WorldWideScience

Sample records for vessel security program

  1. 78 FR 13691 - Guidance Regarding Inspection and Certification of Vessels Under the Maritime Security Program

    Science.gov (United States)

    2013-02-28

    ...-level approach would enable the Coast Guard to apply traditional inspection methods to newly reflagged... enrolled MSP vessels would continue to be inspected by the Coast Guard in a manner similar to traditional... oversight, and evaluations of Authorized Class Society (ACS) survey activities. We received eight public...

  2. Report of the DHS Small Vessel Security Institute

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  3. Report of the DHS National Small Vessel Security Summit

    National Research Council Canada - National Science Library

    Brownstein, Charles; Baker, John; Hull, Peter; Minogue, Nicholas; Murphy, George; Winston, Phyllis

    2007-01-01

    The purpose of the National Small Vessel Security Summit (NSVSS) was to engage private, commercial and government stakeholders in discussions on a range of issues involving the security risks posed by small vessels in the U.S...

  4. Report of the DHS Small Vessel Security Institute

    Science.gov (United States)

    2007-10-19

    Local Government Interests: LtCol Don Holway; Florida Fish and Wildlife Conservation Commission Maj John Fetterman , Maine Department of Marine...AWW program to help fill gaps in law enforcement patrols. 68 National Small Vessel Security Summit Major John C. Fetterman – State of Maine...Major Fetterman currently serves as Vice President of the National Association of State Boating Law Administrators and for the last 30 years has been a

  5. Analisa Greenwater Akibat Gerakan Offshore Security Vessel

    Directory of Open Access Journals (Sweden)

    Maulidya Octaviani Bustamin

    2012-09-01

    Full Text Available Analisa  Tugas  Akhir  ini,  terdiri  atas  beberapa  tahapan.  Yang pertama yaitu perancangan struktur Offshore Security Vessel (OSV dengan bantuan software MAXSURF guna mendapatkan Lines Plan. Offset data yang diperoleh digunakan dalam pemodelan menggunakan MOSES,  kemudian  dilakukan  analisa  gerak  OSV  dalam  gelombang  regular  dan dinyatakan dalam grafik RAO. Analisa gerak relatif vertikal  haluan dihitung dari RAO gerakan, dan kemudian melakukan evaluasi perilaku di gelombang acak dengan analisis spektra gelombang. Dari analisa spektra didapatkan parameter greenwater sehingga dapat dihitung peluang, intensitas dan tekanan greenwater. Dari hasil analisa diperoleh RAO gerak vertikal Offshore Security Vessel (OSV pada  gelombang  reguler yang dipengaruhi  oleh  kecepatan,  kondisi  muatan  dan arah gelombang. Peluang terjadinya greenwater terbesar terjadi pada sudut datang gelombang following sea (0o dimana harga terbesar terjadi pada ω = 0.2 rad/sec dengan periode 29 detik mencapai 0.477. Intensitas greenwater terbesar terjadi pada saat sudut datang gelombang following sea (0o adalah sebanyak 59.265 per jam dan 0.378 per detik. Tekanan greenwater terbesar terjadi pada saat sudut datang gelombang head sea (180o sebesar 1678x10-6 MPa. Dengan nilai tersebut, deck mampu menahan beban akibat tekanan greenwater.

  6. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  7. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  8. 33 CFR 101.125 - Approved Alternative Security Programs.

    Science.gov (United States)

    2010-07-01

    ... 106 of this subchapter, as applicable: (a) American Gaming Association Alternative Security Program..., and Towboats and Barges, dated September 24, 2003. (c) Passenger Vessel Association Industry Standards...

  9. Secure Dynamic Program Repartitioning

    DEFF Research Database (Denmark)

    Hansen, Rene Rydhoff; Probst, Christian

    2005-01-01

    Secure program partitioning has been introduced as a language-based technique to allow the distribution of data and computation across mutualy untrusted hosts, while at the same time guaranteeing the protection of confidential data. Programs that have been annotated with security types......, but the partitioning compiler becomes a part of the network and can recompile applications, thus alowing hosts to enter or leave the framework. We contend that this setting is superior to static partitioning, since it allows redistribution of data and computations. This is especialy beneficial if the new host alows...... data and computations to better fulfil the trust requirements of the users. Erasure Policies ensure that the original host of the redistributed data or computation does not store the data any longer....

  10. Coping with Security in Programming

    OpenAIRE

    Frank Schindler

    2006-01-01

    This article deals with importance of security issues in computer programming.Secure software can only be designed with security as a primary goal. To achieve that wewould have to redesign our computer systems with security in our mind including entirecomputer environment, e.g. hardware, programming languages and, of course, operatingsystems. In software development process the quality of resulting computer code should bethe most important aspect during the whole program development process. ...

