Protecting nuclear power plants. Chapter 2. On the importance of the security and safety of the reactor pressure vessel to external threats

    International Nuclear Information System (INIS)

    Ballesteros, A.; Gonzalez, J.; Debarberis, L.

    2006-01-01

    Nuclear power plants have blong been recognized as potential targets of terrorist attacks, and critics have long questioned the adequacy of the existing measures to defend against such attacks. The 11-S 2001, 11-M 2004 and 7-J 2005 attacks in USA, Spain and UK illustrated the deadly intention and abilities of modern terrorist groups. These attacks also brought to surface long standing concerns about the vulnerability of nuclear installations to possible terrorist attacks. Commercial nuclear reactors contain large inventory of radioactive fission products which, if dispersed, could pose a direct radiation hazard on the population. The reactor pressure vessel (RPV), which contains the nuclear fuel, is the most critical component of the plant. This paper shows that small amount of explosive material can produce irreversible damage in the RPV and the release of radioactive material. Therefor, access of working personal to the vicinity of the RPV during the refuelling outage should be stricktly limited. It should be considered a high priority security issue

  5. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 2

    Energy Technology Data Exchange (ETDEWEB)

    Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2015-06-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office (NNSA/NFO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1D, Change 1, Quality Assurance (DOE, 2013a); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). If a participant’s requirement document differs from this QAP, the stricter requirement will take precedence. NNSA/NFO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  6. Underground Test Area Activity Quality Assurance Plan Nevada National Security Site, Nevada. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States); Krenzien, Susan [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2012-10-01

    This Quality Assurance Plan (QAP) provides the overall quality assurance (QA) requirements and general quality practices to be applied to the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) Underground Test Area (UGTA) activities. The requirements in this QAP are consistent with DOE Order 414.1C, Quality Assurance (DOE, 2005); U.S. Environmental Protection Agency (EPA) Guidance for Quality Assurance Project Plans for Modeling (EPA, 2002); and EPA Guidance on the Development, Evaluation, and Application of Environmental Models (EPA, 2009). NNSA/NSO, or designee, must review this QAP every two years. Changes that do not affect the overall scope or requirements will not require an immediate QAP revision but will be incorporated into the next revision cycle after identification. Section 1.0 describes UGTA objectives, participant responsibilities, and administrative and management quality requirements (i.e., training, records, procurement). Section 1.0 also details data management and computer software requirements. Section 2.0 establishes the requirements to ensure newly collected data are valid, existing data uses are appropriate, and environmental-modeling methods are reliable. Section 3.0 provides feedback loops through assessments and reports to management. Section 4.0 provides the framework for corrective actions. Section 5.0 provides references for this document.

  7. The Evolution of Missile Defense Plan from Bush to Obama. Implications for the National Security of Romania

    Directory of Open Access Journals (Sweden)

    Ruxandra-Laura BOSILCA

    2012-06-01

    Full Text Available In 2011 Romania officially became part of the Obama administration’s missile defense system in Europe which has significantly changed the strategic military relations both in Europe and worldwide. The Bush approach has been revised and progress in several sections has been achieved, both strategically and technically. For Romania, the participation in the missile defence plan, ensures more solid security guarantees, especially in an unpredictable and risk-prone international environment where the U.S. reconsiders its presence in Europe under the pressure of the economic crisis and of a relative decline in power; it has also become a more visible actor – alongside Bulgaria – which were initially excluded by the Bush missile defence plan. This paper’s purpose is to review the main evolutions of the missile defense plan from the Bush to the Obama administration and to outline its implications on the national security of Romania.

  8. Test and Evaluation for Enhanced Security: A Quantitative Method to Incorporate Expert Knowledge into Test Planning Decisions.

    Energy Technology Data Exchange (ETDEWEB)

    Rizzo, Davinia [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Blackburn, Mark [Stevens Inst. of Technology, Hoboken, NJ (United States)

    2017-03-01

    Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper covers the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).

  9. Computer Security: Governmentwide Planning Process Had Limited Impact. Report to the Chairman, Committee on Science, Space, and Technology, House of Representatives.

    Science.gov (United States)

    General Accounting Office, Washington, DC. Information Management and Technology Div.

    As required by the Computer Security Act of 1987, federal agencies have to identify systems that contain sensitive information and develop plans to safeguard them. The planning process was assessed in 10 civilian agencies as well as the extent to which they had implemented planning controls described in 22 selected plans. The National Institute of…

  10. Understand the Big Picture So You Can Plan for Network Security

    Science.gov (United States)

    Cervone, Frank

    2005-01-01

    This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…

  11. Computer and Network Security in Small Libraries: A Guide for Planning.

    Science.gov (United States)

    Williams, Robert L.

    This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…

  12. [Security of hospital infusion practices: From an a priori risk analysis to an improvement action plan].

    Science.gov (United States)

    Pignard, J; Cosserant, S; Traore, O; Souweine, B; Sautou, V

    2016-03-01

    Infusion in care units, and all the more in intensive care units, is a complex process which can be the source of many risks for the patient. Under cover of an institutional approach for the improvement of the quality and safety of patient healthcare, a risk mapping infusion practices was performed. The analysis was focused on intravenous infusion situations in adults, the a priori risk assessment methodology was applied and a multidisciplinary work group established. Forty-three risks were identified for the infusion process (prescription, preparation and administration). The risks' assessment and the existing means of control showed that 48% of them would have a highly critical patient security impact. Recommendations were developed for 20 risks considered to be most critical, to limit their occurrence and severity, and improve their control level. An institutional action plan was developed and validated in the Drug and Sterile Medical Devices Commission. This mapping allowed the realization of an exhaustive inventory of potential risks associated with the infusion. At the end of this work, multidisciplinary groups were set up to work on different themes and regular quarterly meetings were established to follow the progress of various projects. Risk mapping will be performed in pediatric and oncology unit where the risks associated with the handling of toxic products is omnipresent. Copyright © 2015 Académie Nationale de Pharmacie. Published by Elsevier Masson SAS. All rights reserved.

  13. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  14. Resolution of the reactor vessel materials toughness safety issue; Task Action Plan A-11; Appendices C-K

    International Nuclear Information System (INIS)

    Johnson, R.E.

    1981-09-01

    The central problem in the Unresolved Safety Issue A-11, 'Reactor Vessel Materials Toughness,' was to provide guidance in performing analyses for reactor pressure vessels (RPVs) which fail to meet the toughness requirements during service life as a result of neutron radiation embrittlement. A technical team of recognized experts was organized to assist the NRC staff in addressing the problem. Using the foundation of the tearing modulus concept, which has been developed under earlier NRC sponsorship, relationships were obtained which provided approximate solutions to the RPV fracture problem with assumed beltline region flaws. Volume I of this report is a brief presentation of the problem and the results; Volume II provides the detailed technical foundations

  15. Research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, P.S.

    The role of the research vessels as a tool for marine research and exploration is very important. Technical requirements of a suitable vessel and the laboratories needed on board are discussed. The history and the research work carried out...

  16. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Science.gov (United States)

    2010-07-01

    ... Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...) Operating procedures; (d) Plan to provide a visible mail screening operation; (e) Training mail center...) Managing threats; (h) Communications plan; (i) Occupant Emergency Plan (OEP); (j) Continuity of Operations...

  17. Corrective Action Plan for Corrective Action Unit 562: Waste Systems, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    2011-01-01

    This Corrective Action Plan has been prepared for Corrective Action Unit (CAU) 562, Waste Systems, in accordance with the Federal Facility Agreement and Consent Order (1996; as amended March 2010). CAU 562 consists of 13 Corrective Action Sites (CASs) located in Areas 2, 23, and 25 of the Nevada National Security Site. Site characterization activities were performed in 2009 and 2010, and the results are presented in Appendix A of the Corrective Action Decision Document for CAU 562. The scope of work required to implement the recommended closure alternatives is summarized. (1) CAS 02-26-11, Lead Shot, will be clean closed by removing shot. (2) CAS 02-44-02, Paint Spills and French Drain, will be clean closed by removing paint and contaminated soil. As a best management practice (BMP), asbestos tile will be removed. (3) CAS 02-59-01, Septic System, will be clean closed by removing septic tank contents. As a BMP, the septic tank will be removed. (4) CAS 02-60-01, Concrete Drain, contains no contaminants of concern (COCs) above action levels. No further action is required; however, as a BMP, the concrete drain will be removed. (5) CAS 02-60-02, French Drain, was clean closed. Corrective actions were completed during corrective action investigation activities. As a BMP, the drain grates and drain pipe will be removed. (6) CAS 02-60-03, Steam Cleaning Drain, will be clean closed by removing contaminated soil. As a BMP, the steam cleaning sump grate and outfall pipe will be removed. (7) CAS 02-60-04, French Drain, was clean closed. Corrective actions were completed during corrective action investigation activities. (8) CAS 02-60-05, French Drain, will be clean closed by removing contaminated soil. (9) CAS 02-60-06, French Drain, contains no COCs above action levels. No further action is required. (10) CAS 02-60-07, French Drain, requires no further action. The french drain identified in historical documentation was not located during corrective action investigation

  18. 77 FR 4573 - Maritime Security Directive 104-6 (Rev 6); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2012-01-30

    ... political complexity. Despite these efforts, piracy persists and the combination of piracy and weak rule of... Development, Naval Criminal Investigative Service, Customs and Border Protection, Transportation Security...

  19. National Plan to Achieve Maritime Domain Awareness for the National Strategy for Maritime Security

    National Research Council Canada - National Science Library

    2005-01-01

    Maritime Domain Awareness (MDA) is the effective understanding of anything associated with the global maritime domain that could impact the security, safety, economy, or environment of the United States...

  20. 33 CFR 155.1050 - Response plan development and evaluation criteria for vessels carrying groups I through IV...

    Science.gov (United States)

    2010-07-01

    ... qualified individual; and (2) Within 30 minutes of a discovery of a discharge or substantial threat of... a discharge in advance of the arrival of response resources identified in the plan for tiers 1, 2... shoreline protection operations. (1) The response resources must include the quantities of boom listed in...

  1. 76 FR 2402 - Maritime Security Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2011-01-13

    ... Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... designated high risk waters, and provides additional counter-piracy guidance and mandatory measures for these... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  2. 75 FR 29358 - Maritime Security Directive 104-6 (Rev 2 and 3); Guidelines for U.S. Vessels Operating in High...

    Science.gov (United States)

    2010-05-25

    ... designated high risk waters, and provides additional anti-piracy guidance and mandatory measures for these vessels operating in these areas where acts of piracy and armed robbery against ships are prevalent... piratical activities. The combination of piracy and weak rule of law in the region offers a potential...

  3. Corrective Action Investigation Plan for Corrective Action Unit 573: Alpha Contaminated Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick

    2014-05-01

    Corrective Action Unit (CAU) 573 is located in Area 5 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 573 is a grouping of sites where there has been a suspected release of contamination associated with non-nuclear experiments and nuclear testing. This document describes the planned investigation of CAU 573, which comprises the following corrective action sites (CASs): • 05-23-02, GMX Alpha Contaminated Area • 05-45-01, Atmospheric Test Site - Hamilton These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives.

  4. Higher Education as a Matter of National Security: Can a Democracy Plan Ahead?

    Science.gov (United States)

    Skaggs, David

    2014-01-01

    What is often viewed as the fairly arcane business of determining and administering higher education policy is a matter of great national interest and, actually, a matter of national security. It thus makes a difference for American society in ways you may not have considered. The ability of the United States to protect itself and its interests…

  5. Nuclear power reactor security personnel training and qualification plan reviewer workbook

    International Nuclear Information System (INIS)

    1979-06-01

    The Training and Qualification Plan Reviewer Workbook has been developed to provide the information required for evaluating the adequacy of the Training and Qualification (T and Q) Plans developed to meet the requirements of 10 CFR 73.55(b)(4) and 10 CFR 73, Appendix B

  6. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    International Nuclear Information System (INIS)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G.

    2013-01-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  7. Russian Federation’s plans to deploy nuclear weapons in Crimea: the possible consequences for Ukraine and European security

    Directory of Open Access Journals (Sweden)

    O. S. Vonsovych

    2016-06-01

    Full Text Available The article investigates the possible consequences for Ukraine and European security in case of deploying by Russian Federation nuclear weapons in Crimea. It was determined that under current conditions of confrontation between Ukraine and Russia such actions could further complicate the process of resolving the situation in the east of our country and threaten the implementation of peace initiatives regarding the resumption of constructive dialogue. It was found that the reluctance to disclose or hide the real intentions of Russia produces around Ukraine’s borders space of uncertainty and danger. This directly threatens the national security of our state and continue to make use of the power factor in relations with the Russian Federation. It is proved that Ukraine needs to do more emphasis on their own national identity and opportunities to prove its independence with regard to solving such questions. Substantiated the thesis that the European community should now take the necessary measures to prevent the development of the Russian Federation’s plans regarding the deployment of nuclear weapons in Crimea. This will give the opportunity to avoid misunderstandings and create a ground to prevent the destabilization of the European security system.

  8. Virtual reality in the creation of a tool to support planning of physical security at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Santo, Andre Cotelli do E.; Mol, Antonio Carlos de A.; Goncalves, Deise Galvao de S.; Marins, Eugenio; Freitas, Victor Goncalves G., E-mail: cotelli.andre@gmail.com, E-mail: mol@ien.gov.br, E-mail: deise.galvao@gmail.com, E-mail: eugenio@ien.gov.br, E-mail: vgoncalves@ien.gov.br [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio De Janeiro, RJ (Brazil)

    2013-07-01

    In recent years was observed the importance of improving the physical security of nuclear facilities, mainly due to the increasing advancement of brazilian nuclear program. The present work aims to develop a tool that allows the visualization and planning of action strategies in a virtual environment, in order to improve this security. To this end, was created a virtual model of the Instituto de Engenharia Nuclear (IEN), which is located on Ilha do Fundao - Rio de Janeiro - Brazil. This environment is a three-dimensional model, with representations close to reality, where virtual characters (avatars) can move and interact in real time. In this virtual world, it was developed a dynamic weather system, where is possible to change between day and night, and climate changes such as: rain, storms, snow, among other features. Furthermore, the tool has a surveillance system using virtual cameras, allowing the monitoring of the environment. This way, making possible to simulate strategies approach, allowing an evaluation of the procedures performed, as well as assisting in the training of security installations subject to radiation. (author)

  9. Multi-Organizational Collaborative Public Safety and Security Planning for the 2010 Vancouver Winter Games

    Science.gov (United States)

    2012-10-01

    intermediaries bridging the gap between safety and security officials. The OCS also had the closest relationship to the three main organizations in the...a clearly shared mission and boundary-spanning personnel that are able to bridge organizational cultures and adapt to the complex challenges...commandement et contrôle) et le transfert des connaissances à partir d’événements semblables passés ou en fonction d’événements futurs. Pendant

  10. Analysis of Marine Corps renewable energy planning to meet installation energy security requirements

    OpenAIRE

    Chisom, Christopher M.; Templenton, Jack C., II

    2013-01-01

    Approved for public release; distribution is unlimited. The purpose of this thesis is to analyze Marine Corps installation energy consumption and the pursuit of increased renewable energy generation goals across Marine Corps installations. The main objective of this report is to determine the cost of interruption and the net present value (NPV) of renewable energy generation needed to meet the Marine Corps energy security objectives. First, we determine installation-specific energy consump...

  11. Transportation Secure Data Center: Real-World Data for Planning, Modeling, and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    2018-01-19

    The Transportation Secure Data Center (TSDC) at www.nrel.gov/tsdc provides free, web-based access to detailed transportation data from a variety of travel surveys conducted across the nation. While preserving the privacy of survey participants, this online repository makes vital transportation data broadly available to users from the comfort of their own desks via a secure online connection. Data Available through the TSDC: Maintained by the U.S. Department of Energy's National Renewable Energy Laboratory (NREL) in partnership with the U.S. Department of Transportation (DOT), the TSDC houses data from travel surveys and studies conducted using global positioning system (GPS) devices. It features millions of data points - second-by-second GPS readings, vehicle characteristics (if applicable), and demographics - for all modes of travel. NREL screens the initial data for quality control, translates each data set into a consistent format, and interprets the data for spatial analysis. NREL's processing routines add information on vehicle fuel economy and road grades and join data points to the road network.

  12. USCG Vessel

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  13. Asian Security Challenges-Planning in the Face of Strategic Uncertainties. Volume 2. Appendices

    Science.gov (United States)

    1994-10-01

    marketing franchises and sharing core competencies where it makes sense to do so. Finally, they take a swipe at traditional strategic planning, criticizing...Richard P. "How Much Does Industry Matter?" Strategic Management Journal, no. 12 (1991), pp. 167-85 (UNCLASSIFIED). "Theory, Strategy and Entrepreneurship

  14. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  15. CARTOGRAPHICAL-GEOINFORMATICAL SECURITY OF TERRITORIAL PLANNING IN THE RUSSIAN FEDERATION

    Directory of Open Access Journals (Sweden)

    A. N. Panin

    2017-01-01

    Full Text Available The adoption of the town planning code of the Russian Federation in 2004, started the modern stage of spatial planning in Russia at all administrative-territorial levels. Despite the fact that it was more than 12 years ago, the system of preparation documents of territorial planning and zoning has continued the path of improvement [Chistobaev, 2013]. Quite significant aspects of these documents preparation is related to the cartographic unit. Over the period there has been a qualitative shift in the preparation of the documents that is connected first of all with an increasing role of geographic information systems, and strengthening synchronization of documents of various administrative and territorial rank, including due to transition to a unified cartographic basis [Skaterschikov, 2007].It is important to note that in the post-Soviet period, actually work on the documents of spatial planning in the country has conducted. Thus, the first stage after a significant break was characterized by misunderstandings on the part of authorities of “customer” role and significance of this document on the one hand, and the other, was associated with the shortage of specialists, which was simply not enough for large-scale operation in the country. These problems led to what in fact was complete absence of current methods and requirements for the formation of the documents. So the preparation of the graphic part was limited at best, issuing paper copies and receiving electronic copies of maps as raster images.The second stage is characterized by a number of positive trends – first, the town planning code of the Russian Federation has undergone significant changes and second, there has been put into effect additional normative legal acts, guidelines governing the preparation of the documents related to the software shells, and meeting the needs of the Federal Service for State Registration, Cadastre and Cartography of the Russian Federation. Since the

  16. 33 CFR 157.450 - Maneuvering and vessel status information.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Interim Measures for Certain Tank Vessels Without Double Hulls Carrying Petroleum Oils...

  17. SMART Security Cooperation Objectives: Improving DoD Planning and Guidance

    Science.gov (United States)

    2016-01-01

    been validated, they would constitute the basis for dis- cussions with defense industry representatives, providing them with a clear idea of DoD...tasks, which constitute the basic steps required to achieve effects. These stra- tegic tasks are evaluated by measures of performance, resources...Serbia Slovakia Slovenia Sweden Turkey Ukraine Vatican Wales EUCOM Findings 51 well as in the Joint Strategic Capabilities Plan. At the CCMD level

  18. 17 CFR 230.701 - Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and...

    Science.gov (United States)

    2010-04-01

    ... irrevocable election to defer is made. (iii) Derivative securities. In calculating outstanding securities for..., must be delivered. (6) If the sale involves a stock option or other derivative security, the issuer... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales...

  19. Nuclear power plant pressure vessels. Inservice inspections

    International Nuclear Information System (INIS)

    1995-01-01

    The requirements for the planning and reporting of inservice inspections of nuclear power plant pressure vessels are presented. The guide specifically applies to inservice inspections of Safety class 1 and 2 nuclear power plant pressure vessels, piping, pumps and valves plus their supports and reactor pressure vessel internals by non- destructive examination methods (NDE). Inservice inspections according to the Pressure Vessel Degree (549/73) are discussed separately in the guide YVL 3.0. (4 refs.)

  20. Streamlined Approach for Environmental Restoration Plan for Corrective Action Unit 574: Neptune, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2011-08-31

    This Streamlined Approach for Environmental Restoration (SAFER) Plan identifies the activities required for closure of Corrective Action Unit (CAU) 574, Neptune. CAU 574 is included in the Federal Facility Agreement and Consent Order (FFACO) (1996 [as amended March 2010]) and consists of the following two Corrective Action Sites (CASs) located in Area 12 of the Nevada National Security Site: (1) CAS 12-23-10, U12c.03 Crater (Neptune); (2) CAS 12-45-01, U12e.05 Crater (Blanca). This plan provides the methodology for the field activities that will be performed to gather the necessary information for closure of the two CASs. There is sufficient information and process knowledge regarding the expected nature and extent of potential contaminants to recommend closure of CAU 574 using the SAFER process. Based on historical documentation, personnel interviews, site process knowledge, site visits, photographs, field screening, analytical results, the results of the data quality objective (DQO) process (Section 3.0), and an evaluation of corrective action alternatives (Appendix B), closure in place with administrative controls is the expected closure strategy for CAU 574. Additional information will be obtained by conducting a field investigation to verify and support the expected closure strategy and provide a defensible recommendation that no further corrective action is necessary. This will be presented in a Closure Report that will be prepared and submitted to the Nevada Division of Environmental Protection (NDEP) for review and approval.

  1. 75 FR 56015 - Vessel Inspection Alternatives

    Science.gov (United States)

    2010-09-15

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 46 CFR Part 8 Vessel Inspection Alternatives CFR... Certificate; (ii) International Tonnage Certificate; (iii) Cargo Ship Safety Construction Certificate; (iv) Cargo Ship Safety Equipment Certificate; and (v) International Oil Pollution Prevention Certificate; and...

  2. Containment vessel

    International Nuclear Information System (INIS)

    Zbirohowski-Koscia, K.F.; Roberts, A.C.

    1980-01-01

    A concrete containment vessel for nuclear reactors is disclosed that is spherical and that has prestressing tendons disposed in first, second and third sets, the tendons of each set being all substantially concentric and centred around a respective one of the three orthogonal axes of the sphere; the tendons of the first set being anchored at each end at a first anchor rib running around a circumference of the vessel, the tendons of the second set being anchored at each end at a second anchor rib running around a circumference of the sphere and disposed at 90 0 to the first rib, and the tendons of the third set being anchored some to the first rib and the remainder to the second rib. (author)

  3. Planning method for integration and expansion of renewable energy sources with special attention to security supply in distribution system

    Energy Technology Data Exchange (ETDEWEB)

    Cerda-Arias, Jose Luis

    2012-07-01

    Today's structure of power systems with competitive wholesale markets for electricity encourages the introduction of new agents and products, customers with self-generating capacity and the specialization of generators, network operators and power suppliers. Furthermore one has to take into account the variation of the fossil fuel prices in the world market, which even anticipates the closeness of its scarcity, the instability of the fulfilment of contracts, and the existence of import restrictions. In addition the implementation of policies aiming to control CO{sub 2} emissions, and efficient use of energy plus the advent of more efficient technologies have to be incorporated in new network expansion projects. These are forcing utilities and society to seek new forms of electric system expansion without affecting their economic growth. This expresses a challenge to sustain such a growth changing the vision for the power system and the required security of electricity supply, usually based on internal factors of the electric sector, without considering the connection between the current transmission and distribution networks, the uncertainties related to the competition in the electricity market and the effect of distributed generation units. The high penetration of distributed generation resources, based on renewable energy sources, is increasingly observed worldwide and it depends on the cost of the technologies, market design, and subsidies. On that account, it is necessary to find alternatives and offers to develop a sustainable strategic plan for power system expansion. Currently, efforts are oriented to develop planning models which consider the income of power generation based on renewable energy sources founded on these new requirements, bearing in mind the relationship between the competitive markets and the power system planning. In this Thesis a general planning method for the expansion of the power grids is proposed. This planning method should

  4. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  5. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  6. Vacuum vessel for thermonuclear device

    International Nuclear Information System (INIS)

    Kikuchi, Mitsuru; Nagashima, Keisuke; Suzuki, Masaru; Onozuka, Masaki.

    1997-01-01

    A vacuum vessel main body and structural members at the inside and the outside of the vacuum vessel main body are constituted by structural materials activated by irradiation of neutrons from plasmas such as stainless steels. Shielding members comprising tungsten or molybdenum are disposed on the surface of the vacuum vessel main body and the structural members of the inside and the outside of the main body. The shielding members have a function also as first walls or a seat member for the first walls. Armor tiles may be disposed to the shielding members. The shielding members and the armor tiles are secured to a securing seat member disposed, for example, to an inner plate of the vacuum vessel main body by bolts. Since the shielding members are disposed, it is not necessary to constitute the vacuum vessel main body and the structural members at the inside and the outside thereof by using a low activation material which is less activated, such as a titanium alloy. (I.N.)

  7. Vacuum vessel for thermonuclear device

    Energy Technology Data Exchange (ETDEWEB)

    Kikuchi, Mitsuru; Nagashima, Keisuke [Japan Atomic Energy Research Inst., Tokyo (Japan); Suzuki, Masaru; Onozuka, Masaki

    1997-07-11

    A vacuum vessel main body and structural members at the inside and the outside of the vacuum vessel main body are constituted by structural materials activated by irradiation of neutrons from plasmas such as stainless steels. Shielding members comprising tungsten or molybdenum are disposed on the surface of the vacuum vessel main body and the structural members of the inside and the outside of the main body. The shielding members have a function also as first walls or a seat member for the first walls. Armor tiles may be disposed to the shielding members. The shielding members and the armor tiles are secured to a securing seat member disposed, for example, to an inner plate of the vacuum vessel main body by bolts. Since the shielding members are disposed, it is not necessary to constitute the vacuum vessel main body and the structural members at the inside and the outside thereof by using a low activation material which is less activated, such as a titanium alloy. (I.N.)

  8. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance (Revision 1, Feb. 1983)

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    This regulatory guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport Special Nuclear Materials (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standard format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical security plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CFR Part 73

  9. Apparatus for carrying out ultrasonic inspection of pressure vessels

    International Nuclear Information System (INIS)

    Dent, K.H.; Greenhalgh, F.G.

    1975-01-01

    An apparatus is described for moving an ultrasonic scanning mechanism over the interior surface of a pressure vessel and comprising a mast for supporting the scanning mechanism inside the vessel and a carriage for traversing the mast within the vessel, the mast being pivotably secured to the carriage so that when the ultrasonic scanning mechanism contacts the interior surface of the pressure vessel the mast is caused to pivot. (auth)

  10. Computerized reactor pressure vessel materials information system

    International Nuclear Information System (INIS)

    Strosnider, J.; Monserrate, C.; Kenworthy, L.D.; Tether, C.D.

    1980-10-01

    A computerized information system for storage and retrieval of reactor pressure vessel materials data was established, as part of Task Action Plan A-11, Reactor Vessel Materials Toughness. Data stored in the system are necessary for evaluating the resistance of reactor pressure vessels to flaw-induced fracture. This report includes (1) a description of the information system; (2) guidance on accessing the system; and (3) a user's manual for the system

  11. Vacuum vessel for plasma devices

    International Nuclear Information System (INIS)

    Yamada, Masao; Taguchi, Masami.

    1975-01-01

    Object: To permit effective utility of the space in the inner and outer sides of the container wall and also permit repeated assembly for use. Structure: Vacuum vessel wall sections are sealed together by means of welding bellows, and also flange portions formed at the end of the wall sections are coupled together by bolts and are sealed together with a seal ring and a seal cap secured by welding. (Nakamura, S.)

  12. Corrective Action Investigation Plan for Corrective Action Unit 550: Smoky Contamination Area Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Grant Evenson

    2012-05-01

    Corrective Action Unit (CAU) 550 is located in Areas 7, 8, and 10 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 550, Smoky Contamination Area, comprises 19 corrective action sites (CASs). Based on process knowledge of the releases associated with the nuclear tests and radiological survey information about the location and shape of the resulting contamination plumes, it was determined that some of the CAS releases are co-located and will be investigated as study groups. This document describes the planned investigation of the following CASs (by study group): (1) Study Group 1, Atmospheric Test - CAS 08-23-04, Atmospheric Test Site T-2C; (2) Study Group 2, Safety Experiments - CAS 08-23-03, Atmospheric Test Site T-8B - CAS 08-23-06, Atmospheric Test Site T-8A - CAS 08-23-07, Atmospheric Test Site T-8C; (3) Study Group 3, Washes - Potential stormwater migration of contaminants from CASs; (4) Study Group 4, Debris - CAS 08-01-01, Storage Tank - CAS 08-22-05, Drum - CAS 08-22-07, Drum - CAS 08-22-08, Drums (3) - CAS 08-22-09, Drum - CAS 08-24-03, Battery - CAS 08-24-04, Battery - CAS 08-24-07, Batteries (3) - CAS 08-24-08, Batteries (3) - CAS 08-26-01, Lead Bricks (200) - CAS 10-22-17, Buckets (3) - CAS 10-22-18, Gas Block/Drum - CAS 10-22-19, Drum; Stains - CAS 10-22-20, Drum - CAS 10-24-10, Battery. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed

  13. Corrective Action Investigation Plan for Corrective Action Unit 550: Smoky Contamination Area Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    Evenson, Grant

    2012-01-01

    Corrective Action Unit (CAU) 550 is located in Areas 7, 8, and 10 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 550, Smoky Contamination Area, comprises 19 corrective action sites (CASs). Based on process knowledge of the releases associated with the nuclear tests and radiological survey information about the location and shape of the resulting contamination plumes, it was determined that some of the CAS releases are co-located and will be investigated as study groups. This document describes the planned investigation of the following CASs (by study group): (1) Study Group 1, Atmospheric Test - CAS 08-23-04, Atmospheric Test Site T-2C; (2) Study Group 2, Safety Experiments - CAS 08-23-03, Atmospheric Test Site T-8B - CAS 08-23-06, Atmospheric Test Site T-8A - CAS 08-23-07, Atmospheric Test Site T-8C; (3) Study Group 3, Washes - Potential stormwater migration of contaminants from CASs; (4) Study Group 4, Debris - CAS 08-01-01, Storage Tank - CAS 08-22-05, Drum - CAS 08-22-07, Drum - CAS 08-22-08, Drums (3) - CAS 08-22-09, Drum - CAS 08-24-03, Battery - CAS 08-24-04, Battery - CAS 08-24-07, Batteries (3) - CAS 08-24-08, Batteries (3) - CAS 08-26-01, Lead Bricks (200) - CAS 10-22-17, Buckets (3) - CAS 10-22-18, Gas Block/Drum - CAS 10-22-19, Drum; Stains - CAS 10-22-20, Drum - CAS 10-24-10, Battery. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each study group. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed

  14. Urban planning after terrorism:The case of Oslo with focus on the impacts of the terrorist attack on the consideration of security, memorialisation and conservation in urban planning

    OpenAIRE

    Paizs, Franziska

    2013-01-01

    Terrorism is a targeted way to hurt a population but also to destroy and annihilate a part of the civilization by attacking the built environment, especially iconic and symbolic buildings with its values of collective memory and cultural heritage, which is at the latest created by the iconic act of destruction. The resilient city with its integrated plans and programs but also technical, personal or physical security aims to reduce the probability and the dimension of terrorist attacks. Howev...

  15. Vessel Operator System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Operator cards are required for any operator of a charter/party boat and or a commercial vessel (including carrier and processor vessels) issued a vessel permit from...

  16. Incorporating palaeoclimate data into water security planning and decision making - a case study from southeast Queensland, Australia

    Science.gov (United States)

    Kiem, Anthony; Vance, Tessa; Tozer, Carly; Roberts, Jason

    2017-04-01

    Regional Stochastic Model (SEQRSM) of catchment hydrology to (a) demonstrate the utility of a palaeoclimate proxy approach in producing more robust estimates of hydroclimatic risk under climate variability and change; (b) gain improved insights into the characteristics (e.g. location, duration, frequency, magnitude, spatial extent, sequencing) of hydroclimate extremes for water security planning and (c) deliver optimised solutions for hydroclimatic risk adaptation strategies to water managers (e.g. optimal and sustainable supply of water to meet current and future urban requirements and also to nearby catchments to support irrigation for dairy, vegetable and forage crops).

  17. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  18. Creating an Effective National Security Industrial Base for the 21st Century: An Action Plan to Address the Coming Crisis

    National Research Council Canada - National Science Library

    Scneider, Jr., William; Gansler, Jacques

    2008-01-01

    .... To accommodate both the current and emerging National Security needs associated with this dynamic environment, DoD has acknowledged the importance of a significant transformation of its relationship...

  19. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  20. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  1. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  2. Metallurgy of steels for PWR pressure vessels

    International Nuclear Information System (INIS)

    Kepka, M.; Mocek, J.; Barackova, L.

    1980-01-01

    A survey and the chemical compositions are presented of reactor pressure vessel steels. The metallurgy is described of steel making for pressure vessels in Japan and the USSR. Both acidic and alkaline open-hearth steel is used for the manufacture of ingots. The leading world manufacturers of forging ingots for pressure vessels, however, exclusively use electric steel. Vacuum casting techniques are exclusively used. Experience is shown gained with the introduction of the manufacture of forging ingots for pressure vessels at SKODA, Plzen. The metallurgical procedure was tested utilizing alkaline open hearths, electric arc furnaces and facilities for vacuum casting of steel. Pure charge raw materials should be used for securing high steel purity. Prior to forging pressure vessel rings, not only should sufficiently big bottoms and heads be removed but also the ingot middle part should be scrapped showing higher contents of impurities and nonhomogeneous structure. (B.S.)

  3. Metallurgy of steels for PWR pressure vessels

    Energy Technology Data Exchange (ETDEWEB)

    Kepka, M; Mocek, J; Barackova, L [Skoda, Plzen (Czechoslovakia)

    1980-09-01

    A survey and the chemical compositions are presented of reactor pressure vessel steels. The metallurgy is described of steel making for pressure vessels in Japan and the USSR. Both acidic and alkaline open-hearth steel is used for the manufacture of ingots. The leading world manufacturers of forging ingots for pressure vessels, however, exclusively use electric steel. Vacuum casting techniques are exclusively used. Experience is shown gained with the introduction of the manufacture of forging ingots for pressure vessels at SKODA, Plzen. The metallurgical procedure was tested utilizing alkaline open hearths, electric arc furnaces and facilities for vacuum casting of steel. Pure charge raw materials should be used for securing high steel purity. Prior to forging pressure vessel rings, not only should sufficiently big bottoms and heads be removed but also the ingot middle part should be scrapped showing higher contents of impurities and nonhomogeneous structure.

  4. Hydrogen storage in insulated pressure vessels

    Energy Technology Data Exchange (ETDEWEB)

    Aceves, S.M.; Garcia-Villazana, O. [Lawrence Livermore National Lab., CA (United States)

    1998-08-01

    Insulated pressure vessels are cryogenic-capable pressure vessels that can be fueled with liquid hydrogen (LH{sub 2}) or ambient-temperature compressed hydrogen (CH{sub 2}). Insulated pressure vessels offer the advantages of liquid hydrogen tanks (low weight and volume), with reduced disadvantages (lower energy requirement for hydrogen liquefaction and reduced evaporative losses). This paper shows an evaluation of the applicability of the insulated pressure vessels for light-duty vehicles. The paper shows an evaluation of evaporative losses and insulation requirements and a description of the current analysis and experimental plans for testing insulated pressure vessels. The results show significant advantages to the use of insulated pressure vessels for light-duty vehicles.

  5. 33 CFR 157.420 - Vessel specific watch policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Interim Measures for Certain Tank Vessels Without Double Hulls Carrying Petroleum Oils...

  6. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  7. Care planning for aggression management in a specialist secure mental health service: An audit of user involvement.

    Science.gov (United States)

    Hallett, Nutmeg; Huber, Jörg W; Sixsmith, Judith; Dickens, Geoffrey L

    2016-12-01

    This paper describes an audit of prevention and management of violence and aggression care plans and incident reporting forms which aimed to: (i) report the compliance rate of completion of care plans; (ii) identify the extent to which patients contribute to and agree with their care plan; (iii) describe de-escalation methods documented in care plans; and (iv) ascertain the extent to which the de-escalation methods described in the care plan are recorded as having been attempted in the event of an incident. Care plans and incident report forms were examined for all patients in men's and women's mental health care pathways who were involved in aggressive incidents between May and October 2012. In total, 539 incidents were examined, involving 147 patients and 121 care plans. There was no care plan in place at the time of 151 incidents giving a compliance rate of 72%. It was documented that 40% of patients had contributed to their care plans. Thematic analysis of de-escalation methods documented in the care plans revealed five de-escalation themes: staff interventions, interactions, space/quiet, activities and patient strategies/skills. A sixth category, coercive strategies, was also documented. Evidence of adherence to de-escalation elements of the care plan was documented in 58% of incidents. The reasons for the low compliance rate and very low documentation of patient involvement need further investigation. The inclusion of coercive strategies within de-escalation documentation suggests that some staff fundamentally misunderstand de-escalation. © 2016 Australian College of Mental Health Nurses Inc.

  8. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  9. Reactor vessel head permanent shield

    International Nuclear Information System (INIS)

    Hankinson, M.F.; Leduc, R.J.; Richard, J.W.; Malandra, L.J.

    1989-01-01

    A nuclear reactor is described comprising: a nuclear reactor pressure vessel closure head; control rod drive mechanisms (CRDMs) disposed within the closure head so as to project vertically above the closure head; cooling air baffle means surrounding the control rod drive mechanisms for defining cooling air paths relative to the control rod drive mechanisms; means defined within the periphery of the closure head for accommodating fastening means for securing the closure head to its associated pressure vessel; lifting lugs fixedly secured to the closure head for facilitating lifting and lowering movements of the closure head relative to the pressure vessel; lift rods respectively operatively associated with the plurality of lifting lugs for transmitting load forces, developed during the lifting and lowering movements of the closure head, to the lifting lugs; upstanding radiation shield means interposed between the cooling air baffle means and the periphery of the enclosure head of shielding maintenance personnel operatively working upon the closure head fastening means from the effects of radiation which may emanate from the control rod drive mechanisms and the cooling air baffle means; and connecting systems respectively associated with each one of the lifting lugs and each one of the lifting rods for connecting each one of the lifting rods to a respective one of each one of the lifting lugs, and for simultaneously connecting a lower end portion of the upstanding radiation shield means to each one of the respective lifting lugs

  10. Embracing the Devil: An Analysis of the Formal Adoption of Red Teaming in the Security Planning for Major Events

    Science.gov (United States)

    2017-03-01

    little hope of a better solution, low self - esteem temporarily induced by recent failures, and difficulties in determining feasible alternatives in...The ability to think creatively and communicate potentially negative findings effectively are unique skills improved with formal training and...Homeland Security Presidential Directive IC intelligence community IED improvised explosive device JCCIC Joint Congressional Committee on

  11. Standard format and content for a licensee physical security plan for the protection of special nuclear material of moderate or low strategic significance - January 1980

    International Nuclear Information System (INIS)

    Anon.

    1981-01-01

    This guide describes the information required in the physical security plan submitted as part of an application for a license to possess, use, or transport special nuclear material (SNM) of moderate strategic significance or 10 kg or more of SNM of low strategic significance and recommends a standard format for presenting the information in an orderly arrangement. This standards format will thus serve as an aid to uniformity and completeness in the preparation and review of the physical protection plan of the license application. This document can also be used as guidance by licensees possessing or transporting less than 10 kg of SNM of low strategic significance in understanding the intent and implementing the requirements of paragraphs 73.67(a), 73.67(f), and 73.67(g) of 10 CRF Part 73

  12. Multiple shell pressure vessel

    International Nuclear Information System (INIS)

    Wedellsborg, B.W.

    1988-01-01

    A method is described of fabricating a pressure vessel comprising the steps of: attaching a first inner pressure vessel having means defining inlet and outlet openings to a top flange, placing a second inner pressure vessel, having means defining inlet and outlet opening, concentric with and spaced about the first inner pressure vessel and attaching the second inner pressure vessel to the top flange, placing an outer pressure vessel, having inlet and outlet openings, concentric with and spaced apart about the second inner pressure vessel and attaching the outer pressure vessel to the top flange, attaching a generally cylindrical inner inlet conduit and a generally cylindrical inner outlet conduit respectively to the inlet and outlet openings in the first inner pressure vessel, attaching a generally cylindrical outer inlet conduit and a generally cylindrical outer outlet conduit respectively to the inlet and outlet opening in the second inner pressure vessel, heating the assembled pressure vessel to a temperature above the melting point of a material selected from the group, lead, tin, antimony, bismuth, potassium, sodium, boron and mixtures thereof, filling the space between the first inner pressure vessel and the second inner pressure vessel with material selected from the group, filling the space between the second inner pressure vessel and the outer pressure vessel with material selected from the group, and pressurizing the material filling the spaces between the pressure vessels to a predetermined pressure, the step comprising: pressurizing the spaces to a pressure whereby the wall of the first inner pressure vessel is maintained in compression during steady state operation of the pressure vessel

  13. Assessing the Alignment of Information Security with Strategic Business, and Strategic Information System Planning: A Department of Defense Perspective

    Science.gov (United States)

    2010-06-01

    Wolfgang. "Appraisal of the effectivness and efficiency of an Information Security Management System based on ISO 27001 ." International Conference on...of corporate information resources (Doherty and 29 Fulford, 2006) ( ISO /IEC 17799, 2005). Both public and private sectors of business have...Science Ltd, 2002. Iacovou, Charalambos L. "The IPACS project: when IT hits the fan." Journal of Information Technology, 1999: 267-275. ISO /IEC 17799

  14. Analyzing the Feasibility of Using Secure Application Integration Methodology (SAIM) for Integrating DON Enterprise Resource Planning (ERP) Applications

    National Research Council Canada - National Science Library

    Marin, Ramon

    2004-01-01

    ...) would provide useful information about a beneficial methodology. SAIM is analyzed, by accessing its step by step directions, for suitability in the integration of the Enterprise Resource Planning (ERP...

  15. 33 CFR 135.401 - Access to vessel, Certificates of Financial Responsibility.

    Science.gov (United States)

    2010-07-01

    ... HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Access, Denial, and Detention § 135.401 Access to vessel, Certificates of...

  16. Littoral Combat Vessels: Analysis and Comparison of Designs

    National Research Council Canada - National Science Library

    Christiansen, Bryan J

    2008-01-01

    .... The candidates are a Littoral Combat Ship with a surface warfare module, a National Security Cutter augmented with offensive and defensive weaponry, a "Sea Lance" inshore combat vessel, and a Combat...

  17. 78 FR 63235 - Tank Vessel Oil Transfers

    Science.gov (United States)

    2013-10-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0522] Tank Vessel Oil Transfers... that it is considering new measures to reduce the risks of oil spills in oil transfer operations from...), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue...

  18. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex

    International Nuclear Information System (INIS)

    2006-01-01

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure A.1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 that provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater quality sampling (Section 3.0), whereas wells granted ''inactive'' status are not used for either purpose. The status designation also defines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 3.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 4.0). This plan applies to groundwater wells associated with Y-12 and related waste management areas and facilities located within three hydrogeologic regimes (Figure A.1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime encompasses a section of Chestnut Ridge directly south of Y-12 that is bound on the

  19. Probabilistic retinal vessel segmentation

    Science.gov (United States)

    Wu, Chang-Hua; Agam, Gady

    2007-03-01

    Optic fundus assessment is widely used for diagnosing vascular and non-vascular pathology. Inspection of the retinal vasculature may reveal hypertension, diabetes, arteriosclerosis, cardiovascular disease and stroke. Due to various imaging conditions retinal images may be degraded. Consequently, the enhancement of such images and vessels in them is an important task with direct clinical applications. We propose a novel technique for vessel enhancement in retinal images that is capable of enhancing vessel junctions in addition to linear vessel segments. This is an extension of vessel filters we have previously developed for vessel enhancement in thoracic CT scans. The proposed approach is based on probabilistic models which can discern vessels and junctions. Evaluation shows the proposed filter is better than several known techniques and is comparable to the state of the art when evaluated on a standard dataset. A ridge-based vessel tracking process is applied on the enhanced image to demonstrate the effectiveness of the enhancement filter.

  20. Research on removal technologies of fuel debris and in-vessel structures using laser light (1). Research plan and research activities on FY2012

    International Nuclear Information System (INIS)

    Muramatsu, Toshiharu; Yamada, Tomonori; Hanari, Toshihide; Takebe, Toshihiko; Matsunaga, Yukihiro

    2013-08-01

    In decommissioning works of the Fukushima Daiichi nuclear power plants, it is required that fuel debris solidifying mixed materials of fuels and in-vessel structures should be removed. The fuel debris is considered to have characteristics, such as indefinite shapes, porous bodies, multi-compositions, higher hardness, etc. from the knowledge in decommissioning process of the Three Mile Island nuclear power plant. Laser lights are characterized by higher power density, local processability, remote controllability, etc. and can be performed thermal cutting and crushing-up for various materials which does not depend on fracture toughness. This report describes a research program and research activities in FY2012 aiming at developing removal system of fuel debris by the use of laser lights. Main results obtained from research activities in FY2012 are as follows: (1) Improvements of experimental infrastructures. A beam switching unit for an existing fiber laser system, an x-y-z tri-axes robot system to investigate remote control performances, and a particle image velocimetry (PIV) system for quantitation of assist gas flow characteristics were introduced to the experimental laboratory of our Applied Laser Technology Institute in Tsuruga. (2) Laser cutting performances for thick metal plates. To quantify laser cutting performance for thick metal plates of in-vessel structures, after the evaluation of the relationship between the kerf depth and amount of laser irradiation energy to the metal test piece, we evaluated for heat transfer behavior due to temperature measurement of thick metal plate on the laser cutting process. It is suggested that the heat diffusion into the cutting object can affect the heat input efficiency of the laser irradiation energy to kerf front. On the viewpoint of suppressing this thermal diffusion, it was found that it is important in improving the laser cutting performance to increase the ejection of molten metal by the assist gas, and to optimize

  1. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  2. 46 CFR 185.340 - Vessels carrying vehicles.

    Science.gov (United States)

    2010-10-01

    ... and away from the vehicles freely in the event of fire or other disaster. The decks, where necessary... motors turned off and their emergency brakes set when the vessel is underway, and that the motors are not... vehicles or next to a loading ramp must have its wheels securely blocked, while the vessel is being...

  3. 46 CFR 122.340 - Vessels carrying vehicles.

    Science.gov (United States)

    2010-10-01

    ... vehicles freely in the event of fire or other disaster. The decks, where necessary, must be distinctly... their emergency brakes set when the vessel is underway, and that the motors are not started until the... loading ramp must have its wheels securely blocked, while the vessel is being navigated. (c) The master...

  4. 19 CFR 162.3 - Boarding and search of vessels.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Boarding and search of vessels. 162.3 Section 162.3 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... Boarding and search of vessels. (a) General authority. A Customs officer, for the purpose of examining the...