  11. TMI-2 Vessel Investigation Project Metallurgical Program

    International Nuclear Information System (INIS)

    Diercks, D.R.; Neimark, L.A.

    1990-01-01

    The TMI-2 [Three Mile Island unit 2] Vessel Investigation Project Metallurgical Program at Argonne National Laboratory is a part of the international TMI-2 Vessel Investigation Project being conducted jointly by the U.S. Nuclear Regulatory Commission and the Organization for Economic Co-operation and Development (OECD). The overall project consists of three phases, namely (1) recovery of material samples from the lower head of the TMI-2 reactor, (2) examination and analysis of the lower head samples and the preparation and testing of archive material subjected to a similar thermal history, and (3) procurement, examination, and analysis of companion core material located adjacent to or near the lower head material. The specific objectives of the ANL Metallurgical Program, which accounts for a major portion of Phase 2, are to prepare metallographic and mechanical test specimen blanks from the TMI-2 lower head material, prepare similar test specimen blanks from suitable archive material subjected to the appropriate thermal processing, determine the mechanical properties of the lower vessel head and archive materials under the conditions of the core-melt accident, and assess the lower head integrity and margin-to-failure during the accident. The ANL work consists of three tasks: (1) archive materials program, (2) fabrication of metallurgical and mechanical test specimens from the TMI-2 pressure vessel samples, and (3) mechanical property characterization of TMI-2 lower pressure vessel head and archive material

  12. Lemnos Interoperable Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Stewart, John [Tennessee Valley Authority, Knoxville, TN (United States); Halbgewachs, Ron [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Chavez, Adrian [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Smith, Rhett [Schweitzer Engineering Laboratories, Chattanooga, TN (United States); Teumim, David [Teumim Technical, Allentown, PA (United States)

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  13. Implementing an Information Security Program

    Energy Technology Data Exchange (ETDEWEB)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.; O' Neil, Lori Ross; Leitch, Rosalyn; Johnson, Christopher; Lewis, John G.; Rodger, Robert M.

    2017-11-01

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to cover information security best practices, planning for an information security management system, and implementing security controls for information security.

  14. Reactor Vessel Surveillance Program for Advanced Reactor

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Kyeong-Hoon; Kim, Tae-Wan; Lee, Gyu-Mahn; Kim, Jong-Wook; Park, Keun-Bae; Kim, Keung-Koo

    2008-10-15

    This report provides the design requirements of an integral type reactor vessel surveillance program for an integral type reactor in accordance with the requirements of Korean MEST (Ministry of Education, Science and Technology Development) Notice 2008-18. This report covers the requirements for the design of surveillance capsule assemblies including their test specimens, test block materials, handling tools, and monitors of the surveillance capsule neutron fluence and temperature. In addition, this report provides design requirements for the program for irradiation surveillance of reactor vessel materials, a layout of specimens and monitors in the surveillance capsule, procedures of installation and retrieval of the surveillance capsule assemblies, and the layout of the surveillance capsule assemblies in the reactor.

  15. Research program plan: reactor vessels. Volume 1

    International Nuclear Information System (INIS)

    Vagins, M.; Taboada, A.

    1985-07-01

    The ability of the licensing staff of the NRC to make decisions concerning the present and continuing safety of nuclear reactor pressure vessels under both normal and abnormal operating conditions is dependent upon the existence of verified analysis methods and a solid background of applicable experimental data. It is the role of this program to provide both the analytical methods and the experimental data needed. Specifically, this program develops fracture mechanics analysis methods and design criteria for predicting the stress levels and flaw sizes required for crack initiation, propagation, and arrest in LWR pressure vessels under all known and postulated operations conditions. To do this, not only must the methods be developed but they must be experimentally validated. Further, the materials data necessary for input to these analytical methods must be developed. Thus, in addition to methods development and large scale experimental verification this program also develops data to show that slow-load fracture toughness, rapid-load fracture toughness, and crack arrest toughness obtained from small laboratory specimens are truly representative of the toughness characteristics of the material behavior in pressure vessels in both the unirradiated and the irradiated conditions

  16. 76 FR 27897 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port...

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0342] Security and Safety Zone Regulations, Large Passenger Vessel Protection, Captain of the Port Columbia River... will enforce the security and safety zone in 33 CFR 165.1318 for large passenger vessels operating in...

  17. 33 CFR 165.1151 - Security Zones; liquefied hazardous gas tank vessels, San Pedro Bay, California.

    Science.gov (United States)

    2010-07-01

    ... a tank vessel as liquefied petroleum gas, liquefied natural gas, or similar liquefied gas products... Eleventh Coast Guard District § 165.1151 Security Zones; liquefied hazardous gas tank vessels, San Pedro... the sea floor, within a 500 yard radius around any liquefied hazardous gas (LHG) tank vessel that is...

  18. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-04-24

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... channel's entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai... entrance during the arrival and departure of the Passenger Vessel Safari Explorer in Kaunakakai Harbor...

  19. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Science.gov (United States)

    2012-01-13

    ...-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI... vessel SAFARI EXPLORER to its intended berth in the harbor. Entry into the temporary security zone is... operation of the SAFARI EXPLORER into Molokai has been voluntarily suspended by the operating company...

  20. Expanded Fermilab pressure vessel directory program

    Energy Technology Data Exchange (ETDEWEB)

    Tanner, A.

    1983-01-01

    Several procedures have been written to manage the information pertaining to the vacuum tanks and pressure vessels for which the laboratory is responsible. These procedures have been named TANK1 for the vessels belonging to the Accelerator Division, TANK2 and TANK3 for the vessels belonging to the Research Division and to Technical Support respectively, and TANK4 for the vessels belonging to the Business Division. The operating procedures are otherwise identical in every respect.

  1. Expanded Fermilab pressure vessel directory program

    International Nuclear Information System (INIS)

    Tanner, A.

    1983-01-01

    Several procedures have been written to manage the information pertaining to the vacuum tanks and pressure vessels for which the laboratory is responsible. These procedures have been named TANK1 for the vessels belonging to the Accelerator Division, TANK2 and TANK3 for the vessels belonging to the Research Division and to Technical Support respectively, and TANK4 for the vessels belonging to the Business Division. The operating procedures are otherwise identical in every respect

  2. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  3. 33 CFR 165.121 - Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode Island.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones: High... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.121 Safety and Security Zones: High Interest Vessels, Narragansett Bay, Rhode...

  4. 76 FR 31350 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-31

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2011-0357] Cruise Vessel Safety and Security Act of 2010, Available Technology AGENCY: Coast Guard, DHS. ACTION: Notice of request for comments... Security and Safety Act of 2010(CVSSA), specifically related to video recording and overboard detection...

  5. Building an intelligence-led security program

    CERN Document Server

    Liska, Allan

    2014-01-01

    As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented inte

  6. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Science.gov (United States)

    2010-07-01

    ... baggage; and (vi) Vessel stores; (2) Threat assessments, including the purpose and methodology of the assessment, for the area or areas in which the vessel operates or at which passengers embark or disembark; (3... and control procedures; (ii) Identification systems; (iii) Surveillance and monitoring equipment; (iv...

  7. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge...) Methods of physical screening of persons, personal effects, baggage, cargo, and vessel stores; and (m) The...

  8. 12 CFR 568.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... opening and closing for business and for the safekeeping of all currency, negotiable securities, and... law enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Security program. 568.3 Section 568.3 Banks and...

  9. 12 CFR 326.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... for opening and closing for business and for the safekeeping of all currency, negotiable securities... enforcement officers; (iv) The cost of the security devices; (v) Other security measures in effect at the... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Security program. 326.3 Section 326.3 Banks and...

  10. 75 FR 45055 - Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2010-08-02

    ...-AA87 Security Zone; 2010 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... (NCSM 710) which include all waters within 100 yards from the vessels while underway in the Puget Sound... authorized by the COTP, Puget Sound or Designated Representative. DATES: This rule is effective from 8 a.m...

  11. 77 FR 50926 - Security Zones; Certain Dangerous Cargo Vessels, Tampa, FL

    Science.gov (United States)

    2012-08-23

    ... (LPG), and ammonium nitrate. The security zones will start at buoys 3 and 4 in Tampa Bay ``F'' cut... propane gas, and ammonium nitrate. The security zones prohibit any vessel from entering within 500 yards.... We seek any comments or information that may lead to the discovery of a significant environmental...

  12. 76 FR 63547 - Security Zone; Columbia and Willamette Rivers, Dredge Vessels Patriot and Liberty

    Science.gov (United States)

    2011-10-13

    ... or his designated representative. The security zone will be in effect while the Dredge Vessels are... its effects on them and participate in the rulemaking process. Small businesses may send comments on... requirements. (c) Enforcement period. The security zone created by this section will be in effect from 7 a.m...

  13. 76 FR 40617 - Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington

    Science.gov (United States)

    2011-07-11

    ... better evaluate its effects on them and participate in the rulemaking process. Small businesses may send... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-0505] RIN 1625-AA87 Security Zone; 2011 Seattle Seafair Fleet Week Moving Vessels, Puget Sound, Washington AGENCY...