  5. Improvement to reactor vessel

    International Nuclear Information System (INIS)

    1974-01-01

    The vessel described includes a prestressed concrete vessel containing a chamber and a removable cover closing this chamber. The cover is in concrete and is kept in its closed position by main and auxiliary retainers, comprising fittings integral with the concrete of the vessel. The auxiliary retainers pass through the concrete of the cover. This improvement may be applied to BWR, PWR and LMFBR type reactor vessel [fr

  6. ALICE HMPID Radiator Vessel

    CERN Document Server

    2003-01-01

    View of the radiator vessels of the ALICE/HMPID mounted on the support frame. Each HMPID module is equipped with 3 indipendent radiator vessels made out of neoceram and fused silica (quartz) windows glued together. The spacers inside the vessel are needed to stand the hydrostatic pressure. http://alice-hmpid.web.cern.ch/alice-hmpid

  7. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental LLC; Environmental Compliance Department Environment, Safety, and Health Division Y-12 National Security Complex

    2004-03-31

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT), the Y-12 management and operations (M&O) contractor for DOE. This GWPP management plan addresses the requirements of DOE Order 450.1 (BWXT Y12 S/RID) regarding the implementation of a site-wide approach for groundwater protection at each DOE facility. Additionally, this plan is a ''living'' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP, and an overview of ongoing Y-12 groundwater monitoring activities. Section 3 describes the key elements of the GWPP management strategy. Organizational roles and responsibilities of GWPP personnel are outlined in Section 4. Section 5 presents an overview of the GWPP project plans for applicable programmatic elements. Section 6 lists the reports, plans, and documents that are referenced for technical and administrative details.

  8. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  9. 2006 U.S. Department of Energy Strategic Plan: Discovering the Solutions to Power and Secure America’s Future

    Energy Technology Data Exchange (ETDEWEB)

    None,

    2006-10-11

    The Department of Energy Organization Act, which created DOE, was enacted in 1977 and DOE officially came into existence in October of that year. That law brought together for the first time, not only most of the government’s energy programs, but also science and technology programs and defense responsibilities that included the design, construction, and testing of nuclear weapons. Over its history, DOE has shifted its emphasis and focus as the energy and security needs of the Nation have changed. Today, DOE stands at the forefront of helping the Nation meet our energy, scientific, environmental, and national security goals. These include developing and deploying new energy technologies, reducing our dependence on foreign energy sources, protecting our nuclear weapons stockpile, and ensuring that America remains competitive in the global marketplace. To help achieve these goals, President Bush has launched two key initiatives: the American Competitiveness Initiative (ACI) and the Advanced Energy Initiative (AEI). The President launched these initiatives recognizing that science, technology, and engineering hold the answers to many of the critical challenges our world faces. These new initiatives to spur scientific innovation and technology development expand DOE’s continuing support for the competitive energy markets, both domestically and internationally, and of policies that facilitate continued private investment in the energy sector. In addition, DOE supports the demonstration and deployment of energy technologies through collaborative efforts with the private sector and public sector entities.

  10. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  11. Development of the good food planning tool: A food system approach to food security in indigenous Australian remote communities.

    Science.gov (United States)

    Brimblecombe, Julie; van den Boogaard, Christel; Wood, Beverley; Liberato, Selma C; Brown, Jacqui; Barnes, Adam; Rogers, Alison; Coveney, John; Ritchie, Jan; Bailie, Ross

    2015-07-01

    Few frameworks exist to assist food system planning, especially for Indigenous Australian remote communities. We developed a Good Food Planning Tool to support stakeholders to collectively plan and take action for local food system improvement. Development occurred over a four-year period through an evolving four phase participatory process that included literature review, several meetings with representatives of various organisations and communities and application of the Tool with multi-sector groups in each of four Indigenous Australian remote communities. A diverse range of 148 stakeholders, 78 of whom were Indigenous, had input to its development. Five food system domains: (i) Leadership and partnerships; (ii) Traditional food and local food production; (iii) Food businesses; (iv) Buildings, public places and transport; (v) Community and services and 28 activity areas form the framework of the Tool. The Good Food Planning Tool provides a useful framework to facilitate collective appraisal of the food system and to identify opportunities for food system improvement in Indigenous Australian remote communities, with potential for adaptation for wider application. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Y-12 Groundwater Protection Program Monitoring Optimization Plan for Groundwater Monitoring Wells at the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2003-09-30

    This document is the monitoring optimization plan for groundwater monitoring wells associated with the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12) in Oak Ridge, Tennessee (Figure 1). The plan describes the technical approach that will be implemented under the Y-12 Groundwater Protection Program (GWPP) to focus available resources on the monitoring wells at Y-12 which provide the most useful hydrologic and water-quality monitoring data. The technical approach is based on the GWPP status designation for each well (Section 2.0). Under this approach, wells granted ''active'' status are used by the GWPP for hydrologic monitoring and/or groundwater sampling (Section 3.0), whereas well granted ''inactive'' status are not used for either purpose. The status designation also determines the frequency at which the GWPP will inspect applicable wells, the scope of these well inspections, and extent of any maintenance actions initiated by the GWPP (Section 4.0). Details regarding the ancillary activities associated with implementation of this plan (e.g., well inspection) are deferred to the referenced GWPP plans and procedures (Section 5.0). This plan applies to groundwater monitoring wells associated with Y-12 and related waste management facilities located within three hydrogeologic regimes (Figure 1): the Bear Creek Hydrogeologic Regime (Bear Creek Regime), the Upper East Fork Poplar Creek Hydrogeologic Regime (East Fork Regime), and the Chestnut Ridge Hydrogeologic Regime (Chestnut Ridge Regime). The Bear Creek Regime encompasses a section of Bear Creek Valley (BCV) immediately west of Y-12. The East Fork Regime encompasses most of the Y-12 process, operations, and support facilities in BCV and, for the purposes of this plan, includes a section of Union Valley east of the DOE Oak Ridge Reservation (ORR) boundary along Scarboro Road. The Chestnut Ridge Regime is directly south of Y-12 and encompasses a section of Chestnut Ridge that is bound to the

  13. Probabilistic atlas based labeling of the cerebral vessel tree

    Science.gov (United States)

    Van de Giessen, Martijn; Janssen, Jasper P.; Brouwer, Patrick A.; Reiber, Johan H. C.; Lelieveldt, Boudewijn P. F.; Dijkstra, Jouke

    2015-03-01

    Preoperative imaging of the cerebral vessel tree is essential for planning therapy on intracranial stenoses and aneurysms. Usually, a magnetic resonance angiography (MRA) or computed tomography angiography (CTA) is acquired from which the cerebral vessel tree is segmented. Accurate analysis is helped by the labeling of the cerebral vessels, but labeling is non-trivial due to anatomical topological variability and missing branches due to acquisition issues. In recent literature, labeling the cerebral vasculature around the Circle of Willis has mainly been approached as a graph-based problem. The most successful method, however, requires the definition of all possible permutations of missing vessels, which limits application to subsets of the tree and ignores spatial information about the vessel locations. This research aims to perform labeling using probabilistic atlases that model spatial vessel and label likelihoods. A cerebral vessel tree is aligned to a probabilistic atlas and subsequently each vessel is labeled by computing the maximum label likelihood per segment from label-specific atlases. The proposed method was validated on 25 segmented cerebral vessel trees. Labeling accuracies were close to 100% for large vessels, but dropped to 50-60% for small vessels that were only present in less than 50% of the set. With this work we showed that using solely spatial information of the vessel labels, vessel segments from stable vessels (>50% presence) were reliably classified. This spatial information will form the basis for a future labeling strategy with a very loose topological model.

  14. Succession Planning in Homeland Security - How Can We Ensure the Effective Transfer of Knowledge to a New Generation of Employees

    Science.gov (United States)

    2010-03-01

    experience in the book Administration Industrielle et Générale, where he developed his fourteen principles of administration. Fayol claimed that...is at the heart of succession planning. The LAFD should recognize the innovation and new ideas of our young generation, and incorporate them into...created, and shared in an organizational context; to foster creativity and innovation for competitive advantage. According to Nonaka, knowledge is

  15. Investigation of productivity in a south Indian Malabari goat herd shows opportunities for planned animal health management to improve food security.

    Science.gov (United States)

    Sargison, N D; Ivil, S A J; Abraham, J; Abubaker, S P S; Hopker, A M; Mazeri, S; Otter, I A; Otter, N

    2017-03-18

    Here the authors report the objective veterinary clinical measurement of productivity in a representative south Indian Malabari goat herd. The authors show failure to meet pragmatic production targets that are commensurate with the animals' genetic potential or adequate to meet the demands of global food security. The authors suggest that this situation may have arisen as a consequence of animal husbandry constraints and protein undernutrition and imply the involvement of nematode parasitism. Benzimidazole resistance was detected in Haemonchus species, showing the need for better understanding of the principles of sustainable helminth parasite control within the southern Indian context. This study highlights the need to understand the true costs of goat production in seasonally resource-poor environments, while also considering its impact on the overall ecosystem in which the animals are placed. They conclude that pragmatic opportunities for improvements in goat production efficiency lie in the development of problem-focused planned animal health and nutrition management. British Veterinary Association.

  16. Groundwater Protection Program Management Plan for the U.S. Department of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2001-06-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of BWXT Y-12, L.L.C. (hereafter referenced as BWXT Y-12), the Y-12 management and operations (M and O) subcontractor for DOE.

  17. On the Adequacy of API 521 Relief-Valve Sizing Method for Gas-Filled Pressure Vessels Exposed to Fire

    DEFF Research Database (Denmark)

    Andreasen, Anders; Nieto, Marcos Zan; Borroni, Filippo

    2018-01-01

    sense of security. Often the vessel wall will be weakened by high temperatures, before the PRV relieving pressure is reached. In this article, a multiparameter study has been performed taking into consideration various vessel sizes, design pressures (implicitly vessel wall thickness), vessel operating...

  18. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  19. Information security management handbook

    CERN Document Server

    2002-01-01

    The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA, the latest hacker attacks and defenses, intrusion detection, and provides expanded coverage on security management issues and applications security. Even those that don't plan on sitting for the CISSP exam will find that this handbook is a great information security reference.The changes in the tech

  20. 33 CFR 101.125 - Approved Alternative Security Programs.

    Science.gov (United States)

    2010-07-01

    ... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...

  1. Groundwater Protection Program Management Plan For The U.S. Department Of Energy Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Elvado Environmental, LLC

    2009-09-01

    This document presents the Groundwater Protection Program (GWPP) management plan for the U.S. Department of Energy (DOE) Y-12 National Security Complex (hereafter referenced as Y-12). The Y-12 GWPP functions as the primary point-of-contact for groundwater-related issues at Y-12, provides stewardship of the extensive network of groundwater monitoring wells at Y-12, and serves as a resource for technical expertise, support, and historical data for groundwater-related activities at Y-12. These organizational functions each serve the primary programmatic purpose of the GWPP, which is to ensure that groundwater monitoring activities within areas under Y-12 administrative control provide representative data in compliance with the multiple purposes of applicable state and federal regulations, DOE orders, and the corporate policies of Babcock & Wilcox Technical Services Y-12 LLC (hereafter referenced as B&W Y-12), the Y-12 management and operations (M&O) contractor for DOE. B&W Y-12 is a new corporate name, assumed in January 2007, for the company formerly known as BWXT Y-12, L.L.C., hereafter referenced as BWXT. This GWPP management plan addresses the requirements of DOE Order 450.1A Environmental Protection Program (hereafter referenced as DOE O 450.1A), which emphasize a site-wide approach for groundwater protection at each DOE facility through implementation of groundwater surveillance monitoring. Additionally, this plan addresses the relevant and applicable GWPP elements and goals described in the DOE O 450.1A technical guidance documents issued in June 2004 (DOE 2004) and May 2005 (DOE 2005). This GWPP management plan is a 'living' document that is reviewed annually, revised and reissued every three years, and is formatted to provide for updating individual sections independent of the rest of the document. Section 2 includes a short description of the groundwater system at Y-12, the history of groundwater monitoring at Y-12 and the corresponding evolution of the GWPP

  2. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  3. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  4. Impact of spatial plan on the conversion of Subak rice fields and food security, in Badung and Gianyar Regencies, Bali Province

    Science.gov (United States)

    Lanya, Indayati; Netera Subadiyasa, N.; Ratna Adi, Gst. P.

    2018-05-01

    Regional Spatial Plan of Bali Province 2009-2029, allocating rice fields can be converted 10% (± 10.800 ha). Over the next 20 years, the conversion of rice field is permitted 540 ha year-1, the real condition in Bali is 800 ha year-1.Research location in Badung and Gianyar Regencies. Visual satellite image interpretation methods, digitization of on-screen, delineation of subak rice field, field survey, superimpose analysis of Spatial Plan (SP) map with rice field map, trough toolbox-analysis tools–overlay-intersect using QGIS, Harvest Index (HI) of cropping pattern in one year. SP has a negative impact on agricultural land resources and food security. Local Regulation (SP), subak rice fields outside the agricultural area licensed to be converted, and food deficits. Regency of Badung, potential land conversion of 3,324.97 ha (34.44%) from 119 subak with paddy field area of 24,184.85 ha. There are 10 subak 100% and 8 subak > 95% can be converted; projected food deficit -115.343 tons of rice by 2020 for HI 2. In Gianyar Regency, potential land conversion 13,021.41 ha (53.51%) of 66 subak with an area of 24184.85 ha; 8 subak 100% and 8 subak with area food deficit is about -194438 tons of rice in 2040 for HI 2.

  5. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-01

    This Remedial Investigation (RI) Work Plan specifically addresses Chestnut Ridge Operable Unit 1, (OU1) which consists of the Chestnut Ridge Security Pits (CRSP). The CRSP are located {approximately}800 ft southeast of the central portion of the Y-12 Plant atop Chestnut Ridge, which is bounded to the northwest by Bear Creek Valley and to the southeast by Bethel Valley. Operated from 1973 to 1988, the CRSP consisted of a series of trenches used for the disposal of classified hazardous and nonhazardous waste materials. Disposal of hazardous waste materials was discontinued in December 1984, while nonhazardous waste disposal ended on November 8, 1988. An RI is being conducted at this site in response to CERCLA regulations. The overall objectives of the RI are to collect data necessary to evaluate the nature and extent of contaminants of concern (COC), support an ecological risk assessment (ERA) and a human health risk assessment (HHRA), support the evaluation of remedial alternatives, and ultimately develop a Record of Decision for the site. The purpose of this Work Plan is to outline RI activities necessary to define the nature and extent of suspected contaminants at Chestnut Ridge OU1. Potential migration pathways also will be investigated. Data collected during the RI will be used to evaluate the overall risk posed to human health and the environment by OU1.

  6. Streamlined Approach for Environmental Restoration (SAFER) Plan for Corrective Action Unit 575: Area 15 Miscellaneous Sites, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-12-01

    This Streamlined Approach for Environmental Restoration (SAFER) Plan addresses the actions needed to achieve closure for Corrective Action Unit (CAU) 575, Area 15 Miscellaneous Sites, identified in the Federal Facility Agreement and Consent Order (FFACO). CAU 575 comprises the following four corrective action sites (CASs) located in Area 15 of the Nevada National Security Site: 15-19-02, Waste Burial Pit, 15-30-01, Surface Features at Borehole Sites, 15-64-01, Decontamination Area, 15-99-03, Aggregate Plant This plan provides the methodology for field activities needed to gather the necessary information for closing each CAS. There is sufficient information and process knowledge from historical documentation and investigations of similar sites regarding the expected nature and extent of potential contaminants to recommend closure of CAU 575 using the SAFER process. Additional information will be obtained by conducting a field investigation to document and verify the adequacy of existing information, to affirm the predicted corrective action decisions, and to provide sufficient data to implement the corrective actions. This will be presented in a closure report that will be prepared and submitted to the Nevada Division of Environmental Protection (NDEP) for review and approval.

  7. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1993-09-01

    This Remedial Investigation (RI) Work Plan specifically addresses Chestnut Ridge Operable Unit 1, (OU1) which consists of the Chestnut Ridge Security Pits (CRSP). The CRSP are located ∼800 ft southeast of the central portion of the Y-12 Plant atop Chestnut Ridge, which is bounded to the northwest by Bear Creek Valley and to the southeast by Bethel Valley. Operated from 1973 to 1988, the CRSP consisted of a series of trenches used for the disposal of classified hazardous and nonhazardous waste materials. Disposal of hazardous waste materials was discontinued in December 1984, while nonhazardous waste disposal ended on November 8, 1988. An RI is being conducted at this site in response to CERCLA regulations. The overall objectives of the RI are to collect data necessary to evaluate the nature and extent of contaminants of concern (COC), support an ecological risk assessment (ERA) and a human health risk assessment (HHRA), support the evaluation of remedial alternatives, and ultimately develop a Record of Decision for the site. The purpose of this Work Plan is to outline RI activities necessary to define the nature and extent of suspected contaminants at Chestnut Ridge OU1. Potential migration pathways also will be investigated. Data collected during the RI will be used to evaluate the overall risk posed to human health and the environment by OU1

  8. Pressure vessel design manual

    CERN Document Server

    Moss, Dennis R

    2013-01-01

    Pressure vessels are closed containers designed to hold gases or liquids at a pressure substantially different from the ambient pressure. They have a variety of applications in industry, including in oil refineries, nuclear reactors, vehicle airbrake reservoirs, and more. The pressure differential with such vessels is dangerous, and due to the risk of accident and fatality around their use, the design, manufacture, operation and inspection of pressure vessels is regulated by engineering authorities and guided by legal codes and standards. Pressure Vessel Design Manual is a solutions-focused guide to the many problems and technical challenges involved in the design of pressure vessels to match stringent standards and codes. It brings together otherwise scattered information and explanations into one easy-to-use resource to minimize research and take readers from problem to solution in the most direct manner possible. * Covers almost all problems that a working pressure vessel designer can expect to face, with ...

  9. Models and Algorithms for Container Vessel Stowage Optimization

    DEFF Research Database (Denmark)

    Delgado-Ortegon, Alberto

    .g., selection of vessels to buy that satisfy specific demands), through to operational decisions (e.g., selection of containers that optimize revenue, and stowing those containers into a vessel). This thesis addresses the question of whether it is possible to formulate stowage optimization models...... container of those to be loaded in a port should be placed in a vessel, i.e., to generate stowage plans. This thesis explores two different approaches to solve this problem, both follow a 2-phase decomposition that assigns containers to vessel sections in the first phase, i.e., master planning...

  10. Corrective Action Investigation Plan for Corrective Action Unit 541: Small Boy Nevada National Security Site and Nevada Test and Training Range, Nevada with ROTC 1

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro-Intera, LLC (N-I), Las Vegas, NV (United States)

    2014-09-01

    Corrective Action Unit (CAU) 541 is co-located on the boundary of Area 5 of the Nevada National Security Site and Range 65C of the Nevada Test and Training Range, approximately 65 miles northwest of Las Vegas, Nevada. CAU 541 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 541, which comprises the following corrective action sites (CASs): 05-23-04, Atmospheric Tests (6) - BFa Site; 05-45-03, Atmospheric Test Site - Small Boy. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on April 1, 2014, by representatives of the Nevada Division of Environmental Protection; U.S. Air Force; and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 541. The site investigation process also will be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CASs 05-23-04 and 05-45-03 are from nuclear testing activities conducted at the Atmospheric Tests (6) - BFa Site and Atmospheric Test Site - Small Boy sites. The presence and nature of

  11. 42 CFR 73.11 - Security.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Security. 73.11 Section 73.11 Public Health PUBLIC... AND TOXINS § 73.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard the...

  12. 9 CFR 121.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Security. 121.11 Section 121.11... AGENTS AND TOXINS § 121.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan. The security plan must be sufficient to safeguard...

  13. Tumor Blood Vessel Dynamics

    Science.gov (United States)

    Munn, Lance

    2009-11-01

    ``Normalization'' of tumor blood vessels has shown promise to improve the efficacy of chemotherapeutics. In theory, anti-angiogenic drugs targeting endothelial VEGF signaling can improve vessel network structure and function, enhancing the transport of subsequent cytotoxic drugs to cancer cells. In practice, the effects are unpredictable, with varying levels of success. The predominant effects of anti-VEGF therapies are decreased vessel leakiness (hydraulic conductivity), decreased vessel diameters and pruning of the immature vessel network. It is thought that each of these can influence perfusion of the vessel network, inducing flow in regions that were previously sluggish or stagnant. Unfortunately, when anti-VEGF therapies affect vessel structure and function, the changes are dynamic and overlapping in time, and it has been difficult to identify a consistent and predictable normalization ``window'' during which perfusion and subsequent drug delivery is optimal. This is largely due to the non-linearity in the system, and the inability to distinguish the effects of decreased vessel leakiness from those due to network structural changes in clinical trials or animal studies. We have developed a mathematical model to calculate blood flow in complex tumor networks imaged by two-photon microscopy. The model incorporates the necessary and sufficient components for addressing the problem of normalization of tumor vasculature: i) lattice-Boltzmann calculations of the full flow field within the vasculature and within the tissue, ii) diffusion and convection of soluble species such as oxygen or drugs within vessels and the tissue domain, iii) distinct and spatially-resolved vessel hydraulic conductivities and permeabilities for each species, iv) erythrocyte particles advecting in the flow and delivering oxygen with real oxygen release kinetics, v) shear stress-mediated vascular remodeling. This model, guided by multi-parameter intravital imaging of tumor vessel structure

  14. Corrective Action Investigation Plan for Corrective Action Unit 365: Baneberry Contamination Area, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2010-12-01

    Corrective Action Unit 365 comprises one corrective action site (CAS), CAS 08-23-02, U-8d Contamination Area. This site is being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for the CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The site will be investigated based on the data quality objectives (DQOs) developed on July 6, 2010, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for the Baneberry site. The primary release associated with Corrective Action Unit 365 was radiological contamination from the Baneberry nuclear test. Baneberry was an underground weapons-related test that vented significant quantities of radioactive gases from a fissure located in close proximity to ground zero. A crater formed shortly after detonation, which stemmed part of the flow from the fissure. The scope of this investigation includes surface and shallow subsurface (less than 15 feet below ground surface) soils. Radionuclides from the Baneberry test with the potential to impact groundwater are included within the Underground Test Area Subproject. Investigations and corrective actions associated with the Underground Test Area Subproject include the radiological inventory resulting from the Baneberry test.

  15. 33 CFR 105.210 - Facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of the...

  16. Corrective Action Investigation Plan for Corrective Action Unit 105: Area 2 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-09-01

    Corrective Action Unit (CAU) 105 is located in Area 2 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 105 is a geographical grouping of sites where there has been a suspected release of contamination associated with atmospheric nuclear testing. This document describes the planned investigation of CAU 105, which comprises the following corrective action sites (CASs): • 02-23-04, Atmospheric Test Site - Whitney • 02-23-05, Atmospheric Test Site T-2A • 02-23-06, Atmospheric Test Site T-2B • 02-23-08, Atmospheric Test Site T-2 • 02-23-09, Atmospheric Test Site - Turk These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 105. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with all CAU 105 CASs are from atmospheric nuclear testing activities. The presence and nature of contamination at CAU

  17. Maury Journals - German Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — German vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  18. Human security policy challenges

    Directory of Open Access Journals (Sweden)

    Andrew Morton

    2008-10-01

    Full Text Available All evidence points towards climate- and environmentallyinduced migration becoming one of the major policychallenges of this century. Adequate planning for andmanagement of this phenomenon will be critical forhuman security.

  19. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 97: Yucca Flat/Climax Mine Nevada National Security Site, Nevada, Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Farnham, Irene [Navarro, Las Vegas, NV (United States)

    2017-08-01

    This corrective action decision document (CADD)/corrective action plan (CAP) has been prepared for Corrective Action Unit (CAU) 97, Yucca Flat/Climax Mine, Nevada National Security Site (NNSS), Nevada. The Yucca Flat/Climax Mine CAU is located in the northeastern portion of the NNSS and comprises 720 corrective action sites. A total of 747 underground nuclear detonations took place within this CAU between 1957 and 1992 and resulted in the release of radionuclides (RNs) in the subsurface in the vicinity of the test cavities. The CADD portion describes the Yucca Flat/Climax Mine CAU data-collection and modeling activities completed during the corrective action investigation (CAI) stage, presents the corrective action objectives, and describes the actions recommended to meet the objectives. The CAP portion describes the corrective action implementation plan. The CAP presents CAU regulatory boundary objectives and initial use-restriction boundaries identified and negotiated by DOE and the Nevada Division of Environmental Protection (NDEP). The CAP also presents the model evaluation process designed to build confidence that the groundwater flow and contaminant transport modeling results can be used for the regulatory decisions required for CAU closure. The UGTA strategy assumes that active remediation of subsurface RN contamination is not feasible with current technology. As a result, the corrective action is based on a combination of characterization and modeling studies, monitoring, and institutional controls. The strategy is implemented through a four-stage approach that comprises the following: (1) corrective action investigation plan (CAIP), (2) CAI, (3) CADD/CAP, and (4) closure report (CR) stages.

  20. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  1. Change in plan for installation of nuclear reactor in No.1 atomic powered vessel of Japan Atomic Energy Research Institute (change in purpose of use and in method for nuclear reactor installation and spent fuel disposal) (report)

    International Nuclear Information System (INIS)

    1987-01-01

    This report, compiled by the Nuclear Safety Commission to be submitted to the Prime Minister, deals with studies concerning some changes in the plan for the installation of a nuclear reactor in the No.1 atomic powered vessel to be constructed under the Japan Atomic Energy Research Institute (changes in the purpose of its use and in the methods for the nuclear reactor installation and spent fuel disposal). The conclusions of and procedures for the examination and evaluation are presented and then detailes of the studies are described. The study on the location requirements for the incidental land facilities at Sekinehama covers various conditions concerning the location, geology, earthquakes, meteorology, hydrology and social environment. The study on the safety design of the nuclear reactor facilities deals with the reactor, fuel handling facilities and other auxiliary facilities, as well as various land facilities to be constructed at Sekinehama including the reactor facilities and other facilities for fuel handling, waste disposal and protection and management of radioactive rays. Evaluation of possible radiation emission is shown and the accident analysis is also addressed. (Nogami, K.)

  2. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  3. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  4. The European idea in Central Europe and Scandinavia as a part of the security and peaceful co-existence policy in the framework of the postwar planning

    Directory of Open Access Journals (Sweden)

    Chernyshev Yevgeny

    2011-12-01

    Full Text Available This article is dedicated to the development of European unity in Central Europe and Scandinavia as a mechanism of collective security and intergovernmental cooperation development. The cultural and historical features of Central Europe and Scandinavia emphasize the need for a comparative study into the European idea. This article considers the tendencies and factors which affected the development of the European idea in the framework of the post-war planning. This research sets out to compare and identify similar or analogous features and elements of the theoretical bases of movements for European unity in Central and Northern Europe. The author comes to the conclusion about the correlation between the “Europe of regions” model and the European unity concept. The ideas of Scandinavian and Central European integration rested on national, cultural and historical connections of the neighbouring countries were expected to constitute such formations, which contradicted and were opposed to by the theoretical framework of Western European integration. On the other hand, regional integration implied that a federation or union of the neighbouring states could be considered a step towards a more universal organisation, which would not mean the isolation of Scandinavia and Central Europe from the rest of the world. The theoretical and practical significance of this work lies in the comparative approach to the analysis of the phenomena which have been considered individually in the framework of historiography. It is the major contribution of the article to the research on history of ideas and European diplomacy. Moreover, the subject of research is immediately connected to the problem of security in the Baltic region and the Soviet factor, as well as political stereotypes produced in this field. The author employed historical comparative and inductive types of the historical typological method.

  5. Corrective Action Investigation Plan for Corrective Action Unit 366: Area 11 Plutonium Valley Dispersion Sites, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    Matthews, Patrick

    2011-01-01

    Corrective Action Unit 366 comprises the six corrective action sites (CASs) listed below: (1) 11-08-01, Contaminated Waste Dump No.1; (2) 11-08-02, Contaminated Waste Dump No.2; (3) 11-23-01, Radioactively Contaminated Area A; (4) 11-23-02, Radioactively Contaminated Area B; (5) 11-23-03, Radioactively Contaminated Area C; and (6) 11-23-04, Radioactively Contaminated Area D. These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed July 6, 2011, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 366. The presence and nature of contamination at CAU 366 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose (TED) at sample locations to the dose-based final action level (FAL). The TED will be calculated by summing the estimates of internal and external dose. Results from the analysis of soil samples collected from sample plots will be used to calculate internal radiological dose. Thermoluminescent dosimeters placed at each sample location will be used to measure external radiological dose. Based on historical documentation of the releases

  6. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  7. Reactor vessel sealing plug

    International Nuclear Information System (INIS)

    Dooley, R.A.

    1986-01-01

    This invention relates to an apparatus and method for sealing the cold leg nozzles of a nuclear reactor pressure vessel from a remote location during maintenance and inspection of associated steam generators and pumps while the pressure vessel and refueling canal are filled with water. The apparatus includes a sealing plug for mechanically sealing the cold leg nozzle from the inside of a reactor pressure vessel. The sealing plugs include a primary and a secondary O-ring. An installation tool is suspended within the reactor vessel and carries the sealing plug. The tool telescopes to insert the sealing plug within the cold leg nozzle, and to subsequently remove the plug. Hydraulic means are used to activate the sealing plug, and support means serve to suspend the installation tool within the reactor vessel during installation and removal of the sealing plug

  8. Containment vessel drain system

    Science.gov (United States)

    Harris, Scott G.

    2018-01-30

    A system for draining a containment vessel may include a drain inlet located in a lower portion of the containment vessel. The containment vessel may be at least partially filled with a liquid, and the drain inlet may be located below a surface of the liquid. The system may further comprise an inlet located in an upper portion of the containment vessel. The inlet may be configured to insert pressurized gas into the containment vessel to form a pressurized region above the surface of the liquid, and the pressurized region may operate to apply a surface pressure that forces the liquid into the drain inlet. Additionally, a fluid separation device may be operatively connected to the drain inlet. The fluid separation device may be configured to separate the liquid from the pressurized gas that enters the drain inlet after the surface of the liquid falls below the drain inlet.

  9. Armed guards on vessels : insurance and liability

    Directory of Open Access Journals (Sweden)

    Mišo Mudrić

    2011-12-01

    Full Text Available The Paper examines the insurance and liability issues resulting from the use of armed guards on board vessels. The study begins with an overview of the available data on key economic fi gures representing the projected overall annual costs of modern piracy. The focus is then shifted to the issue of public versus private security, where possible dangers of private-based security options are discussed in general. After explaining why the Somalia region deserves a closer attention when compared to other pirate-infested waters, a brief summary of the international effort to combat piracy threat is presented, followed by a structured overview of the use of private maritime security options in the maritime sector in general. One security option is the use of armed guards on board vessels. This option is explored both from the political (the acceptance by stakeholders and legal standpoint (legal issues arising from the use of armed guards. An important remedy for the shipping companies/ operators threatened by the piracy hazard is the existence of affordable and effective (specialized marine insurance. A study of available piracy insurance policies is presented, followed by an analysis of case law and other legal issues arising from piracy attacks, which could prove important when considering the legal implications of armed guards employment. Finally, a simplifi ed economic analysis of available security options is presented, followed by the final assessment of benefi ts derived from the use of armed guards.

  10. Vacuum vessel for a nuclear fusion device

    International Nuclear Information System (INIS)

    Watanabe, Takashi; Sato, Hiroshi; Owada, Koro.

    1976-01-01

    Object: To provide a reinforcing member on a bellows portion to reduce a stress at the bellows portion thereby increasing the strength of a vessel. Structure: A vacuum vessel for a nuclear fusion device has a bellows portion and a wall thick portion. A support extended toward the bellows portion is secured inside of a toroidal section in order to reduce the stress at the bellows portion. An insulator is interposed between the support and the bellows portion and is retained on the support by a bolt. Since the stress may be reduced by the support, the wall thick of the bellows portion may be decreased to sufficiently secure the low electric resistance value. (Yoshihara, H.)

  11. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  12. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS). 80.277... Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety..., “RTCM Standard 11020.0—Ship Security Alert Systems (SSAS) using the Cospas-Sarsat System,” Version 1.0...

  13. Integration of ITER in-vessel diagnostic components in the vacuum vessel

    International Nuclear Information System (INIS)

    Encheva, A.; Bertalot, L.; Macklin, B.; Vayakis, G.; Walker, C.

    2009-01-01

    The integration of ITER in-vessel diagnostic components is an important engineering activity. The positioning of the diagnostic components must correlate not only with their functional specifications but also with the design of the major parts of ITER torus, in particular the vacuum vessel, blanket modules, blanket manifolds, divertor, and port plugs, some of which are not yet finally designed. Moreover, the recently introduced Edge Localised Mode (ELM)/Vertical Stability (VS) coils mounted on the vacuum vessel inner wall call for not only more than a simple review of the engineering design settled down for several years now, but also for a change in the in-vessel distribution of the diagnostic components and their full impact has yet to be determined. Meanwhile, the procurement arrangement (a document defining roles and responsibilities of ITER Organization and Domestic Agency(s) (DAs) for each in-kind procurement including technical scope of work, quality assurance requirements, schedule, administrative matters) for the vacuum vessel must be finalized. These make the interface process even more challenging in terms of meeting the vacuum vessel (VV) procurement arrangement's deadline. The process of planning the installation of all the ITER diagnostics and integrating their installation into the ITER Integrated Project Schedule (IPS) is now underway. This paper covers the progress made recently on updating and issuing the interfaces of the in-vessel diagnostic components with the vacuum vessel, outlines the requirements for their attachment and summarises the installation sequence.

  14. Corrective Action Investigation Plan for Corrective Action Unit 576: Miscellaneous Radiological Sites and Debris Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick [Navarro, Las Vegas, NV (United States)

    2016-12-01

    Corrective Action Unit (CAU) 576 is located in Areas 2, 3, 5, 8, and 9 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 576 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 576, which comprises the following corrective action sites (CASs): 00-99-01, Potential Source Material; 02-99-12, U-2af (Kennebec) Surface Rad-Chem Piping; 03-99-20, Area 3 Subsurface Rad-Chem Piping; 05-19-04, Frenchman Flat Rad Waste Dump ; 09-99-08, U-9x (Allegheny) Subsurface Rad-Chem Piping; 09-99-09, U-9its u24 (Avens-Alkermes) Surface Contaminated Flex Line These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document (CADD).

  15. NCSX Vacuum Vessel Fabrication

    International Nuclear Information System (INIS)

    Viola ME; Brown T; Heitzenroeder P; Malinowski F; Reiersen W; Sutton L; Goranson P; Nelson B; Cole M; Manuel M; McCorkle D.

    2005-01-01

    The National Compact Stellarator Experiment (NCSX) is being constructed at the Princeton Plasma Physics Laboratory (PPPL) in conjunction with the Oak Ridge National Laboratory (ORNL). The goal of this experiment is to develop a device which has the steady state properties of a traditional stellarator along with the high performance characteristics of a tokamak. A key element of this device is its highly shaped Inconel 625 vacuum vessel. This paper describes the manufacturing of the vessel. The vessel is being fabricated by Major Tool and Machine, Inc. (MTM) in three identical 120 o vessel segments, corresponding to the three NCSX field periods, in order to accommodate assembly of the device. The port extensions are welded on, leak checked, cut off within 1-inch of the vessel surface at MTM and then reattached at PPPL, to accommodate assembly of the close-fitting modular coils that surround the vessel. The 120 o vessel segments are formed by welding two 60 o segments together. Each 60 o segment is fabricated by welding ten press-formed panels together over a collapsible welding fixture which is needed to precisely position the panels. The vessel is joined at assembly by welding via custom machined 8-inch (20.3 cm) wide spacer ''spool pieces''. The vessel must have a total leak rate less than 5 X 10 -6 t-l/s, magnetic permeability less than 1.02(micro), and its contours must be within 0.188-inch (4.76 mm). It is scheduled for completion in January 2006

  16. Integrating Multiple Autonomous Underwater Vessels, Surface Vessels and Aircraft into Oceanographic Research Vessel Operations

    Science.gov (United States)

    McGillivary, P. A.; Borges de Sousa, J.; Martins, R.; Rajan, K.

    2012-12-01

    Autonomous platforms are increasingly used as components of Integrated Ocean Observing Systems and oceanographic research cruises. Systems deployed can include gliders or propeller-driven autonomous underwater vessels (AUVs), autonomous surface vessels (ASVs), and unmanned aircraft systems (UAS). Prior field campaigns have demonstrated successful communication, sensor data fusion and visualization for studies using gliders and AUVs. However, additional requirements exist for incorporating ASVs and UASs into ship operations. For these systems to be optimally integrated into research vessel data management and operational planning systems involves addressing three key issues: real-time field data availability, platform coordination, and data archiving for later analysis. A fleet of AUVs, ASVs and UAS deployed from a research vessel is best operated as a system integrated with the ship, provided communications among them can be sustained. For this purpose, Disruptive Tolerant Networking (DTN) software protocols for operation in communication-challenged environments help ensure reliable high-bandwidth communications. Additionally, system components need to have considerable onboard autonomy, namely adaptive sampling capabilities using their own onboard sensor data stream analysis. We discuss Oceanographic Decision Support System (ODSS) software currently used for situational awareness and planning onshore, and in the near future event detection and response will be coordinated among multiple vehicles. Results from recent field studies from oceanographic research vessels using AUVs, ASVs and UAS, including the Rapid Environmental Picture (REP-12) cruise, are presented describing methods and results for use of multi-vehicle communication and deliberative control networks, adaptive sampling with single and multiple platforms, issues relating to data management and archiving, and finally challenges that remain in addressing these technological issues. Significantly, the

  17. 75 FR 8489 - Security Zone; Freeport Channel Entrance, Freeport, TX

    Science.gov (United States)

    2010-02-25

    ... environmental risk to health or risk to safety that may disproportionately affect children. Indian Tribal... Captain of the Port, Houston-Galveston deems enhanced security measures necessary on a case-by-case basis... vessels. The moving security zone may commence at any point after certain vessels bound for the Port of...

  18. Radioactive waste processing vessel

    International Nuclear Information System (INIS)

    Hayashi, Masaru; Suzuki, Osamu; Ishizaki, Kanjiro.

    1987-01-01

    Purpose: To obtain a vessel of a reduced weight and with no external leaching of radioactive materials. Constitution: The vessel main body is constituted, for example, with light weight concretes or foamed concretes, particularly, foamed concretes containing fine closed bubbles in the inside. Then, layers having dense texture made of synthetic resin such as polystylene, vinylchloride resin, etc. or metal plate such as stainless plate are integrally disposed to the inner surface of the vessel main body. The cover member also has the same structure. (Sekiya, K.)

  19. Tempest in a vessel

    International Nuclear Information System (INIS)

    Barre, Bertrand

    2015-01-01

    As the ASN made some statements about anomalies of carbon content in the EPR vessel bottom and top, the author recalls and comments some technical issues to better understand the information published on this topic. He notably addresses the role of the vessel, briefly indicates its operating conditions, shape and structure, and mechanical components for the top, its material and mechanical properties, and test samples used to assess mechanical properties. He also comments the phenomenon of radio-induced embrittlement, the vessel manufacturing process, and evokes the applicable regulations. He quotes and comments statements made by the ASN and Areva which evoke further assessments of the concerned components

  20. Corrective Action Investigation Plan for Corrective Action Unit 571: Area 9 Yucca Flat Plutonium Dispersion Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, Bernadine; Matthews, Patrick

    2013-07-01

    CAU 571 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 571, which comprises the following corrective action sites (CASs): • 09-23-03, Atmospheric Test Site S-9F • 09-23-04, Atmospheric Test Site T9-C • 09-23-12, Atmospheric Test Site S-9E • 09-23-13, Atmospheric Test Site T-9D • 09-45-01, Windrows Crater These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on March 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (now the Nevada Field Office). The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 571. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 571 CASs are from nuclear testing activities. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary exceeds the final action level (FAL) and requires corrective action. The presence and nature of contamination outside the default

  1. Corrective Action Investigation Plan for Corrective Action Unit 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada, with ROTC 1 Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Matthews, Patrick K.

    2013-07-01

    Corrective Action Unit (CAU) 567 is located in Areas 1, 3, 5, 20, and 25 of the Nevada National Security Site, which is approximately 65 miles northwest of Las Vegas, Nevada. CAU 567 is a grouping of sites where there has been a suspected release of contamination associated with nuclear testing. This document describes the planned investigation of CAU 567, which comprises the following corrective action sites (CASs): • 01-23-03, Atmospheric Test Site T-1 • 03-23-25, Seaweed E Contamination Area • 05-23-07, A5b RMA • 20-23-08, Colby Mud Spill • 25-23-23, J-11 Soil RMA These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the investigation report. The sites will be investigated based on the data quality objectives (DQOs) developed on May 6, 2013, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Field Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 567. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The potential contamination sources associated with CAU 567 releases are nuclear test operations and other NNSS operations. The DQO process resulted in an assumption that total effective dose (TED) within a default contamination boundary

  2. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  3. Reactor vessel supported by flexure member

    International Nuclear Information System (INIS)

    Crawford, J.D.; Pankow, B.

    1977-01-01

    According to the present invention there is provided an improved arrangement for supporting a reactor vessel within a containment structure against static and dynamic vertical loadings capable of being imposed as a result of a serious accident as well as during periods of normal plant operation. The support arrangement of the invention is, at the same time, capable of accommodating radial displacements that normally occur between the reactor vessel and the containment structure due to operational transients. The arrangement comprises a plurality of vertical columns connected between the reactor vessel and a support base within the containment structure. The columns are designed to accommodate relative displacements between the vessel and the containment structure by flexing. This eliminates the need for relative sliding movements and thus enables the columns to be securely fixed to the vessel. This elimination of a provision for relative sliding movements avoids the spaces or gaps between the retention members and the retained elements as occurred in prior art arrangements and, concomitantly, the danger of establishing impact forces on the retention members in the event of an accident is reduced. (author)

  4. Cheboygan Vessel Base

    Data.gov (United States)

    Federal Laboratory Consortium — Cheboygan Vessel Base (CVB), located in Cheboygan, Michigan, is a field station of the USGS Great Lakes Science Center (GLSC). CVB was established by congressional...

  5. High Performance Marine Vessels

    CERN Document Server

    Yun, Liang

    2012-01-01

    High Performance Marine Vessels (HPMVs) range from the Fast Ferries to the latest high speed Navy Craft, including competition power boats and hydroplanes, hydrofoils, hovercraft, catamarans and other multi-hull craft. High Performance Marine Vessels covers the main concepts of HPMVs and discusses historical background, design features, services that have been successful and not so successful, and some sample data of the range of HPMVs to date. Included is a comparison of all HPMVs craft and the differences between them and descriptions of performance (hydrodynamics and aerodynamics). Readers will find a comprehensive overview of the design, development and building of HPMVs. In summary, this book: Focuses on technology at the aero-marine interface Covers the full range of high performance marine vessel concepts Explains the historical development of various HPMVs Discusses ferries, racing and pleasure craft, as well as utility and military missions High Performance Marine Vessels is an ideal book for student...

  6. 2011 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  7. 2011 Fishing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  8. Pressurized Vessel Slurry Pumping

    International Nuclear Information System (INIS)

    Pound, C.R.

    2001-01-01

    This report summarizes testing of an alternate ''pressurized vessel slurry pumping'' apparatus. The principle is similar to rural domestic water systems and ''acid eggs'' used in chemical laboratories in that material is extruded by displacement with compressed air

  9. 2013 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  10. Maury Journals - US Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — U.S. vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  11. Coastal Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels that have been issued a Federal permit for the Gulf of Mexico reef fish,...

  12. In-vessel tritium

    International Nuclear Information System (INIS)

    Ueda, Yoshio; Ohya, Kaoru; Ashikawa, Naoko; Ito, Atsushi M.; Kato, Daiji; Kawamura, Gakushi; Takayama, Arimichi; Tomita, Yukihiro; Nakamura, Hiroaki; Ono, Tadayoshi; Kawashima, Hisato; Shimizu, Katsuhiro; Takizuka, Tomonori; Nakano, Tomohide; Nakamura, Makoto; Hoshino, Kazuo; Kenmotsu, Takahiro; Wada, Motoi; Saito, Seiki; Takagi, Ikuji; Tanaka, Yasunori; Tanabe, Tetsuo; Yoshida, Masafumi; Toma, Mitsunori; Hatayama, Akiyoshi; Homma, Yuki; Tolstikhina, Inga Yu.

    2012-01-01

    The in-vessel tritium research is closely related to the plasma-materials interaction. It deals with the edge-plasma-wall interaction, the wall erosion, transport and re-deposition of neutral particles and the effect of neutral particles on the fuel recycling. Since the in-vessel tritium shows a complex nonlinear behavior, there remain many unsolved problems. So far, behaviors of in-vessel tritium have been investigated by two groups A01 and A02. The A01 group performed experiments on accumulation and recovery of tritium in thermonuclear fusion reactors and the A02 group studied theory and simulation on the in-vessel tritium behavior. In the present article, outcomes of the research are reviewed. (author)

  13. Reactor pressure vessel support

    International Nuclear Information System (INIS)

    Butti, J.P.

    1977-01-01

    A link and pin support system provides the primary vertical and lateral support for a nuclear reactor pressure vessel without restricting thermally induced radial and vertical expansion and contraction. (Auth.)

  14. 2013 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  15. 2013 Fishing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  16. 2013 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  17. Ocean Station Vessel

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Ocean Station Vessels (OSV) or Weather Ships captured atmospheric conditions while being stationed continuously in a single location. While While most of the...

  18. Vessel Sewage Discharges

    Science.gov (United States)

    Vessel sewage discharges are regulated under Section 312 of the Clean Water Act, which is jointly implemented by the EPA and Coast Guard. This homepage links to information on marine sanitation devices and no discharge zones.

  19. Reactor pressure vessel design

    International Nuclear Information System (INIS)

    Foehl, J.

    1998-01-01

    As a result of the popularity of the Agencies report 'Neutron Irradiation Embrittlement of Reactor Pressure Vessel Steels' of 1975, it was decided that another report on this broad subject would be of use. In this report, background and contemporary views on specially identified areas of the subject are considered as self-contained chapters, written by experts. In chapter 2, the general principles of reactor pressure vessel design are elaborated. Crack and fracture initiation and propagation are treated in some detail

  20. Graywater Discharges from Vessels

    Science.gov (United States)

    2011-11-01

    metals (e.g., cadmium, chromium, lead, copper , zinc, silver, nickel, and mercury), solids, and nutrients (USEPA, 2008b; USEPA 2010). Wastewater from... flotation ), and disinfection (using ultraviolet light) as compared to traditional Type II MSDs that use either simple maceration and chlorination, or...Coliform Naval Vessels Oceanographic Vessels Small Cruise Ships 25a Vendor 2 Hamann AG Biological Treatment with Dissolved Air Flotation and

  1. LANL Robotic Vessel Scanning

    Energy Technology Data Exchange (ETDEWEB)

    Webber, Nels W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-25

    Los Alamos National Laboratory in J-1 DARHT Operations Group uses 6ft spherical vessels to contain hazardous materials produced in a hydrodynamic experiment. These contaminated vessels must be analyzed by means of a worker entering the vessel to locate, measure, and document every penetration mark on the vessel. If the worker can be replaced by a highly automated robotic system with a high precision scanner, it will eliminate the risks to the worker and provide management with an accurate 3D model of the vessel presenting the existing damage with the flexibility to manipulate the model for better and more in-depth assessment.The project was successful in meeting the primary goal of installing an automated system which scanned a 6ft vessel with an elapsed time of 45 minutes. This robotic system reduces the total time for the original scope of work by 75 minutes and results in excellent data accumulation and transmission to the 3D model imaging program.

  2. FFTF and CRBRP reactor vessels

    International Nuclear Information System (INIS)

    Morgan, R.E.