  14. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Science.gov (United States)

    2010-07-01

    ...) Understanding of the importance of creating and maintaining safe working and living conditions for passengers... responsibility to preserve the marine environment; and (B) Basic working knowledge of pollution prevention... space numbering; and (B) Understanding of various vessel types; and working knowledge of nautical terms...

  15. VESSEL-SOURCED POLLUTION: A SECURITY THREAT IN ...

    African Journals Online (AJOL)

    and some other conventions make provisions concerning protection of ma- ... the pollution of the marine in Malaysia, it appears that pollution by vessels .... pollution from ships and maritime safety; providing effective legal, technical and scientific ..... of the offence after the service of the notice on the offending ship through.

  16. 76 FR 10262 - Information Security Program

    Science.gov (United States)

    2011-02-24

    ... FEDERAL MARITIME COMMISSION 46 CFR Part 503 [Docket No. 11-01] RIN 3072-AC40 Information Security... (FMC or Commission) amends its regulations relating to its Information Security Program to reflect the changes implemented by Executive Order 13526--Classified National Security Information--that took effect...

  17. Report of the DHS National Small Vessel Security Summit

    Science.gov (United States)

    2007-10-19

    Fetterman , Maine Department of Marine Resources Lt Bill Krul, Marine Patrol, St. Clair County, Michigan Sgt Jim Lambert, Marine Patrol, Alameda...Major John C. Fetterman – State of Maine Major Fetterman currently serves as Vice President of the National Association of State Boating Law...or seemingly out of place vessel enters a maritime community, it will attract the attention of his officers. Major Fetterman was concerned that

  18. Possible research program on a large scale nuclear pressure vessel

    International Nuclear Information System (INIS)

    1983-01-01

    The nuclear pressure vessel structural integrity is actually one of the main items in the nuclear plants safety field. An international study group aimed at investigating the feasibility of a ''possible research program'' on a scale 1:1 LWR pressure vessel. This report presents the study group's work. The different research programs carried out or being carried out in various countries of the European Community are presented (phase I of the study). The main characteristics of the vessel considered for the program and an evaluation of activities required for making them available are listed. Research topic priorities from the different interested countries are summarized in tables (phase 2); a critical review by the study group of the topic is presented. Then, proposals for possible experimental programs and combination of these programs are presented, only as examples of possible useful research activities. The documents pertaining to the results of phase I inquiry performed by the study group are reported in the appendix

  19. IAEA Nuclear Security Human Resource Development Program

    International Nuclear Information System (INIS)

    Braunegger-Guelich, A.

    2009-01-01

    The IAEA is at the forefront of international efforts to strengthen the world's nuclear security framework. The current Nuclear Security Plan for 2006-2009 was approved by the IAEA Board of Governors in September 2005. This Plan has three main points of focus: needs assessment, prevention, detection and response. Its overall objective is to achieve improved worldwide security of nuclear and other radioactive material in use, storage and transport, and of their associated facilities. This will be achieved, in particular, through the provision of guidelines and recommendations, human resource development, nuclear security advisory services and assistance for the implementation of the framework in States, upon request. The presentation provides an overview of the IAEA nuclear security human resource development program that is divided into two parts: training and education. Whereas the training program focuses on filling gaps between the actual performance of personnel working in the area of nuclear security and the required competencies and skills needed to meet the international requirements and recommendations described in UN and IAEA documents relating to nuclear security, the Educational Program in Nuclear Security aims at developing nuclear security experts and specialists, at fostering a nuclear security culture and at establishing in this way sustainable knowledge in this field within a State. The presentation also elaborates on the nuclear security computer based learning component and provides insights into the use of human resource development as a tool in achieving the IAEA's long term goal of improving sustainable nuclear security in States. (author)

  20. Materials surveillance program for C-E NSSS reactor vessels

    International Nuclear Information System (INIS)

    Koziol, J.J.