    1977-01-01

    The Fast Flux Test Facility (FFTF) reactor vessel and the Clinch River Breeder Reactor Plant (CRBRP) reactor vessel each serve to enclose a fast spectrum reactor core, contain the sodium coolant, and provide support and positioning for the closure head and internal structure. Each vessel is located in its reactor cavity and is protected by a guard vessel which would ensure continued decay heat removal capability should a major system leak develop. Although the two plants have significantly different thermal power ratings, 400 megawatts for FFTF and 975 megawatts for CRBRP, the two reactor vessels are comparable in size, the CRBRP vessel being approximately 28% longer than the FFTF vessel. The FFTF vessel diameter was controlled by the space required for the three individual In-Vessel Handling Machines and Instrument Trees. Utilization of the triple rotating plug scheme for CRBRP refueling enables packaging of the larger CRBRP core in a vessel the same diameter as the FFTF vessel

  3. Planning U.S. Security,

    Science.gov (United States)

    1981-01-01

    Crisis. Boston: Little, Brown & Co., 1971. Ansoff , H. Igor . Strategic Management. New York: John Wiley & Sons, 1979. Antonelli, Theodore, Major General...Shirley, Michael H. Peters, and Adel I. EI-Ansary, Strategy and Policy Formation (New York: Wiley, 1976); H. Igor Ansoff , Strategic Manage- ment (New

  4. Streamlined Approach for Environmental Restoration (SAFER) Plan for Corrective Action Unit 465: Hydronuclear Nevada National Security Site, Nevada, with ROTC 1, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2011-11-01

    This Streamlined Approach for Environmental Restoration (SAFER) Plan addresses the actions needed to achieve closure for Corrective Action Unit (CAU) 465, Hydronuclear, identified in the Federal Facility Agreement and Consent Order (FFACO). Corrective Action Unit 465 comprises the following four corrective action sites (CASs) located in Areas 6 and 27 of the Nevada National Security Site: (1) 00-23-01, Hydronuclear Experiment; (2) 00-23-02, Hydronuclear Experiment; (3) 00-23-03, Hydronuclear Experiment; (4) 06-99-01, Hydronuclear. The sites will be investigated based on the data quality objectives (DQOs) developed on July 6, 2011, by representatives of the Nevada Division of Environmental Protection (NDEP) and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to determine and implement appropriate corrective actions for each CAS in CAU 465. For CAU 465, two potential release components have been identified. The subsurface release component includes potential releases of radiological and nonradiological contaminants from the subsurface hydronuclear experiments and disposal boreholes. The surface release component consists of other potential releases of radiological and nonradiological contaminants to surface soils that may have occurred during the pre- and post-test activities. This plan provides the methodology for collection of the necessary information for closing each CAS component. There is sufficient information and process knowledge from historical documentation, contaminant characteristics, existing regional and site groundwater models, and investigations of similar sites regarding the expected nature and extent of potential contaminants to recommend closure of CAU 465 using the SAFER process. For potential subsurface releases, flow and transport models will be developed to integrate existing data into a conservative

  5. Corrective Action Investigation Plan for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Matthews

    2012-08-01

    CAU 570 comprises the following six corrective action sites (CASs): • 02-23-07, Atmospheric Test Site - Tesla • 09-23-10, Atmospheric Test Site T-9 • 09-23-11, Atmospheric Test Site S-9G • 09-23-14, Atmospheric Test Site - Rushmore • 09-23-15, Eagle Contamination Area • 09-99-01, Atmospheric Test Site B-9A These sites are being investigated because existing information on the nature and extent of potential contamination is insufficient to evaluate and recommend corrective action alternatives (CAAs). Additional information will be obtained by conducting a corrective action investigation before evaluating CAAs and selecting the appropriate corrective action for each CAS. The results of the field investigation will support a defensible evaluation of viable CAAs that will be presented in the Corrective Action Decision Document. The sites will be investigated based on the data quality objectives (DQOs) developed on April 30, 2012, by representatives of the Nevada Division of Environmental Protection and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to develop and evaluate appropriate corrective actions for CAU 570. The site investigation process will also be conducted in accordance with the Soils Activity Quality Assurance Plan, which establishes requirements, technical planning, and general quality practices to be applied to this activity. The presence and nature of contamination at CAU 570 will be evaluated based on information collected from a field investigation. Radiological contamination will be evaluated based on a comparison of the total effective dose at sample locations to the dose-based final action level. The total effective dose will be calculated as the total of separate estimates of internal and external dose. Results from the analysis of soil samples will be used to calculate internal radiological

  6. USCG Vessel Events

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  7. USCG Vessel Pollution

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  8. Assessment of the integrity of WWER type reactor pressure vessels

    International Nuclear Information System (INIS)

    Brumovsky, M.

    1995-01-01

    Procedures are given for the assessment of the residual lifetime of reactor pressure vessels with respect to a sudden failure, the lifetime of vessels with defects disclosed during in-service inspections, and the fatigue or corrosion-mechanical lifetime. Also outlined are the ways of assessing the effects of major degradation mechanisms, i.e. radiation embrittlement, thermal aging, and fatigue damage, including the use of calculated values and experimental examination, by means of surveillance specimens in particular. All results of assessment performed so far indicate that the life of reactor pressure vessels at the Dukovany, Jaslovske Bohunice, and Temelin nuclear power plants is well secured. 7 figs., 3 refs

  9. Acrylic vessel cleaning tests

    International Nuclear Information System (INIS)

    Earle, D.; Hahn, R.L.; Boger, J.; Bonvin, E.

    1997-01-01

    The acrylic vessel as constructed is dirty. The dirt includes blue tape, Al tape, grease pencil, gemak, the glue or residue form these tapes, finger prints and dust of an unknown composition but probably mostly acrylic dust. This dirt has to be removed and once removed, the vessel has to be kept clean or at least to be easily cleanable at some future stage when access becomes much more difficult. The authors report on the results of a series of tests designed: (a) to prepare typical dirty samples of acrylic; (b) to remove dirt stuck to the acrylic surface; and (c) to measure the optical quality and Th concentration after cleaning. Specifications of the vessel call for very low levels of Th which could come from tape residues, the grease pencil, or other sources of dirt. This report does not address the concerns of how to keep the vessel clean after an initial cleaning and during the removal of the scaffolding. Alconox is recommended as the cleaner of choice. This acrylic vessel will be used in the Sudbury Neutrino Observatory

  10. Progress of ITER vacuum vessel

    Energy Technology Data Exchange (ETDEWEB)

    Ioki, K., E-mail: Kimihiro.Ioki@iter.org [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Bayon, A. [F4E, c/ Josep Pla, No. 2, Torres Diagonal Litoral, Edificio B3, E-08019 Barcelona (Spain); Choi, C.H.; Daly, E.; Dani, S.; Davis, J.; Giraud, B.; Gribov, Y.; Hamlyn-Harris, C.; Jun, C.; Levesy, B. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Kim, B.C. [NFRI, 52 Yeoeundong Yuseonggu, Daejeon 305-333 (Korea, Republic of); Kuzmin, E. [NTC “Sintez”, Efremov Inst., 189631 Metallostroy, St. Petersburg (Russian Federation); Le Barbier, R.; Martinez, J.-M. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Pathak, H. [ITER-India, A-29, GIDC Electronic Estate, Sector 25, Gandhinagar 382025 (India); Preble, J. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); Sa, J.W. [NFRI, 52 Yeoeundong Yuseonggu, Daejeon 305-333 (Korea, Republic of); Terasawa, A.; Utin, Yu. [ITER Organization, Route de Vinon sur Verdon, 13115 St Paul-lez-Durance (France); and others

    2013-10-15

    Highlights: ► This covers the overall status and progress of the ITER vacuum vessel activities. ► It includes design, R and D, manufacturing and approval process of the regulators. ► The baseline design was completed and now manufacturing designs are on-going. ► R and D includes ISI, dynamic test of keys and lip-seal welding/cutting technology. ► The VV suppliers produced full-scale mock-ups and started VV manufacturing. -- Abstract: Design modifications were implemented in the vacuum vessel (VV) baseline design in 2011–2012 for finalization. The modifications are mostly due to interface components, such as support rails and feedthroughs for the in-vessel coils (IVC). Manufacturing designs are being developed at the domestic agencies (DAs) based on the baseline design. The VV support design was also finalized and tests on scale mock-ups are under preparation. Design of the in-wall shielding (IWS) has progressed, considering the assembly methods and the required tolerances. Further modifications are required to be consistent with the DAs’ manufacturing designs. Dynamic tests on the inter-modular and stub keys to support the blanket modules are being performed to measure the dynamic amplification factor (DAF). An in-service inspection (ISI) plan has been developed and R and D was launched for ISI. Conceptual design of the VV instrumentation has been developed. The VV baseline design was approved by the agreed notified body (ANB) in accordance with the French Nuclear Pressure Equipment Order procedure.

  11. Progress of ITER vacuum vessel

    International Nuclear Information System (INIS)

    Ioki, K.; Bayon, A.; Choi, C.H.; Daly, E.; Dani, S.; Davis, J.; Giraud, B.; Gribov, Y.; Hamlyn-Harris, C.; Jun, C.; Levesy, B.; Kim, B.C.; Kuzmin, E.; Le Barbier, R.; Martinez, J.-M.; Pathak, H.; Preble, J.; Sa, J.W.; Terasawa, A.; Utin, Yu.

    2013-01-01

    Highlights: ► This covers the overall status and progress of the ITER vacuum vessel activities. ► It includes design, R and D, manufacturing and approval process of the regulators. ► The baseline design was completed and now manufacturing designs are on-going. ► R and D includes ISI, dynamic test of keys and lip-seal welding/cutting technology. ► The VV suppliers produced full-scale mock-ups and started VV manufacturing. -- Abstract: Design modifications were implemented in the vacuum vessel (VV) baseline design in 2011–2012 for finalization. The modifications are mostly due to interface components, such as support rails and feedthroughs for the in-vessel coils (IVC). Manufacturing designs are being developed at the domestic agencies (DAs) based on the baseline design. The VV support design was also finalized and tests on scale mock-ups are under preparation. Design of the in-wall shielding (IWS) has progressed, considering the assembly methods and the required tolerances. Further modifications are required to be consistent with the DAs’ manufacturing designs. Dynamic tests on the inter-modular and stub keys to support the blanket modules are being performed to measure the dynamic amplification factor (DAF). An in-service inspection (ISI) plan has been developed and R and D was launched for ISI. Conceptual design of the VV instrumentation has been developed. The VV baseline design was approved by the agreed notified body (ANB) in accordance with the French Nuclear Pressure Equipment Order procedure

  12. EDF studies on PWR vessel internal loading

    International Nuclear Information System (INIS)

    Bellet, S.; Vallat, S.

    1998-01-01

    EDF has undertaken some mechanics and thermal-hydraulics studies with the objective of mastering plant phenomena today and in order to numerically predict the behaviour of vessel internals on units planned for the future. From some justifications already underway after in operation incidents (wear and drop time of RCCA rods, fuel deflection, adapter cracks, baffle bolt cracks) we intend to control reactor vessel flows and mechanical behaviour of internal structures. During normal operation, thermal-hydraulic is the main load of vessel internals. The current approach consists of acquiring the capacity to link different calculations, taking care that codes are qualified for physical phenomena and complex 3D geometries. For baffle assembly, a more simple model of this structure has been used to treat the physical phenomena linked to the LOCA transient. Results are encouraging mainly due to code capacity progression (resolution and models), which allows more and more complex physical phenomena to be treated, like turbulence flow and LOCA. (author)

  13. 33 CFR 96.370 - What are the requirements for vessels of countries not party to Chapter IX of SOLAS?

    Science.gov (United States)

    2010-07-01

    ... vessel, or self-propelled mobile offshore drilling unit of 500 gross tons or more, operated in U.S... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY VESSEL OPERATING REGULATIONS RULES FOR THE SAFE OPERATION OF VESSELS AND SAFETY MANAGEMENT SYSTEMS How Will Safety Management Systems Be Certificated and...

  14. 46 CFR 2.01-50 - Persons other than crew on towing, oyster, or fishing steam vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Persons other than crew on towing, oyster, or fishing steam vessels. 2.01-50 Section 2.01-50 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES... than crew on towing, oyster, or fishing steam vessels. (a) A steam vessel engaged in towing, oyster...

  15. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  16. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  17. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  18. Radioactive liquid containing vessel

    International Nuclear Information System (INIS)

    Sakurada, Tetsuo; Kawamura, Hironobu.

    1993-01-01

    Cooling jackets are coiled around the outer circumference of a container vessel, and the outer circumference thereof is covered with a surrounding plate. A liquid of good conductivity (for example, water) is filled between the cooling jackets and the surrounding plate. A radioactive liquid is supplied to the container vessel passing through a supply pipe and discharged passing through a discharge pipe. Cooling water at high pressure is passed through the cooling water jackets in order to remove the heat generated from the radioactive liquid. Since cooling water at high pressure is thus passed through the coiled pipes, the wall thickness of the container vessel and the cooling water jackets can be reduced, thereby enabling to reduce the cost. Further, even if the radioactive liquid is leaked, there is no worry of contaminating cooling water, to prevent contamination. (I.N.)

  19. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  20. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  1. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  2. Turkish Republic of Northern Cyprus Vessel Traffic Services (TRNCVTS

    Directory of Open Access Journals (Sweden)

    Serdar KUM

    2016-06-01

    Full Text Available The first Vessel Traffic Service (VTS started in 1949 in the Liverpool Port (UK and it continued in Netherlands in 1956. In Turkey, planning and management of the marine traffic using the waterways and ports in Turkey started with Turkish Straits VTS which came into service in 2003 due to the increase in traffic density enhance its effectiveness and necessity every year. Feasibility studies in five new areas have been initiated for the establishment of the VTS system by force of the strategic decision taken by the maritime authority in 2008. These areas are; İzmit Bay, Izmir Bay and Aliağa Region, Gulf of İskenderun and Mersin. Monitoring the marine traffic has an important place as the Turkish Republic of Northern Cyprus (TRNC is an important transition point in the Eastern Mediterranean region. For this reason, in this study the impact assessment and necessity of the establishment of a VTS to be located in the TRNC were evaluated by using Environmental (PEST: Political, Economic, Social, Technological and SWOT (Strengths, Weakness, Opportunities, Threats Analyses. In addition, the suitability of the possible locations of Traffic Monitoring Stations (TMS has been examined by the field study. Evaluation of TRNC VTS in geographical and strategic terms will benefit from the opportunities and facilities that both the Republic of Turkey and the TRNC will have as a part of the effect of VTS against the embargo imposed on the TRNC in the world. Three appropriate VTS TMSs have been chosen as a result of the field study carried out for 10 determined TMSs; Cape Kormakitis, Cape Apostolos Andreas and Famagusta. It is also concluded that it would be appropriate to plan the Famagusta Station as VTS Centre. It is assumed to monitor and track the vessels in the zones out of the coverage area of these stations by Automatic Identification System (AIS. Safety and security in the shipping, protection of navigation, life, property and the marine environment of

  3. Baking results of KSTAR vacuum vessel

    Energy Technology Data Exchange (ETDEWEB)

    Kim, S. T.; Kim, Y. J.; Kim, K. M.; Im, D. S.; Joung, N. Y.; Yang, H. L.; Kim, Y. S.; Kwon, M. [National Fusion Research Institute, Daejeon (Korea, Republic of)

    2009-05-15

    The Korea Superconducting Tokamak Advanced Research (KSTAR) is an advanced superconducting tokamak designed to establish a scientific and technological basis for an attractive fusion reactor. The fusion energy in the tokamak device is released through fusion reactions of light atoms such as deuterium or helium in hot plasma state, of which temperature reaches several hundreds of millions Celsius. The high temperature plasma is created in the vacuum vessel that provides ultra high vacuum status. Accordingly, it is most important for the vacuum condition to keep clean not only inner space but also surface of the vacuum vessel to make high quality plasma. There are two methods planned to clean the wall surface of the KSTAR vacuum vessel. One is surface baking and the other is glow discharge cleaning (GDC). To bake the vacuum vessel, De-Ionized (DI) water is heated to 130 .deg. C and circulated in the passage between double walls of the vacuum vessel (VV) in order to bake the surface. The GDC operation uses hydrogen and inert gas discharges. In this paper, general configuration and brief introduction of the baking result will be reported.

  4. Baking results of KSTAR vacuum vessel

    International Nuclear Information System (INIS)

    Kim, S. T.; Kim, Y. J.; Kim, K. M.; Im, D. S.; Joung, N. Y.; Yang, H. L.; Kim, Y. S.; Kwon, M.

    2009-01-01

    The Korea Superconducting Tokamak Advanced Research (KSTAR) is an advanced superconducting tokamak designed to establish a scientific and technological basis for an attractive fusion reactor. The fusion energy in the tokamak device is released through fusion reactions of light atoms such as deuterium or helium in hot plasma state, of which temperature reaches several hundreds of millions Celsius. The high temperature plasma is created in the vacuum vessel that provides ultra high vacuum status. Accordingly, it is most important for the vacuum condition to keep clean not only inner space but also surface of the vacuum vessel to make high quality plasma. There are two methods planned to clean the wall surface of the KSTAR vacuum vessel. One is surface baking and the other is glow discharge cleaning (GDC). To bake the vacuum vessel, De-Ionized (DI) water is heated to 130 .deg. C and circulated in the passage between double walls of the vacuum vessel (VV) in order to bake the surface. The GDC operation uses hydrogen and inert gas discharges. In this paper, general configuration and brief introduction of the baking result will be reported

  5. Corrective Action Decision Document/Corrective Action Plan for Corrective Action Unit 547: Miscellaneous Contaminated Waste Sites, Nevada National Security Site, Nevada, Revision 0

    Energy Technology Data Exchange (ETDEWEB)

    Mark Krauss

    2011-09-01

    The purpose of this CADD/CAP is to present the corrective action alternatives (CAAs) evaluated for CAU 547, provide justification for selection of the recommended alternative, and describe the plan for implementing the selected alternative. Corrective Action Unit 547 consists of the following three corrective action sites (CASs): (1) CAS 02-37-02, Gas Sampling Assembly; (2) CAS 03-99-19, Gas Sampling Assembly; and(3) CAS 09-99-06, Gas Sampling Assembly. The gas sampling assemblies consist of inactive process piping, equipment, and instrumentation that were left in place after completion of underground safety experiments. The purpose of these safety experiments was to confirm that a nuclear explosion would not occur in the case of an accidental detonation of the high-explosive component of the device. The gas sampling assemblies allowed for the direct sampling of the gases and particulates produced by the safety experiments. Corrective Action Site 02-37-02 is located in Area 2 of the Nevada National Security Site (NNSS) and is associated with the Mullet safety experiment conducted in emplacement borehole U2ag on October 17, 1963. Corrective Action Site 03-99-19 is located in Area 3 of the NNSS and is associated with the Tejon safety experiment conducted in emplacement borehole U3cg on May 17, 1963. Corrective Action Site 09-99-06 is located in Area 9 of the NNSS and is associated with the Player safety experiment conducted in emplacement borehole U9cc on August 27, 1964. The CAU 547 CASs were investigated in accordance with the data quality objectives (DQOs) developed by representatives of the Nevada Division of Environmental Protection (NDEP) and the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office. The DQO process was used to identify and define the type, amount, and quality of data needed to determine and implement appropriate corrective actions for CAU 547. Existing radiological survey data and historical knowledge of

  6. Pressure vessel integrity 1991

    International Nuclear Information System (INIS)

    Bhandari, S.; Doney, R.O.; McDonald, M.S.; Jones, D.P.; Wilson, W.K.; Pennell, W.E.

    1991-01-01

    This volume contains papers relating to the structural integrity assessment of pressure vessels and piping, with special emphasis on nuclear industry applications. The papers were prepared for technical sessions developed under the sponsorship of the ASME Pressure Vessels and Piping Division Committees for Codes and Standards, Computer Technology, Design and Analysis, and Materials Fabrication. They were presented at the 1991 Pressure Vessels and Piping Division Conference in San Diego, California, June 23-27. The primary objective of the sponsoring organization is to provide a forum for the dissemination and discussion of information on development and application of technology for the structural integrity assessment of pressure vessels and piping. This publication includes contributions from authors from Australia, France, Japan, Sweden, Switzerland, the United Kingdom, and the United States. The papers here are organized in six sections, each with a particular emphasis as indicated in the following section titles: Fracture Technology Status and Application Experience; Crack Initiation, Propagation and Arrest; Ductile Tearing; Constraint, Stress State, and Local-Brittle-Zones Effects; Computational Techniques for Fracture and Corrosion Fatigue; and Codes and Standards for Fatigue, Fracture and Erosion/Corrosion

  7. The reactor vessel steels

    International Nuclear Information System (INIS)

    Bilous, W.; Hajewska, E.; Szteke, W.; Przyborska, M.; Wasiak, J.; Wieczorkowski, M.

    2005-01-01

    In the paper the fundamental steels using in the construction of pressure vessel water reactor are discussed. The properties of these steels as well as the influence of neutron irradiation on its degradation in the time of exploitation are also done. (authors)

  8. Vacuum distilling vessel

    Energy Technology Data Exchange (ETDEWEB)

    Reik, H

    1928-12-27

    Vacuum distilling vessel for mineral oil and the like, characterized by the ring-form or polyconal stiffeners arranged inside, suitably eccentric to the casing, being held at a distance from the casing by connecting members of such a height that in the resulting space if necessary can be arranged vapor-distributing pipes and a complete removal of the residue is possible.

  9. Visualization of vessel traffic

    NARCIS (Netherlands)

    Willems, C.M.E.

    2011-01-01

    Moving objects are captured in multivariate trajectories, often large data with multiple attributes. We focus on vessel traffic as a source of such data. Patterns appearing from visually analyzing attributes are used to explain why certain movements have occurred. In this research, we have developed

  10. GOLD PRESSURE VESSEL SEAL

    Science.gov (United States)

    Smith, A.E.

    1963-11-26

    An improved seal between the piston and die member of a piston-cylinder type pressure vessel is presented. A layer of gold, of sufficient thickness to provide an interference fit between the piston and die member, is plated on the contacting surface of at least one of the members. (AEC)

  11. Reactor vessel stud tensioner

    International Nuclear Information System (INIS)

    Malandra, L.J.; Beer, R.W.; Salton, R.B.; Spiegelman, S.R.; Cognevich, M.L.

    1982-01-01

    A quick-acting stud tensioner, for facilitating the loosening or tightening of a stud nut on a reactor vessel stud, has gripper jaws which when the tensioner is lowered into engagement with the upper end of the stud are moved inwards to grip the upper end and which when the tensioner is lifted move outward to release the upper end. (author)

  12. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  13. Staying Secure for School Safety

    Science.gov (United States)

    Youngkin, Minu

    2012-01-01

    Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…

  14. Operation Iraqi Freedom: DOD Should Apply Lessons Learned Concerning the Need for Security over Conventional Munitions Storage Sites to Future Operations Planning

    National Research Council Canada - National Science Library

    D'Agostino, Davi M

    2007-01-01

    The Government Accountability Office (GAO) is releasing a report today on lessons learned concerning the need for security over conventional munitions storage sites that provides the basis for this testimony...

  15. PDX vacuum vessel stress analysis

    International Nuclear Information System (INIS)

    Nikodem, Z.D.

    1975-01-01

    A stress analysis of PDX vacuum vessel is described and the summary of results is presented. The vacuum vessel is treated as a toroidal shell of revolution subjected to an internal vacuum. The critical buckling pressure is calculated. The effects of the geometrical discontinuity at the juncture of toroidal shell head and cylindrical outside wall, and the concavity of the cylindrical wall are examined. An effect of the poloidal field coil supports and the vessel outside supports on the stress distribution in the vacuum vessel is determined. A method evaluating the influence of circular ports in the vessel wall on the stress level in the vessel is outlined

  16. Effect of radiation damage on operating safety of steel pressure vessels of nuclear reactors

    International Nuclear Information System (INIS)

    Vacek, M.; Havel, S.; Stoces, B.; Brumovsky, M.

    1980-01-01

    The effects are assessed of the environment upon mechanical properties of steel used generally for pressure vessels of light water nuclear reactors. Changes caused by radiation affect the reliability of vessels. Deterioration of steel properties is mainly due to neutron radiation. The article deals with factors bearing upon damage and with methods allowing to evaluate the reliability of vessels and predict their service life. Operating reliability of vessels is very unfavourably affected by planned and accidental reactor transients. (author)

  17. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  18. Project Management with IT Security Focus

    OpenAIRE

    Felician Alecu; Paul Pocatilu; Sergiu Capisizu

    2011-01-01

    The paper focus on the main key points related to the IT security project management. The most important lifecycle stages are identified: IT security project proposal definition, project organization, project planning, quality planning, project team organization, IT security project activities management and project closing. The most important success factors for IT security projects are the support of top-management, customer satisfaction, prevention over remediation and continuous progress....

  19. Defense Utility of Commercial Vessels and Craft.

    Science.gov (United States)

    1980-01-01

    interpreted to determine whether the vessel is suitable for the salvage * job required. Sometimes, a photograph or general arrangement plan is most...30. UNDERWAY REPLENISHMENT (yes/no) Yes 31 . OTHER POSSIBLE FEATURES Diesel powered mue pur’ps 2000-4000 HP, Draw works 2000-3000 HTP C. BARGE...of the Army, Marine Crewman’s Handbook, Technical Manual TM 55-501 (Washington: Sept. 1972). 23. Department of the Army, Marine Equipment

  20. Maritime Training Serbian Autonomous Vessel Protection Detachment

    Directory of Open Access Journals (Sweden)

    Šoškić Svetislav D.

    2014-06-01

    Full Text Available The crisis in Somalia has caused appearance of piracy at sea in the Gulf of Aden and the Western Indian Ocean. Somali pirates have become a threat to economic security of the world because almost 30 percent of world oil and 20 percent of global trade passes through the Gulf of Aden. Solving the problem of piracy in this part of the world have included international organizations, institutions, military alliances and the states, acting in accordance with international law and UN Security Council resolutions. The European Union will demonstrate the application of a comprehensive approach to solving the problem of piracy at sea and the crisis in Somalia conducting naval operation — EU NAVFOR Atalanta and operation EUTM under the Common Security and Defense Policy. The paper discusses approaches to solving the problem of piracy in the Gulf of Aden and the crisis in Somalia. Also, the paper points to the complexity of the crisis in Somalia and dilemmas correctness principles that are applied to solve the problem piracy at sea. One of goals is protections of vessels of the World Food Programme (WFP delivering food aid to displaced persons in Somalia. Republic of Serbia joined in this mission and trained and sent one a autonomous team in this military operation for protection WFP. This paper consist the problem of modern piracy, particularly in the area of the Horn of Africa became a real threat for the safety of maritime ships and educational process of Serbian Autonomous vessel protection detachment. Serbian Military Academy adopted and developed educational a training program against piracy applying all the provisions and recommendations of the IMO conventions and IMO model courses for Serbian Autonomous vessel protection detachment.

  1. 76 FR 7757 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2011-02-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2007-29236] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Follow-up to request for... expanded hull identification number (HIN). The Coast Guard's decision-making process included consideration...

  2. 77 FR 59575 - Hull Identification Numbers for Recreational Vessels

    Science.gov (United States)

    2012-09-28

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2012-0843] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Request for public comments... requirement to indicate a boat's model year as part of the 12-character Hull Identification Number (HIN...

  3. Vessels in Transit - Web Tool

    Data.gov (United States)

    Department of Transportation — A web tool that provides real-time information on vessels transiting the Saint Lawrence Seaway. Visitors may sort by order of turn, vessel name, or last location in...

  4. Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course

    Directory of Open Access Journals (Sweden)

    Marcin Zyczkowski

    2017-06-01

    Full Text Available In this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that we can obtain quite acceptable results.

  5. The U.S. Coast Guard’s Deepwater Force Modernization Plan: Can It Be Accelerated? Will It Meet Changing Security Needs?

    Science.gov (United States)

    2004-01-01

    Vehicle WAGB Ice Breaker WHEC High Endurance Cutter (also HEC) WIX Training Cutter WLB Seagoing Buoy Tender WLI Inland Buoy Tender WLIC Inland Construction...Foreign vessel inspections • Living marine resources protection • Marine and environmental science. The USCG website includes web pages for each mission...pp. 6–8 (available on the Web at http://www.uscg.mil/deepwater/. Mission Need. Most USCG Deepwater missions can be broken down into the functional

  6. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  7. 46 CFR 178.340 - Stability standards for pontoon vessels on protected waters.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Stability standards for pontoon vessels on protected waters. 178.340 Section 178.340 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL....340 Stability standards for pontoon vessels on protected waters. (a) The portion of the deck...

  8. 46 CFR 42.09-35 - Additional survey requirements for wood-hull vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Additional survey requirements for wood-hull vessels. 42.09-35 Section 42.09-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) LOAD LINES... Additional survey requirements for wood-hull vessels. (a) In addition to the requirements in § 42.09-25, the...

  9. 46 CFR 180.204 - Survival craft-vessels operating on coastwise routes.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Survival craft-vessels operating on coastwise routes. 180.204 Section 180.204 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SMALL... Craft § 180.204 Survival craft—vessels operating on coastwise routes. (a) Except as allowed by paragraph...

  10. 78 FR 47716 - Final Guidance Regarding Voluntary Inspection of Vessels for Compliance With the Maritime Labour...

    Science.gov (United States)

    2013-08-06

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-1066] Final Guidance Regarding Voluntary Inspection of Vessels for Compliance With the Maritime Labour Convention, 2006 AGENCY: Coast Guard... procedures regarding the inspection of U.S. vessels for voluntary compliance with the Maritime Labour...

  11. Reactor vessel sealing plug

    International Nuclear Information System (INIS)

    Dooley, R.A.

    1986-01-01

    An apparatus is described for sealing a cold leg nozzle of a nuclear reactor pressure vessel from a remote location comprising: at least one sealing plug for mechanically sealing the nozzle from the inside of the reactor pressure vessel. The sealing plug includes a plate and a cone assembly having an end part receptive in the nozzle, the plate being axially moveable relative to the cone assembly. The plate and cone assembly have confronting bevelled edges defining an opening therebetween. A primary O-ring is disposed about the opening and is supported on the bevelled edges, the plate being guidably mounted to the cone assembly for movement toward the cone assembly to radially expand the primary O-ring into sealing engagement with the nozzle. A means is included for providing relative movement between the outer plate and the cone assembly

  12. Mobile nuclear reactor containment vessel

    International Nuclear Information System (INIS)

    Thompson, R.E.; Spurrier, F.R.; Jones, A.R.

    1978-01-01

    A containment vessel for use in mobile nuclear reactor installations is described. The containment vessel completely surrounds the entire primary system, and is located as close to the reactor primary system components as is possible in order to minimize weight. In addition to being designed to withstand a specified internal pressure, the containment vessel is also designed to maintain integrity as a containment vessel in case of a possible collision accident

  13. Nuclear reactor vessel inspection apparatus

    International Nuclear Information System (INIS)

    Blackstone, E.G.; Lofy, R.A.; Williams, L.P.

    1979-01-01

    Apparatus for the in situ inspection of a nuclear reactor vessel to detect the location and character of flaws in the walls of the vessel, in the welds joining the various sections of the vessel, in the welds joining attachments such as nozzles, elbows and the like to the reactor vessel and in such attachments wherein an inspection head carrying one or more ultrasonic transducers follows predetermined paths in scanning the various reactor sections, welds and attachments

  14. Reactor vessel stud closure system

    International Nuclear Information System (INIS)

    Spiegelman, S.R.; Salton, R.B.; Beer, R.W.; Malandra, L.J.; Cognevich, M.L.

    1982-01-01

    A quick-acting stud tensioner apparatus for enabling the loosening or tightening of a stud nut on a reactor vessel stud. The apparatus is adapted to engage the vessel stud by closing a gripper around an upper end of the vessel stud when the apparatus is seated on the stud. Upon lifting the apparatus, the gripper releases the vessel stud so that the apparatus can be removed

  15. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  16. Examination of VVER-1000 Reactor Pressure Vessel

    International Nuclear Information System (INIS)

    Matokovic, A.; Picek, E.; Markulin, K.

    2008-01-01

    The increasing demand of a higher level of safety in the operation of the nuclear power plants requires the utilisation of more precise automated equipment to perform in-service inspections. That has been achieved by technological advances in computer technology, in robotics, in examination probe technology with the development of the advanced inspection technique and has also been due to the considerable and varied experience gained in the performance of such inspections. In-service inspection of reactor pressure vessel, especially Russian-designed WWER-1000 presents one of the most important and extensive examination of nuclear power plants primary circuit components. Such examination demand high standards of inspection technology, quality and continual innovation in the field of non-destructive testing advanced technology. A remote underwater contact ultrasonic technique is employed for the examination of the base metal of vessel and reactor welds, whence eddy current method is applied for clad surface examinations. Visual testing is used for examination of the vessel interior. The movement of inspection probes and data positioning are assured by using new reactor pressure vessel tool concept that is fully integrated with inspection systems. The successful performance of reactor pressure vessel is attributed thorough pre-outage planning, training and successful performance demonstration qualification of chosen non-destructive techniques on the specimens with artificial and/or real defects. Furthermore, use of advanced approach of inspection through implementation the state-of-the-art examination equipment significantly reduced the inspection time, radiation exposure to examination personnel, shortening nuclear power plant outage and cutting the total inspection costs. This paper presents advanced approach in the reactor pressure vessel in-service inspections and it is especially developed for WWER-1000 nuclear power plants.(author)

  17. Reactor pressure vessel steels

    International Nuclear Information System (INIS)

    Van De Velde, J.; Fabry, A.; Van Walle, E.; Chaouuadi, R.

    1998-01-01

    Research and development activities related to reactor pressure vessel steels during 1997 are reported. The objectives of activities of the Belgian Nuclear Research Centre SCK/CEN in this domain are: (1) to develop enhanced surveillance concepts by applying micromechanics and fracture-toughness tests to small specimens, and by performing damage modelling and microstructure characterization; (2) to demonstrate a methodology on a broad database; (3) to achieve regulatory acceptance and industrial use

  18. Reactor Pressure Vessel Steels

    Energy Technology Data Exchange (ETDEWEB)

    Van de Velde, J.; Fabry, A.; Van Walle, E.; Chaoudi, R

    1998-07-01

    SCK-CEN's R and D programme on Reactor Pressure Vessel (RPV) Steels in performed in support of the RVP integrity assessment. Its main objectives are: (1) to develop enhanced surveillance concepts by applying micromechanics and fracture-toughness tests to small specimens, and by performing damage modelling and microstructure characterization; (2) to demonstrate the applied methodology on a broad database; (3) to achieve regulatory acceptance and industrial use. Progress and achievements in 1999 are reported.

  19. Phenomenological vessel burst investigations

    International Nuclear Information System (INIS)

    Hippelein, K.W.; Julisch, P.; Muz, J.; Schiedermaier, J.

    1985-07-01

    Fourteen burst experiments have been carried out using vessels with circumferential and longitudinal flaws, for investigation of the fracture behaviour, i.e. the time-related fracture opening. The vessels had dimensions (outer diameter x wall thickness = 800 x 47 mm) which correspond to the dimensions of the main coolant piping of a 1300 MW e PWR. The test specimens had been made of the base-safe material 20 MnMoNi 55 and of a special, 22 NiMoCr 37 base alloy. The experimental conditions with regard to pressure and temperature have been chosen so as to correspond to normal operating conditions of a PWR (p∝17.5 MPa, T∝300 0 C), i.e. the flaws have been so dimensioned that failure was to be expected at a pressure of p∝17.5 MPa. As a rule, water has been used as the pressure medium, or in some cases air, in order to influence the time-dependent pressure decrease. Fluid and structural dynamics calculations have also been made. In order to determine the impact of a fast propagating crack on the leak-to-fracture curve, which normally is defined by quasistationary experiments, suitable tests have been made with large-volume, cylindrical vessels (outer diameter x wall thickness x length = 3000 x 21 x 14000 mm) made of the material WSt E 43. The leak-before-fracture criterion has been confirmed. (orig./HP) [de

  20. Blood Vessels in Allotransplantation.

    Science.gov (United States)

    Abrahimi, P; Liu, R; Pober, J S

    2015-07-01

    Human vascularized allografts are perfused through blood vessels composed of cells (endothelium, pericytes, and smooth muscle cells) that remain largely of graft origin and are thus subject to host alloimmune responses. Graft vessels must be healthy to maintain homeostatic functions including control of perfusion, maintenance of permselectivity, prevention of thrombosis, and participation in immune surveillance. Vascular cell injury can cause dysfunction that interferes with these processes. Graft vascular cells can be activated by mediators of innate and adaptive immunity to participate in graft inflammation contributing to both ischemia/reperfusion injury and allograft rejection. Different forms of rejection may affect graft vessels in different ways, ranging from thrombosis and neutrophilic inflammation in hyperacute rejection, to endothelialitis/intimal arteritis and fibrinoid necrosis in acute cell-mediated or antibody-mediated rejection, respectively, and to diffuse luminal stenosis in chronic rejection. While some current therapies targeting the host immune system do affect graft vascular cells, direct targeting of the graft vasculature may create new opportunities for preventing allograft injury and loss. © Copyright 2015 The American Society of Transplantation and the American Society of Transplant Surgeons.

  1. Ionizing radiations and blood vessels

    International Nuclear Information System (INIS)

    Vorob'ev, E.I.; Stepanov, R.P.

    1985-01-01

    Data on phenomenology of radiation-induced changes in blood vessels are systematized and authors' experience is generalized. Modern concepts about processes leading to vessel structure injury after irradiation is critically analyzed. Special attention is paid to reparation and compensation of X-ray vessel injury, consideration of which is not yet sufficiently elucidated in literature

  2. Ionizing radiations and blood vessels

    International Nuclear Information System (INIS)

    Vorob'ev, E.I.; Stepanov, R.P.

    1985-01-01

    Data on phenomeology of radiation changes of blood vessels are systemized and the authors' experience is generalyzed. A critical analysis of modern conceptions on processes resulting in vessel structure damage after irradiation, is given. Special attention is paid to reparation and compensation of radiation injury of vessels

  3. Maritime Security Fleet: Factors to Consider before Deciding to Select Participants Competitively

    National Research Council Canada - National Science Library

    1997-01-01

    The Maritime Security Act established the Maritime Security Fleet (MSF) program, authorizing MARAD to enter into agreements with maritime shipping companies to provide DOD access to commercial vessels operating under U.S...

  4. Device for supporting the vacuum vessel of a thermonuclear device

    International Nuclear Information System (INIS)

    Sato, Hiroshi.

    1980-01-01

    Purpose: To hold a vacuum vessel securely at a predetermined position. Constitution: A vacuum vessel is supported on its one side to the standard mounting location of a support frame by way of a pin junction. The vacuum vessel is provided at its upper and lower positions with movable mounting portions, which are connected by way of connecting rods to fixed mounting locations on the upper and lower frames. The fixed mounting locations are disposed on a vertical plane including the axis of the torus center. This arrangement enables to hold even a large vacuum vessel at an exact predetermined position even under high temperature conditions without limiting the container's thermal expansion relative to the changes in temperature, thereby providing an extremely high rigidity against electromagnetic forces, earthquakes, etc. (Furukawa, Y.)

  5. The Analysis of the Causes of Emergencies on the Vessels

    Directory of Open Access Journals (Sweden)

    Alicja Mrozowska

    2017-12-01

    Full Text Available The article discusses the results of research conducted on the vessels, covering a wide spectrum of issues relating to the exploitation of vessels of various flags, as well as operating security and safety systems on board. The main aim of the study was to collect numbers of data directly from the crew, for examples: indicate by the crew marine areas with the greatest probability of occurrence of casualties and incidents, trying to the definition the causes of their occurrence, prevention actions used on board and analyses operating safety systems used on the various type of vessels. The analysis of research became the basis to identify strengths and weaknesses areas of the vessel operation. The author proposes a solution to be implemented on board and emphasizes meaning of safety management system.

  6. 78 FR 10211 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Securities...

    Science.gov (United States)

    2013-02-13

    ... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY: The Department of Labor (DOL) is submitting the Employee Benefits Security Administration (EBSA) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' to...

  7. Hospital security: "protecting the business".

    Science.gov (United States)

    Maas, Jos

    2013-01-01

    Implementing management science into security isn't hard and is more necessary than ever according to the author who presents and illustrates a five point plan that he says will get the security job done easier and with more commitment from the Board.

  8. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  9. Instrumentation and testing of a prestressed concrete containment vessel model

    International Nuclear Information System (INIS)

    Hessheimer, M.F.; Pace, D.W.; Klamerus, E.W.

    1997-01-01

    Static overpressurization tests of two scale models of nuclear containment structures - a steel containment vessel (SCV) representative of an improved, boiling water reactor (BWR) Mark II design and a prestressed concrete containment vessel (PCCV) for pressurized water reactors (PWR) - are being conducted by Sandia National Laboratories for the Nuclear Power Engineering Corporation of Japan and the U.S. Nuclear Regulatory Commission. This paper discusses plans for instrumentation and testing of the PCCV model. 6 refs., 2 figs., 2 tabs

  10. Health Security and Risk Aversion.

    Science.gov (United States)

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  11. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  12. Social security for seafarers globally

    DEFF Research Database (Denmark)

    Jensen, Olaf; Canals, Luisa; Haarløv, Erik

    2013-01-01

    Social security for seafarers globally Background: Social security protection is one of the essential elements of decent work. The issue is complex and no previous epidemiological studies of the coverage among seafarers have yet been performed. Objectives: The aim was to overcome the gap...... of knowledge to promote the discussion and planning of the implementation of social security for all seafarers. Methods: The seafarers completed a short questionnaire concerning their knowledge about their social security status. Results: Significant disparities of coverage of social security were pointed out...... comes from poorer countries without substantial social security systems. The solutions suggested are to implement the minimum requirements as recommended by the ILO 2006 Convention, to survey the implementation and in the long term to struggle for global social equality. Key words: Social security...

  13. Reactor vessel pressure transient protection for pressurized water reactors

    International Nuclear Information System (INIS)

    Zech, G.

    1978-09-01

    During the past few years the NRC has been studying the issue of protection of the reactor pressure vessels at Pressurized Water Reactors (PWRs) from transients when the vessels are at a relatively low temperature. This effort was prompted by concerns related to the safety margins available to vessel damage as a result of such events. Nuclear Reactor Regulation Category A Technical Activity No. A-26 was established to set forth the NRC plan for resolution of the generic aspects of this safety issue. The purpose of the report is to document the completion of this generic technical activity

  14. Cyber security in digitalized nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Sohn, Kwang Young; Yi, Woo June [KoRTS Co., Ltd., Daejeon (Korea, Republic of)

    2008-10-15

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully.

  15. Cyber security in digitalized nuclear power plants

    International Nuclear Information System (INIS)

    Sohn, Kwang Young; Yi, Woo June

    2008-01-01

    This paper analyzer the cyber security issues pertaining to networks and general systems, and provides cyber security activity model. For this, the importance of security, and the domestic and international trends of cyber security are surveyed in order to introduce the strategies and countermeasures of cyber security which should be interfaced with Quality Assurance (QA) plan Based on the result of cyber security model introduced in this paper, activities for cyber security, work load, necessary resources and process for activities, and duration could be estimated hopefully

  16. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  17. Spent nuclear fuel assembly storage vessel

    International Nuclear Information System (INIS)

    Yagishita, Takuya

    1998-01-01

    The vessel of the present invention promotes an effect of removing after heat of spent nuclear fuel assemblies so as not to give force to the storage vessel caused by expansion of heat removing partitioning plates. Namely, the vessel of the present invention comprises a cylinder body having closed upper and lower portions and a plurality of heat removing partitioning cylinders disposed each at a predetermined interval in the circumferential direction of the above-mentioned cylinder body. The heat removing partitioning cylinders comprises (1) first heat removing partitioning plates extended in the radial direction of the cylinder body and opposed at a predetermined gap in the circumferential direction of the cylinder body, and having the base ends on the side of the inner wall of the cylinder body being secured to the inner wall of the cylinder body and (2) a second heat removing plate for connecting the top ends of both opposed heat removing partitioning plates on the central side of the cylinder body with each other. Spent nuclear fuel assemblies are contained in a plurality of closed spaces surrounded by the first heat removing partitioning plates and the second heat removing partitioning plate. With such constitution, since after heat is partially transferred from the heat removing partitioning plates to the cylindrical body directly by heat conduction, the heat removing effect can be promoted compared with the prior art. (I.S.)

  18. Pressure vessel lid

    International Nuclear Information System (INIS)

    Schoening, J.; Elter, C.; Becker, G.; Pertiller, S.

    1986-01-01

    The invention concerns a lid for closing openings in reactor pressure vessels containing helium, which is made as a circular casting with hollow spaces and a flat floor and is set on the opening and kept down. It consists of helium-tight metal cast material with sufficient temperature resistance. There are at least two concentric heat resistant seals let into the bottom of the lid. The bottom is in immediate contact with the container atmosphere and has hollow spaces in its inside in the area opposite to the opening. (orig./HP) [de

  19. [Small vessel cerebrovascular disease].

    Science.gov (United States)

    Cardona Portela, P; Escrig Avellaneda, A

    2018-05-09

    Small vessel vascular disease is a spectrum of different conditions that includes lacunar infarction, alteration of deep white matter, or microbleeds. Hypertension is the main risk factor, although the atherothrombotic lesion may be present, particularly in large-sized lacunar infarctions along with other vascular risk factors. MRI findings are characteristic and the lesions authentic biomarkers that allow differentiating the value of risk factors and defining their prognostic value. Copyright © 2018 SEH-LELHA. Publicado por Elsevier España, S.L.U. All rights reserved.

  20. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  1. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  2. FY 2015 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2014-04-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  3. FY 2016 - Stockpile Stewardship and Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    None

    2015-03-01

    This Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) Fiscal Year Stockpile Stewardship and Management Plan (SSMP) is a key planning document for the nuclear security enterprise.

  4. TMI-2 reactor vessel head removal

    International Nuclear Information System (INIS)

    Bengel, P.R.; Smith, M.D.; Estabrook, G.A.

    1984-12-01

    This report describes the safe removal and storage of the Three Mile Island Unit 2 reactor vessel head. The head was removed in July 1984 to permit the removal of the plenum and the reactor core, which were damaged during the 1979 accident. From July 1982, plans and preparations were made using a standard head removal procedure modified by the necessary precautions and changes to account for conditions caused by the accident. After data acquisition, equipment and structure modifications, and training the head was safely removed and stored and the internals indexing fixture and a work platform were installed on top of the vessel. Dose rates during and after the operation were lower than expected; lessons were learned from the operation which will be applied to the continuing fuel removal operations activities

  5. Immersive volume rendering of blood vessels

    Science.gov (United States)

    Long, Gregory; Kim, Han Suk; Marsden, Alison; Bazilevs, Yuri; Schulze, Jürgen P.

    2012-03-01

    In this paper, we present a novel method of visualizing flow in blood vessels. Our approach reads unstructured tetrahedral data, resamples it, and uses slice based 3D texture volume rendering. Due to the sparse structure of blood vessels, we utilize an octree to efficiently store the resampled data by discarding empty regions of the volume. We use animation to convey time series data, wireframe surface to give structure, and utilize the StarCAVE, a 3D virtual reality environment, to add a fully immersive element to the visualization. Our tool has great value in interdisciplinary work, helping scientists collaborate with clinicians, by improving the understanding of blood flow simulations. Full immersion in the flow field allows for a more intuitive understanding of the flow phenomena, and can be a great help to medical experts for treatment planning.

  6. Results of steel containment vessel model test

    International Nuclear Information System (INIS)

    Luk, V.K.; Ludwigsen, J.S.; Hessheimer, M.F.; Komine, Kuniaki; Matsumoto, Tomoyuki; Costello, J.F.

    1998-05-01

    A series of static overpressurization tests of scale models of nuclear containment structures is being conducted by Sandia National Laboratories for the Nuclear Power Engineering Corporation of Japan and the US Nuclear Regulatory Commission. Two tests are being conducted: (1) a test of a model of a steel containment vessel (SCV) and (2) a test of a model of a prestressed concrete containment vessel (PCCV). This paper summarizes the conduct of the high pressure pneumatic test of the SCV model and the results of that test. Results of this test are summarized and are compared with pretest predictions performed by the sponsoring organizations and others who participated in a blind pretest prediction effort. Questions raised by this comparison are identified and plans for posttest analysis are discussed

  7. TMI-2 reactor vessel head removal

    International Nuclear Information System (INIS)

    Bengel, P.R.; Smith, M.D.; Estabrook, G.A.

    1985-09-01

    This report describes the safe removal and storage of the Three Mile Island Unit 2 (TMI-2) reactor vessel head. The head was removed in July 1984 to permit the removal of the plenum and the reactor core, which were damaged during the 1979 accident. From July 1982, plans and preparations were made using a standard head removal procedure modified by the necessary precautions and changes to account for conditions caused by the accident. After data acquisition, equipment and structure modifications, and training, the head was safely removed and stored; and the internals indexing fixture and a work platform were installed on top of the vessel. Dose rates during and after the operation were lower than expected; lessons were learned from the operation which will be applied to the continuing fuel removal operations activities

  8. An automated vessel segmentation of retinal images using multiscale vesselness

    International Nuclear Information System (INIS)

    Ben Abdallah, M.; Malek, J.; Tourki, R.; Krissian, K.

    2011-01-01

    The ocular fundus image can provide information on pathological changes caused by local ocular diseases and early signs of certain systemic diseases, such as diabetes and hypertension. Automated analysis and interpretation of fundus images has become a necessary and important diagnostic procedure in ophthalmology. The extraction of blood vessels from retinal images is an important and challenging task in medical analysis and diagnosis. In this paper, we introduce an implementation of the anisotropic diffusion which allows reducing the noise and better preserving small structures like vessels in 2D images. A vessel detection filter, based on a multi-scale vesselness function, is then applied to enhance vascular structures.

  9. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  10. The State-Society/Citizen Relationship in Security Analysis: Implications for Planning and Implementation of U.S. Intervention and Peace/State-Building Operations

    Science.gov (United States)

    2015-04-01

    of the state. Such threats may come into existence when 9 the organizing principles of two states contradict each other in a context where the...security is that the normal condition of actors in a market econ - omy is one of risk, competition, and uncertainty.12 In other words, the actors in the...liberal principles , federative states have no natural unifying principle and, consequently, are more vulnerable to dismemberment, separatism, and

  11. In vessel core melt progression phenomena

    International Nuclear Information System (INIS)

    Courtaud, M.

    1993-01-01

    For all light water reactor (LWR) accidents, including the so called severe accidents where core melt down can occur, it is necessary to determine the amount and characteristics of fission products released to the environment. For existing reactors this knowledge is used to evaluate the consequences and eventual emergency plans. But for future reactors safety authorities demand decrease risks and reactors designed in such a way that fission products are retained inside the containment, the last protective barrier. This requires improved understanding and knowledge of all accident sequences. In particular it is necessary to be able to describe the very complex phenomena occurring during in vessel core melt progression because they will determine the thermal and mechanical loads on the primary circuit and the timing of its rupture as well as the fission product source term. On the other hand, in case of vessel failure, knowledge of the physical and chemical state of the core melt will provide the initial conditions for analysis of ex-vessel core melt progression and phenomena threatening the containment. Finally a good understanding of in vessel phenomena will help to improve accident management procedures like Emergency Core Cooling System water injection, blowdown and flooding of the vessel well, with their possible adverse effects. Research and Development work on this subject was initiated a long time ago and is still in progress but now it must be intensified in order to meet the safety requirements of the next generation of reactors. Experiments, limited in scale, analysis of the TMI 2 accident which is a unique source of global information and engineering judgment are used to establish and assess physical models that can be implemented in computer codes for reactor accident analysis

  12. 49 CFR 1542.301 - Contingency plan.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Contingency plan. 1542.301 Section 1542.301..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Contingency Measures § 1542.301 Contingency plan. (a) Each airport operator required to have a security program under § 1542.103(a) and (b...

  13. Renovation of the sealing planes of WWER-400 reactors pressure vessel

    International Nuclear Information System (INIS)

    Jablonicky, P.; Pilat, P.

    2007-01-01

    An article describes technical solution for renovation of the sealing planes of WWER-440 reactor's pressure vessel. Four nickel sealing rings placed in four concentric grooves are providing hermetic sealing between the vessel and the lid of this type of the reactor. Impeccable seal of the reactor's pressure vessel, where the fission reaction takes place, represents a basic security factor for safe electric energy production. Principle of renovation of the reactor's pressure vessel and lid sealing planes is based on mechanical enlargement of defective grooves and following cladding of the new material by TIG welding. Final step for renovation includes machining of new grooves according to geometrical and surface quality requirements (Authors)

  14. 49 CFR 193.2715 - Training: security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  15. 7 CFR 331.11 - Security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 5 2010-01-01 2010-01-01 false Security. 331.11 Section 331.11 Agriculture..., DEPARTMENT OF AGRICULTURE POSSESSION, USE, AND TRANSFER OF SELECT AGENTS AND TOXINS § 331.11 Security. (a) An individual or entity required to register under this part must develop and implement a written security plan...

  16. 78 FR 5116 - NASA Information Security Protection

    Science.gov (United States)

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration..., projects, plans, or protection services relating to the national security; or (h) The development... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and...

  17. Efficient Vessel Tracking  with Accuracy Guarantees

    DEFF Research Database (Denmark)

    Redoutey, Martin; Scotti, Eric; Jensen, Christian Søndergaard

    2008-01-01

    Safety and security are top concerns in maritime navigation, particularly as maritime traffic continues to grow and as crew sizes are reduced. The Automatic Identification System (AIS) plays a key role in regard to these concerns. This system, whose objective is in part to identify and locate ves...... accuracies at lower communication costs. The techniques employ movement predictions that are shared between vessels and the VTS. Empirical studies with a prototype implementation and real vessel data demonstrate that the techniques are capable of significantly improving the AIS....

  18. 46 CFR 35.25-5 - Repairs of boilers and unfired pressure vessels and reports of repairs or accidents by chief...

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Repairs of boilers and unfired pressure vessels and..., DEPARTMENT OF HOMELAND SECURITY TANK VESSELS OPERATIONS Engine Department § 35.25-5 Repairs of boilers and... any repairs to boilers or unfired pressure vessels, the chief engineer shall submit a report covering...

  19. 46 CFR 32.50-25 - Cargo pumps and piping on tank vessels constructed prior to November 10, 1936-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Cargo pumps and piping on tank vessels constructed prior... SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Pumps, Piping, and Hose for Cargo Handling § 32.50-25 Cargo pumps and piping on tank vessels constructed prior to November 10, 1936—TB/ALL...

  20. Targeting Therapy Resistant Tumor Vessels

    Science.gov (United States)

    2008-08-01

    Morris LS. Hysterectomy vs. resectoscopic endometrial ablation for the control of abnormal uterine bleeding . A cost-comparative study. J Reprod Med 1994;39...after the antibody treatment contain a pericyte coat, vessel architecture is normal, the diameter of the vessels is smaller (dilated, abnormal vessels...involvement of proteases from inflammatory mast cells and functionally abnormal (Carmeliet and Jain, 2000; Pasqualini (Coussens et al., 1999) and other bone

  1. The vessel fluence; Fluence cuve

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This book presents the proceedings of the technical meeting on the reactors vessels fluence. They are grouped in eight sessions: the industrial context and the stakes of the vessels control; the organization and the methodology for the fluence computation; the concerned physical properties; the reference computation methods; the fluence monitoring in an industrial context; vessels monitoring under irradiation; others methods in the world; the research and development programs. (A.L.B.)

  2. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  3. Americium behaviour in plastic vessels

    International Nuclear Information System (INIS)

    Legarda, F.; Herranz, M.; Idoeta, R.; Abelairas, A.

    2010-01-01

    The adsorption of 241 Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of 241 Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of 241 Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification.

  4. Americium behaviour in plastic vessels

    Energy Technology Data Exchange (ETDEWEB)

    Legarda, F.; Herranz, M. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Idoeta, R., E-mail: raquel.idoeta@ehu.e [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain); Abelairas, A. [Departamento de Ingenieria Nuclear y Mecanica de Fluidos, Escuela Tecnica Superior de Ingenieria de Bilbao, Universidad del Pais Vasco (UPV/EHU), Alameda de Urquijo s/n, 48013 Bilbao (Spain)

    2010-07-15

    The adsorption of {sup 241}Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of {sup 241}Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of {sup 241}Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification.

  5. Americium behaviour in plastic vessels.

    Science.gov (United States)

    Legarda, F; Herranz, M; Idoeta, R; Abelairas, A

    2010-01-01

    The adsorption of (241)Am dissolved in water in different plastic storage vessels was determined. Three different plastics were investigated with natural and distilled waters and the retention of (241)Am by these plastics was studied. The same was done by varying vessel agitation time, vessel agitation speed, surface/volume ratio of water in the vessels and water pH. Adsorptions were measured to be between 0% and 70%. The adsorption of (241)Am is minimized with no water agitation, with PET or PVC plastics, and by water acidification. Copyright 2009 Elsevier Ltd. All rights reserved.

  6. Transportation planning for planned special events

    Science.gov (United States)

    2011-05-01

    Unique among planned special event activities are those events that carry the National Special Security Event (NSSE) designation. NSSEs occur with some frequency, with 35 of these events held between September 1998 and February 2010. These events inc...

  7. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  8. [Large vessel vasculitides].

    Science.gov (United States)

    Morović-Vergles, Jadranka; Puksić, Silva; Gracanin, Ana Gudelj

    2013-01-01

    Large vessel vasculitis includes Giant cell arteritis and Takayasu arteritis. Giant cell arteritis is the most common form of vasculitis affect patients aged 50 years or over. The diagnosis should be considered in older patients who present with new onset of headache, visual disturbance, polymyalgia rheumatica and/or fever unknown cause. Glucocorticoides remain the cornerstone of therapy. Takayasu arteritis is a chronic panarteritis of the aorta ant its major branches presenting commonly in young ages. Although all large arteries can be affected, the aorta, subclavian and carotid arteries are most commonly involved. The most common symptoms included upper extremity claudication, hypertension, pain over the carotid arteries (carotidynia), dizziness and visual disturbances. Early diagnosis and treatment has improved the outcome in patients with TA.

  9. Reactor pressure vessel embrittlement

    International Nuclear Information System (INIS)

    1992-07-01

    Within the framework of the IAEA extrabudgetary programme on the Safety of WWER-440/230 NPPs, a list of safety issues requiring broad studies of generic interest have been agreed upon by an Advisory Group who met in Vienna in September 1990. The list was later revised in the light of the programme findings. The information on the status of the issues, and on the amount of work already completed and under way in the various countries, needs to be compiled. Moreover, an evaluation of what further work is required to resolve each one of the issues is also necessary. In view of this, the IAEA has started the preparation of a series of status reports on the various issues. This report on the generic safety issue ''Reactor Pressure Vessel Embrittlement'' presents a comprehensive survey of technical information available in the field and identifies those aspects which require further investigation. 39 refs, 21 figs, 4 tabs

  10. Reactor containment vessel

    International Nuclear Information System (INIS)

    Ochiai, Kanehiro; Hayagumo, Sunao; Morikawa, Matsuo.

    1981-01-01

    Purpose: To safety and simplify the structure in a reactor containment vessel. Constitution: Steam flow channels with steam jetting ports communicating to coolants are provided between a communication channel and coolants in a pressure suppression chamber. Upon loss of coolant accidents, pressure in a dry well will increase, then force downwards water in an annulus portion and further flow out the water through steam jetting ports into a suppression pool. Thus, the steam flow channel is filled with steams or airs present in the dry well, which are released through the steam jetting ports into the pressure suppression chamber. Even though water is violently vibrated owing to the upward movement of air bubbles and condensation of steam bubbles, the annular portion and the steam jetting ports are filled with steams or the like, direct dynamic loads onto the structures such as communication channels can be avoided. (J.P.N.)

  11. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  12. The Land Component Role in Maritime Security

    Science.gov (United States)

    2016-12-31

    nations for resources. They must also confront maritime threats, which include piracy , armed robbery, damage to the marine environment (i.e. pollution...such as an armed attack from a military vessel. Most definitions also usually include security from crimes at sea, such as piracy , armed robbery...security through stability operations, one must accept that any effective government must focus on basic governmental functions – providing for the

  13. In-vessel core debris retention experiments. Final report

    International Nuclear Information System (INIS)

    1998-10-01

    The in-vessel cooling experimental program (Phase 1 and 2) was motivated by the survivability of the TMI lower vessel head during the TMI-2 accident. During that accident, molten debris relocation into the water filled lower head resulted in a localized hot spot in the lower head, but no lower head failure occurred. A postulated set of mechanisms which could be involved in and responsible for the survivability of the TMI lower head were identified and experimentally investigated as part of this program. These mechanisms included: the formation of a gap (contact resistance) between the relocated and frozen debris and the vessel wall was a key aspect of the in-vessel cooling mechanism; wall heatup due to the relocated debris in the presence of wall stress due to a pressure gradient across the vessel wall; gap growth due to a lack of debris adherence to the vessel wall and material creep of the heated vessel wall; and the potential for enhanced wall cooling due to gap growth. Each of these postulated mechanisms was investigated in this experimental program. This report summarizes the several insights and conclusions that were obtained from this experimental program. This report documents the entire set of five experiments completed in Phase 2 of this experimental program. Results from the Phase 1 effort were used to plan and select the Phase 2 test matrix. Conclusions from the Phase 1 and 2 experiments are identified and recommendations for future work are provided

  14. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  15. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  16. Heavy Section Steel Technology Program. Part II. Intermediate vessel testing

    International Nuclear Information System (INIS)

    Whitman, G.D.

    1975-01-01

    The testing of the intermediate pressure vessels is a major activity under the Heavy Section Steel Technology Program. A primary objective of these tests is to develop or verify methods of fracture prediction, through the testing of selected structures and materials, in order that a valid basis can be established for evaluating the serviceability and safety of light-water reactor pressure vessels. These vessel tests were planned with sufficiently specific objectives that substantial quantitative weight could be given to the results. Each set of testing conditions was chosen so as to provide specific data by which analytical methods of predicting flaw growth, and in some cases crack arrest, could be evaluated. Every practical effort was made to assure that results would be relevant to some aspect of real reactor pressure vessel performance through careful control of material properties, selection of test temperatures, and design of prepared flaws. 5 references

  17. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  18. Xingu Project - Integrating Land Use Planning and Water Governance in Amazonia: Towards Improved Freshwater Security in the Agricultural Frontier of Mato Grosso.

    Science.gov (United States)

    Krusche, A. V.; Ballester, M. V.; Neill, C.; Elsenbeer, H.; Johnson, M. S.; Coe, M. T.; Garavello, M.; Molina, S. G.; Empinotti, V.; Reichardt, F.; Deegan, L.; Harris, L.

    2014-12-01

    The main goal of this project is to identify how impacts from land conversion, cropland expansion and intensification of both crop and animal production interact to affect regional evapotranspiration, rainfall generation, river flooding, and water quality and stream habitats, allowing us to identify thresholds of change that will endanger agricultural production, livelihoods of non-agricultural settlers and the region's new urban population and infrastructure. We will survey the effects of this on (1) soybean farmers, (2) cattle ranchers, (3) small-scale farm families, (4) rural non-agriculturists, including fishers, and (5) urban residents and map their roles as stakeholders. We will also conduct current water use surveys among the different stakeholder groups, accompanied by questions on desired aspects for future freshwater security to identify targets for desirable outcomes of water governance strategies. These targets, together with the information on land use drivers, water quantity and quality and predicted scenarios for global changes will be incorporated into a fully integrated and interactive geospatially oriented socio-ecological model that can serve as framework for future water governance that enhances Freshwater Security in such systems. This is an international cooperation initiative lead by Brazil and with the participation of Canada, Germany and United States of America.

  19. Colombia to Nigeria: Exploring the Possibilities of a Security Cooperation Strategy for Nigeria Based on the Successes Realized Through Plan Colombia

    Science.gov (United States)

    2016-06-10

    achieving its objective. Using that same operational approach design and enviromental framework, but simply replacing key words with Nigeria, Boko Haram...and smuggling we get the following operational approch and current/desired enstate enviromental framework for Nigeria. 96 Figure 30...overall military enviromental similarity received a score of 3. This places the risk of applying elements of Plan Colombia to current state

  20. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  1. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  2. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  3. Improving the physical health of people with severe mental illness in a low secure forensic unit: An uncontrolled evaluation study of staff training and physical health care plans.

    Science.gov (United States)

    Haddad, Mark; Llewellyn-Jones, Sian; Yarnold, Steve; Simpson, Alan

    2016-12-01

    The life expectancy of people with severe mental illnesses is substantially reduced, and monitoring and screening for physical health problems is a key part of addressing this health inequality. Inpatient admission presents a window of opportunity for this health-care activity. The present study was conducted in a forensic mental health unit in England. A personal physical health plan incorporating clearly-presented and easily-understood values and targets for health status in different domains was developed. Alongside this, a brief physical education session was delivered to health-care staff (n = 63). Printed learning materials and pedometers and paper tape measures were also provided. The impact was evaluated by a single-group pretest post-test design; follow-up measures were 4 months' post-intervention. The feasibility and acceptability of personal health plans and associated resources were examined by free-text questionnaire responses. Fifty-seven staff provided measures of attitudes and knowledge before training and implementation of the physical health plans. Matched-pairs analysis indicated a modest but statistically-significant improvement in staff knowledge scores and attitudes to involvement in physical health care. Qualitative feedback indicated limited uptake of the care plans and perceived need for additional support for better adoption of this initiative. Inpatient admission is a key setting for assessing physical health and promoting improved management of health problems. Staff training and purpose-designed personalized care plans hold potential to improve practice and outcomes in this area, but further support for such innovations appears necessary for their uptake in inpatient mental health settings. © 2016 Australian College of Mental Health Nurses Inc.

  4. Pressure vessel for nuclear reactors

    International Nuclear Information System (INIS)

    1975-01-01

    The invention applies to a pressure vessel for nuclear reactors whose shell, made of cast metal segments, has a steel liner. This liner must be constructed to withstand all operational stresses and to be easily repairable. The invention solves this problem by installing the liner at a certain distance from the inner wall of the pressure vessel shell and by filling this clearance with supporting concrete. Both the concrete and the steel liner must have a lower prestress than the pressure vessel shell. In order to avoid damage to the liner when prestressing the pressure vessel shell, special connecting elements are provided which consist of welded-on fastening elements projecting into recesses in the cast metal segments of the pressure vessel. Their design is described in detail. (TK) [de

  5. Repairing method for shroud in reactor pressure vessel

    International Nuclear Information System (INIS)

    Watanabe, Yusuke.

    1996-01-01

    The present invention provides a method of repairing a shroud disposed in a pressure vessel of a BWR type reactor. Namely, a baffle plate is disposed on the outer surface of the lower portion of the shroud supported by a shroud support of the pressure vessel. The baffle plate is connected with a lug for securing a shroud head bolt disposed on the outer surface of an upper portion of the shroud by reinforcing members. With such a constitution, when crackings are caused in the shroud, the development of the crackings can be prevented without losing the function of securing the shroud head bolt. Further, if a material having thermal expansion coefficient lower than that of austenite stainless steel is used for the material of the reinforcing member, clamping load to be applied upon attaching the auxiliary member can be reduced. As a result, operation for the attachment is facilitated. (I.S.)

  6. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  7. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  8. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  9. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  10. Containment vessel stability analysis

    International Nuclear Information System (INIS)

    Harstead, G.A.; Morris, N.F.; Unsal, A.I.

    1983-01-01

    The stability analysis for a steel containment shell is presented herein. The containment is a freestanding shell consisting of a vertical cylinder with a hemispherical dome. It is stiffened by large ring stiffeners and relatively small longitudinal stiffeners. The containment vessel is subjected to both static and dynamic loads which can cause buckling. These loads must be combined prior to their use in a stability analysis. The buckling loads were computed with the aid of the ASME Code case N-284 used in conjunction with general purpose computer codes and in-house programs. The equations contained in the Code case were used to compute the knockdown factors due to shell imperfections. After these knockdown factors were applied to the critical stress states determined by freezing the maximum dynamic stresses and combining them with other static stresses, a linear bifurcation analysis was carried out with the aid of the BOSOR4 program. Since the containment shell contained large penetrations, the Code case had to be supplemented by a local buckling analysis of the shell area surrounding the largest penetration. This analysis was carried out with the aid of the NASTRAN program. Although the factor of safety against buckling obtained in this analysis was satisfactory, it is claimed that the use of the Code case knockdown factors are unduly conservative when applied to the analysis of buckling around penetrations. (orig.)

  11. Pressure vessel design

    International Nuclear Information System (INIS)

    Annaratone, D.

    2007-01-01

    This book guides through general and fundamental problems of pressure vessel design. It moreover considers problems which seem to be of lower importance but which turn out to be crucial in the design phase. The basic approach is rigorously scientific with a complete theoretical development of the topics treated, but the analysis is always pushed so far as to offer concrete and precise calculation criteria that can be immediately applied to actual designs. This is accomplished through appropriate algorithms that lead to final equations or to characteristic parameters defined through mathematical equations. The first chapter describes how to achieve verification criteria, the second analyzes a few general problems, such as stresses of the membrane in revolution solids and edge effects. The third chapter deals with cylinders under pressure from the inside, while the fourth focuses on cylinders under pressure from the outside. The fifth chapter covers spheres, and the sixth is about all types of heads. Chapter seven discusses different components of particular shape as well as pipes, with special attention to flanges. The eighth chapter discusses the influence of holes, while the ninth is devoted to the influence of supports. Finally, chapter ten illustrates the fundamental criteria regarding fatigue analysis. Besides the unique approach to the entire work, original contributions can be found in most chapters, thanks to the author's numerous publications on the topic and to studies performed ad hoc for this book. (orig.)

  12. Lessons drawn in matters of preparation, conduct and planning of ''off-site'' nuclear security exercises on basis of three drills recently performed in France

    International Nuclear Information System (INIS)

    Ginot, P.

    1993-01-01

    Most exercises on nuclear security have, up to now, be devoted to the accident phase of the installation and the reflex protection measures during the first hours. The post accidental phase, which deals with the characterization of the contaminated zones and the management of the economic and social life, has been much less tested in exercises. Three recent exercises performed in France bring the following propositions to work out an off site exercise policy: - to benefit from the analysis of the non nuclear accidents - to select the technical and professional aspects of the off site management and to give them priority in the orientation of the exercises or the manoeuvres - to involve representatives of local population - to let the initiative to local Prefect, to enhance the value of the local exercises by specialized services, to accumulate these experiences at a national level

  13. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  14. Laparoscopic prototype for optical sealing of renal blood vessels

    Science.gov (United States)

    Hardy, Luke A.; Hutchens, Thomas C.; Larson, Eric R.; Gonzalez, David A.; Chang, Chun-Hung; Nau, William H.; Fried, Nathaniel M.

    2017-02-01

    Energy-based, radiofrequency and ultrasonic devices provide rapid sealing of blood vessels during laparoscopic procedures. We are exploring infrared lasers as an alternative for vessel sealing with less collateral thermal damage. Previous studies demonstrated vessel sealing in an in vivo porcine model using a 1470-nm laser. However, the initial prototype was designed for open surgery and featured tissue clasping and light delivery mechanisms incompatible with laparoscopic surgery. In this study, a laparoscopic prototype similar to devices in surgical use was developed, and tests were conducted on porcine renal blood vessels. The 5-mm-OD prototype featured a traditional Maryland jaw configuration. Laser energy was delivered through a 550-μm-core fiber and side-delivery from the lower jaw, with beam dimensions of 18-mm-length x 1.2-mm-width. The 1470-nm diode laser delivered 68 W with 3 s activation time. A total of 69 porcine renal vessels with mean diameter of 3.3 +/- 1.7 mm were tested, ex vivo. Vessels smaller than 5 mm were consistently sealed (48/51) with burst pressures greater than malignant hypertension blood pressure (180 mmHg), averaging 1038 +/- 474 mmHg. Vessels larger than 5 mm were not consistently sealed (6/18), yielding burst pressures of only 174 +/- 221 mmHg. Seal width, thermal damage zone, and thermal spread averaged 1.7 +/- 0.8, 3.4 +/- 0.7, and 1.0 +/- 0.4 mm. A novel optical laparoscopic prototype with 5-mm- OD shaft integrated within a standard Maryland jaw design consistently sealed vessels less than 5 mm with minimal thermal spread. Further in vivo studies are planned to test performance across a variety of vessels and tissues.

  15. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  16. 33 CFR 165.1409 - Security Zones; Hawaii, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Hawaii, HI. 165... Navigation Areas and Limited Access Areas Fourteenth Coast Guard District § 165.1409 Security Zones; Hawaii..., Hawaii. All waters extending 100 yards in all directions from each large passenger vessel in Hilo Harbor...

  17. 49 CFR 176.4 - Port security and safety regulations.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Port security and safety regulations. 176.4... SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS REGULATIONS CARRIAGE BY VESSEL General § 176.4 Port security and safety regulations. (a) Each carrier, master, agent, and charterer of a...

  18. Storage vessel for containing radiation contaminated material

    International Nuclear Information System (INIS)

    Ogawa, Kazuya.

    1995-01-01

    A container pipe and an outer pipe are coaxially assembled integrally in a state where securing spacers are disposed between the container pipe and the outer pipe, and an annular flow channel is formed around the container pipe. Radiation contaminated material-containing body (glass solidified package) is contained in the container pipe. The container pipe and the outer pipe in an integrated state are suspended from a ceiling plug of a cell chamber of a storage vessel, and supporting devices are assembled between the pipes and a support structure. A shear/lug mechanism is used for the supporting devices. The combination of the shear/lug allows radial and vertical movement but restrict horizontal movement of the outer tube. The supporting devices are assembled while visually recognizing the state of the shear/lug mechanism between the outer pipe and the support mechanism. Accordingly, operationability upon assembling the container pipe and the outer pipe is improved. (I.N.)

  19. 46 CFR 32.20-1 - Equipment installations on vessels during World War II-TB/ALL.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Equipment installations on vessels during World War II-TB/ALL. 32.20-1 Section 32.20-1 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY TANK VESSELS SPECIAL EQUIPMENT, MACHINERY, AND HULL REQUIREMENTS Equipment Installations § 32.20-1 Equipment installations on vessels during World War II—TB/ALL....

  20. PWR vessel flaw distribution development

    International Nuclear Information System (INIS)

    Rosinski, S.T.; Kennedy, E.L.; Foulds, J.R.; Kinsman, K.M.

    1990-01-01

    This paper reports on PWR pressure vessels which operate under NRC rules and regulatory guides intended to prevent failure of the vessels. Plants failing to meet the operating criteria specified under these rules and regulations are required to analytically demonstrate fitness for service in order to continue operation. The initial flaw size or distribution of initial vessel flaws is a key input to the required vessel integrity analyses. However, the flaw distribution assumed in the development of the NRC Regulations and recommended for the plant specific analyses is potentially over-conservative. This is because the distribution is based on the limited amount of vessel inspection data available at the time the criteria were being developed and does not take full advantage of the more recent and reliable domestic vessel inspection results. The U.S. Department of Energy is funding an effort through Sandia National Laboratories to investigate the possibility of developing a new flaw distribution based on the increased amount and improved reliability of domestic vessel inspection data. Results of Phase I of the program indicate that state-of-the-art NDE systems' capabilities are sufficient for development of a new flaw distribution that could ultimately provide life extension benefits over the presently required operating practice

  1. Nuclear reactor vessel decontamination systems

    International Nuclear Information System (INIS)

    McGuire, P. J.

    1985-01-01

    There is disclosed in the present application, a decontamination system for reactor vessels. The system is operatable without entry by personnel into the contaminated vessel before the decontamination operation is carried out and comprises an assembly which is introduced into the vertical cylindrical vessel of the typical boiling water reactor through the open top. The assembly includes a circular track which is centered by guideways permanently installed in the reactor vessel and the track guides opposed pairs of nozzles through which water under very high pressure is directed at the wall for progressively cutting and sweeping a tenacious radioactive coating as the nozzles are driven around the track in close proximity to the vessel wall. The whole assembly is hoisted to a level above the top of the vessel by a crane, outboard slides on the assembly brought into engagement with the permanent guideways and the assembly progressively lowered in the vessel as the decontamination operation progresses. The assembly also includes a low pressure nozzle which forms a spray umbrella above the high pressure nozzles to contain radioactive particles dislodged during the decontamination

  2. 15 CFR 744.7 - Restrictions on certain exports to and for the use of certain foreign vessels or aircraft.

    Science.gov (United States)

    2010-01-01

    ... be registered in the case of a vessel or aircraft under construction, and (3) To the country... Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF... operating vessel or aircraft or one under construction, located in any port including a Canadian port...

  3. Gammatography of thick lead vessels

    International Nuclear Information System (INIS)

    Raghunath, V.M.; Bhatnagar, P.K.; Sundaram, V.M.

    1979-01-01

    Radiography, scintillation and GM counting and dose measurements using ionisation chamber equipment are commonly used for detecting flaws/voids in materials. The first method is mostly used for steel vessels and to a lesser extent thin lead vessels also and is essentially qualitative. Dose measuring techniques are used for very thick and large lead vessels for which high strength radioactive sources are required, with its inherent handling problems. For vessels of intermediate thicknesses, it is ideal to use a small strength source and a GM or scintillation counter assembly. At the Reactor Research Centre, Kalpakkam, such a system was used for checking three lead vessels of thicknesses varying from 38mm to 65mm. The tolerances specified were +- 4% variation in lead thickness. The measurements also revealed the non concentricity of one vessel which had a thickness varying from 38mm to 44mm. The second vessel was patently non-concentric and the dimensional variation was truly reproduced in the measurements. A third vessel was fabricated with careful control of dimensions and the measurements exhibited good concentricity. Small deviations were observed, attributable to imperfect bondings between steel and lead. This technique has the following advantages: (a) weaker sources used result in less handling problems reducing the personnel exposures considerably; (b) the sensitivity of the instrument is quite good because of better statistics; (c) the time required for scanning a small vessel is more, but a judicious use of a scintillometer for initial fast scan will help in reducing the total scanning time; (d) this method can take advantage of the dimensional variations themselves to get the calibration and to estimate the deviations from specified tolerances. (auth.)

  4. BY FRUSTUM CONFINING VESSEL

    Directory of Open Access Journals (Sweden)

    Javad Khazaei

    2016-09-01

    Full Text Available Helical piles are environmentally friendly and economical deep foundations that, due to environmental considerations, are excellent additions to a variety of deep foundation alternatives available to the practitioner. Helical piles performance depends on soil properties, the pile geometry and soil-pile interaction. Helical piles can be a proper alternative in sensitive environmental sites if their bearing capacity is sufficient to support applied loads. The failure capacity of helical piles in this study was measured via an experimental research program that was carried out by Frustum Confining Vessel (FCV. FCV is a frustum chamber by approximately linear increase in vertical and lateral stresses along depth from top to bottom. Due to special geometry and applied bottom pressure, this apparatus is a proper choice to test small model piles which can simulate field stress conditions. Small scale helical piles are made with either single helix or more helixes and installed in fine grained sand with three various densities. Axial loading tests including compression and tension tests were performed to achieve pile ultimate capacity. The results indicate the helical piles behavior depends essentially on pile geometric characteristics, i.e. helix configuration and soil properties. According to the achievements, axial uplift capacity of helical model piles is about equal to usual steel model piles that have the helixes diameter. Helical pile compression bearing capacity is too sufficient to act as a medium pile, thus it can be substituted other piles in special geoenvironmental conditions. The bearing capacity also depends on spacing ratio, S/D, and helixes diameter.

  5. Vacuum vessel for thermonuclear device

    International Nuclear Information System (INIS)

    Hagiwara, Koji; Imura, Yasuya.

    1979-01-01

    Purpose: To provide constituted method for easily performing baking of vacuum vessel, using short-circuiting segments. Constitution: At the time of baking, one turn circuit is formed by the vacuum vessel and short-circuiting segments, and current transformer converting the one turn circuit into a secondary circuit by the primary coil and iron core is formed, and the vacuum vessel is Joule heated by an induction current from the primary coil. After completion of baking, the short-circuiting segments are removed. (Kamimura, M.)

  6. PWR vessel inspection performance improvements

    International Nuclear Information System (INIS)

    Blair Fairbrother, D.; Bodson, Francis

    1998-01-01

    A compact robot for ultrasonic inspection of reactor vessels has been developed that reduces setup logistics and schedule time for mandatory code inspections. Rather than installing a large structure to access the entire weld inspection area from its flange attachment, the compact robot examines welds in overlapping patches from a suction cup anchor to the shell wall. The compact robot size allows two robots to be operated in the vessel simultaneously. This significantly reduces the time required to complete the inspection. Experience to date indicates that time for vessel examinations can be reduced to fewer than four days. (author)

  7. 17 CFR 250.44 - Sales of securities and assets.

    Science.gov (United States)

    2010-04-01

    ... not require prior Commission approval. (c) Sales pursuant to order or plan under section 11. No... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Sales of securities and assets... Various Financial Transactions 2 § 250.44 Sales of securities and assets. (a) Sales of utility securities...

  8. 49 CFR 659.27 - Internal safety and security reviews.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Internal safety and security reviews. 659.27... State Oversight Agency § 659.27 Internal safety and security reviews. (a) The oversight agency shall... safety and security reviews in its system safety program plan. (b) The internal safety and security...

  9. 77 FR 36998 - Proposed Information Collection; Comment Request; Mandatory Shrimp Vessel and Gear...

    Science.gov (United States)

    2012-06-20

    ... Collection; Comment Request; Mandatory Shrimp Vessel and Gear Characterization Survey AGENCY: National... under the Shrimp Fishery Management Plan (FMP). The regulations for the Gulf Shrimp Vessel and Gear... and Gear Characterization Form. The form will be provided by NMFS at the time of permit application...

  10. 78 FR 40436 - Proposed Information Collection; Comment Request; Mandatory Shrimp Vessel and Gear...

    Science.gov (United States)

    2013-07-05

    ... Collection; Comment Request; Mandatory Shrimp Vessel and Gear Characterization Survey AGENCY: National... under the Shrimp Fishery Management Plan (FMP). The regulations for the Gulf Shrimp Vessel and Gear... Gear Characterization Form. The form will be provided by NMFS at the time of permit application and...

  11. Effect of Loading Dose of Atorvastatin Prior to Planned Percutaneous Coronary Intervention on Major Adverse Cardiovascular Events in Acute Coronary Syndrome: The SECURE-PCI Randomized Clinical Trial.

    Science.gov (United States)

    Berwanger, Otavio; Santucci, Eliana Vieira; de Barros E Silva, Pedro Gabriel Melo; Jesuíno, Isabella de Andrade; Damiani, Lucas Petri; Barbosa, Lilian Mazza; Santos, Renato Hideo Nakagawa; Laranjeira, Ligia Nasi; Egydio, Flávia de Mattos; Borges de Oliveira, Juliana Aparecida; Dall Orto, Frederico Toledo Campo; Beraldo de Andrade, Pedro; Bienert, Igor Ribeiro de Castro; Bosso, Carlos Eduardo; Mangione, José Armando; Polanczyk, Carisi Anne; Sousa, Amanda Guerra de Moraes Rego; Kalil, Renato Abdala Karam; Santos, Luciano de Moura; Sposito, Andrei Carvalho; Rech, Rafael Luiz; Sousa, Antônio Carlos Sobral; Baldissera, Felipe; Nascimento, Bruno Ramos; Giraldez, Roberto Rocha Corrêa Veiga; Cavalcanti, Alexandre Biasi; Pereira, Sabrina Bernardez; Mattos, Luiz Alberto; Armaganijan, Luciana Vidal; Guimarães, Hélio Penna; Sousa, José Eduardo Moraes Rego; Alexander, John Hunter; Granger, Christopher Bull; Lopes, Renato Delascio

    2018-04-03

    The effects of loading doses of statins on clinical outcomes in patients with acute coronary syndrome (ACS) and planned invasive management remain uncertain. To determine if periprocedural loading doses of atorvastatin decrease 30-day major adverse cardiovascular events (MACE) in patients with ACS and planned invasive management. Multicenter, double-blind, placebo-controlled, randomized clinical trial conducted at 53 sites in Brazil among 4191 patients with ACS evaluated with coronary angiography to proceed with a percutaneous coronary intervention (PCI) if anatomically feasible. Enrollment occurred between April 18, 2012, and October 6, 2017. Final follow-up for 30-day outcomes was on November 6, 2017. Patients were randomized to receive 2 loading doses of 80 mg of atorvastatin (n = 2087) or matching placebo (n = 2104) before and 24 hours after a planned PCI. All patients received 40 mg of atorvastatin for 30 days starting 24 hours after the second dose of study medication. The primary outcome was MACE, defined as a composite of all-cause mortality, myocardial infarction, stroke, and unplanned coronary revascularization through 30 days. Among the 4191 patients (mean age, 61.8 [SD, 11.5] years; 1085 women [25.9%]) enrolled, 4163 (99.3%) completed 30-day follow-up. A total of 2710 (64.7%) underwent PCI, 333 (8%) underwent coronary artery bypass graft surgery, and 1144 (27.3%) had exclusively medical management. At 30 days, 130 patients in the atorvastatin group (6.2%) and 149 in the placebo group (7.1%) had a MACE (absolute difference, 0.85% [95% CI, -0.70% to 2.41%]; hazard ratio, 0.88; 95% CI, 0.69-1.11; P = .27). No cases of hepatic failure were reported; 3 cases of rhabdomyolysis were reported in the placebo group (0.1%) and 0 in the atorvastatin group. Among patients with ACS and planned invasive management with PCI, periprocedural loading doses of atorvastatin did not reduce the rate of MACE at 30 days. These findings do not support the routine use

  12. Private Security Companies (PSCs) as a Piracy Countermeasure

    DEFF Research Database (Denmark)

    Struwe, Lars Bangert

    2012-01-01

    Private Security Companies (PSC) are a part of the Best Management Practice in the shipping industry. The ship owners are using PSCs to protect their vessels against pirates, but protection of the vessels is just a part of the services that PSCs can provide. The services can be divided in four main...... groups: (1) security intelligence, risk assessment and consulting; (2) security services; (3) crisis response; and (4) intervention. While the use of PSCs may offer some deterrent value, the potential costs of hiring these firms would appear to outweigh the benefits. The argument in this article...

  13. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  14. Corrective Action Decision Document/Corrective Action Plan for the 92-Acre Area and Corrective Action Unit 111: Area 5 WMD Retired Mixed Waste Pits, Nevada National Security Site, Nevada

    International Nuclear Information System (INIS)

    2010-01-01

    This Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) has been prepared for the 92-Acre Area, the southeast quadrant of the Radioactive Waste Management Site, located in Area 5 of the Nevada National Security Site (NNSS). The 92-Acre Area includes Corrective Action Unit (CAU) 111, 'Area 5 WMD Retired Mixed Waste Pits.' Data Quality Objectives (DQOs) were developed for the 92-Acre Area, which includes CAU 111. The result of the DQO process was that the 92-Acre Area is sufficiently characterized to provide the input data necessary to evaluate corrective action alternatives (CAAs) without the collection of additional data. The DQOs are included as Appendix A of this document. This CADD/CAP identifies and provides the rationale for the recommended CAA for the 92-Acre Area, provides the plan for implementing the CAA, and details the post-closure plan. When approved, this CADD/CAP will supersede the existing Pit 3 (P03) Closure Plan, which was developed in accordance with Title 40 Code of Federal Regulations (CFR) Part 265, 'Interim Status Standards for Owners and Operators of Hazardous Waste Treatment, Storage, and Disposal Facilities.' This document will also serve as the Closure Plan and the Post-Closure Plan, which are required by 40 CFR 265, for the 92-Acre Area. After closure activities are complete, a request for the modification of the Resource Conservation and Recovery Act Permit that governs waste management activities at the NNSS will be submitted to the Nevada Division of Environmental Protection to incorporate the requirements for post-closure monitoring. Four CAAs, ranging from No Further Action to Clean Closure, were evaluated for the 92-Acre Area. The CAAs were evaluated on technical merit focusing on performance, reliability, feasibility, safety, and cost. Based on the evaluation of the data used to develop the conceptual site model; a review of past, current, and future operations at the site; and the detailed and comparative

  15. Corrective Action Decision Document/Corrective Action Plan for the 92-Acre Area and Corrective Action Unit 111: Area 5 WMD Retired Mixed Waste Pits, Nevada National Security Site, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    NSTec Environmental Restoration

    2010-11-22

    This Corrective Action Decision Document/Corrective Action Plan (CADD/CAP) has been prepared for the 92-Acre Area, the southeast quadrant of the Radioactive Waste Management Site, located in Area 5 of the Nevada National Security Site (NNSS). The 92-Acre Area includes Corrective Action Unit (CAU) 111, 'Area 5 WMD Retired Mixed Waste Pits.' Data Quality Objectives (DQOs) were developed for the 92-Acre Area, which includes CAU 111. The result of the DQO process was that the 92-Acre Area is sufficiently characterized to provide the input data necessary to evaluate corrective action alternatives (CAAs) without the collection of additional data. The DQOs are included as Appendix A of this document. This CADD/CAP identifies and provides the rationale for the recommended CAA for the 92-Acre Area, provides the plan for implementing the CAA, and details the post-closure plan. When approved, this CADD/CAP will supersede the existing Pit 3 (P03) Closure Plan, which was developed in accordance with Title 40 Code of Federal Regulations (CFR) Part 265, 'Interim Status Standards for Owners and Operators of Hazardous Waste Treatment, Storage, and Disposal Facilities.' This document will also serve as the Closure Plan and the Post-Closure Plan, which are required by 40 CFR 265, for the 92-Acre Area. After closure activities are complete, a request for the modification of the Resource Conservation and Recovery Act Permit that governs waste management activities at the NNSS will be submitted to the Nevada Division of Environmental Protection to incorporate the requirements for post-closure monitoring. Four CAAs, ranging from No Further Action to Clean Closure, were evaluated for the 92-Acre Area. The CAAs were evaluated on technical merit focusing on performance, reliability, feasibility, safety, and cost. Based on the evaluation of the data used to develop the conceptual site model; a review of past, current, and future operations at the site; and the detailed

  16. Special enclosure for a pressure vessel

    International Nuclear Information System (INIS)

    Wedellsborg, B.W.; Wedellsborg, U.W.

    1993-01-01

    A pressure vessel enclosure is described comprising a primary pressure vessel, a first pressure vessel containment assembly adapted to enclose said primary pressure vessel and be spaced apart therefrom, a first upper pressure vessel jacket adapted to enclose the upper half of said first pressure vessel containment assembly and be spaced apart therefrom, said upper pressure vessel jacket having an upper rim and a lower rim, each of said rims connected in a slidable relationship to the outer surface of said first pressure vessel containment assembly, mean for connecting in a sealable relationship said upper rim of said first upper pressure vessel jacket to the outer surface of said first pressure vessel containment assembly, means for connecting in a sealable relationship said lower rim of said first upper pressure vessel jacket to the outer surface of said first pressure vessel containment assembly, a first lower pressure vessel jacket adapted to enclose the lower half of said first pressure vessel containment assembly and be spaced apart therefrom, said lower pressure vessel jacket having an upper rim connected in a slidable relationship to the outer surface of said first pressure vessel containment assembly, and means for connecting in a sealable relationship said upper rim of said first lower pressure vessel jacket to the outer surface of said first pressure vessel containment assembly, a second upper pressure vessel jacket adapted to enclose said first upper pressure vessel jacket and be spaced apart therefrom, said second upper pressure vessel jacket having an upper rim and a lower rim, each of said rims adapted to slidably engage the outer surface of said first upper pressure vessel jacket, means for sealing said rims, a second lower pressure vessel jacket adapted to enclose said first lower pressure vessel jacket and be spaced apart therefrom

  17. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    1994-03-01

    This document outlines the activities necessary to conduct a Remedial Investigation (RI) of the Chestnut Ridge Security Pits (CRSP) at the Oak Ridge Y-12 Plant. The CRSP, also designated Chestnut Ridge Operable Unit (OU) 1, is one of four OUs along Chestnut Ridge on the Oak Ridge Reservation (ORR). The purpose of the RI is to collect data to (1) evaluate the nature and extent of known and suspected contaminants, (2) support an Ecological Risk Assessment (ERA) and a Human Health Risk Assessment (HHRA), (3) support the feasibility study in the development and analysis of remedial alternatives, and (4) ultimately, develop a Record of Decision (ROD) for the site. This chapter summarizes the regulatory background of environmental investigation on the ORR and the approach currently being followed and provides an overview of the RI to be conducted at the CRSP. Subsequent chapters provide details on site history, sampling activities, procedures and methods, quality assurance (QA), health and safety, and waste management related to the RI

  18. Remedial Investigation Work Plan for Chestnut Ridge Operable Unit 1 (Chestnut Ridge Security Pits) at the Oak Ridge Y-12 Plant, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    1994-03-01

    This document outlines the activities necessary to conduct a Remedial Investigation (RI) of the Chestnut Ridge Security Pits (CRSP) at the Oak Ridge Y-12 Plant. The CRSP, also designated Chestnut Ridge Operable Unit (OU) 1, is one of four OUs along Chestnut Ridge on the Oak Ridge Reservation (ORR). The purpose of the RI is to collect data to (1) evaluate the nature and extent of known and suspected contaminants, (2) support an Ecological Risk Assessment (ERA) and a Human Health Risk Assessment (HHRA), (3) support the feasibility study in the development and analysis of remedial alternatives, and (4) ultimately, develop a Record of Decision (ROD) for the site. This chapter summarizes the regulatory background of environmental investigation on the ORR and the approach currently being followed and provides an overview of the RI to be conducted at the CRSP. Subsequent chapters provide details on site history, sampling activities, procedures and methods, quality assurance (QA), health and safety, and waste management related to the RI.

  19. Securing Retirement at a Young Age. Exploring the Intention to Buy Longevity Annuities through an Extended Version of the Theory of Planned Behavior

    Directory of Open Access Journals (Sweden)

    Costanza Nosi

    2017-06-01

    Full Text Available Since the early 90s, Italy has undergone radical changes in the regulations of the public pension system aimed at mending its main drawbacks and improving sustainability in the long run. The reforms were intended to recover the national economy through a significant reduction of benefits by increasing, particularly for younger people, individual responsibility for the accumulation of retirement wealth. Adopting an enhanced version of the Theory of Planned Behavior (TPB, which includes affective reactions, the present paper aims to understand the factors influencing the intention to enroll in a private pension plan through the purchase of longevity annuity coverage on the part of young adults. A purposive sample of 7480 Italian people aged 25–35 participated in the survey. Collected data were analyzed adopting an ordinal logistic regression (OLR model. The findings confirm the predictive power of the TPB in the financial field of longevity annuity buying, show that anticipated affective reactions increase the predictive power of the TPB model, and reveal that the influence of the investigated constructs varies alongside people’s willingness to purchase. The outcomes provide useful recommendations to the policy maker and private companies to favor the adoption of wide-spread desired behaviors among citizenships.

  20. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.