    1977-01-01

    Irradiation surveillance programs for light water NSSS reactor vessels provide the means by which the utility can assess the extent of neutron-induced changes in the reactor vessel materials. These programs are conducted to verify, by direct measurement, the conservatism in the predicted radiation-induced changes and hence the operational parameters (i.e., heat-up, cooldown, and pressurization rates). In addition, such programs provide assurance that the scheduled adjustments in the operational parameters are made with ample margin for safe operation of the plant. During the past 3 years, several documents have been promulgated establishing the criteria for determining both the initial properties of the reactor vessel materials as well as measurement of changes in these initial properties as a result of irradiation. These documents, ASTM E-185-73, ''Recommended Practice for Surveillance Tests for Nuclear Reactor Vessels,'' and Appendix H to 10 CFR 50, ''Reactor Vessel Material Surveillance Program Requirements,'' are complementary to each other. They are the result of a change in the basic philosophy regarding the design and analysis of reactor vessels. In effect, the empirical ''transition temperature approach,'' which was used for design, was replaced by the ''analytical fracture mechanics approach.'' The implementation of this technique was described in Welding Research Council Bulletin 1975 and Appendix G to ASME Code Section III. Further definition of requirements appears in Appendix G to 10 CFR 50 published in July 1973. It is the intent of this paper to describe (1) a typical materials surveillance program for the reactor vessel of a Combustion Engineering NSSS, and (2) how the results of such programs, as well as experimental programs provide feed-back for improvement of materials to enhance their radiation resistance and thereby further improve the safety and reliability of future plants. (author)

  1. The security analyzer: A security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.

    1986-09-01

    The Security Analyzer is a software tool capable of analyzing the effectiveness of a facility's security system. It is written in the Prolog logic programming computer language, using entity-relationship data modeling techniques. The program performs the following functions: (1) provides descriptive, locational and operational status information about intrusion detectors and assessment devices (i.e., ''sensors'' and ''cameras'') upon request; (2) provides for storage and retrieval of maintenance history information for various components of the security system (including intrusion detectors), and allows for changing that information as desired; (3) provides a ''search'' mode, wherein all paths are found from any specified physical location to another specified location which satisfy user chosen ''intruder detection'' probability and elapsed time criteria (i.e., the program finds the ''weakest paths'' from a security point of view). The first two of these functions can be provided fairly easily with a conventional database program; the third function could be provided using Fortran or some similar language, though with substantial difficulty. In the Security Analyzer program, all these functions are provided in a simple and straight-forward manner. This simplicity is possible because the program is written in the symbolic (as opposed to numeric) processing language Prolog, and because the knowledge base is structured according to entity-relationship modeling principles. Also, the use of Prolog and the entity-relationship modeling technique allows the capabilities of the Security analyzer program, both for knowledge base interrogation and for searching-type operations, to be easily expanded in ways that would be very difficult for a numeric and more algorithmically deterministic language such as Fortran to duplicate. 4 refs

  2. Heavy Section Steel Technology Program. Part II. Intermediate vessel testing

    International Nuclear Information System (INIS)

    Whitman, G.D.

    1975-01-01

    The testing of the intermediate pressure vessels is a major activity under the Heavy Section Steel Technology Program. A primary objective of these tests is to develop or verify methods of fracture prediction, through the testing of selected structures and materials, in order that a valid basis can be established for evaluating the serviceability and safety of light-water reactor pressure vessels. These vessel tests were planned with sufficiently specific objectives that substantial quantitative weight could be given to the results. Each set of testing conditions was chosen so as to provide specific data by which analytical methods of predicting flaw growth, and in some cases crack arrest, could be evaluated. Every practical effort was made to assure that results would be relevant to some aspect of real reactor pressure vessel performance through careful control of material properties, selection of test temperatures, and design of prepared flaws. 5 references

  3. 6 CFR 27.235 - Alternative security program.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Alternative security program. 27.235 Section 27.235 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.235 Alternative security program. (a) Covered...

  4. 77 FR 44475 - Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA

    Science.gov (United States)

    2012-07-30

    ...-AA87 Security Zones; Seattle's Seafair Fleet Week Moving Vessels, Puget Sound, WA AGENCY: Coast Guard... temporary rule, call or email Lieutenant Junior Grade Anthony P. LaBoy, Sector Puget Sound, Waterways Management Division, U.S. Coast Guard; telephone 206-217-6323, email SectorPugetSound[email protected] . If you...

  5. The analysis of reactor vessel surveillance program data

    International Nuclear Information System (INIS)

    Norris, E.B.

    1979-01-01

    Commercial nuclear power reactor vessel surveillance programs are provided by the reactor supplier and are designed to meet the requirements of ASTM Method E 185. (3). Each surveillance capsule contains sets of Charpy V-notch (Csub(v)) specimens representing selected materials from the vessel beltline region and some reference steel, tension test specimens machined from selected beltline materials, temperature monitors, and neutron flux dosimeters. Surveillance capsules may also contain fracture mechanics specimens machined from selected vessel beltline materials. The major steps in the conduct of a surveillance program include (1) the testing of the surveillance specimens to determine the exposure conditions at the capsule location and the resulting embrittlement of the vessel steel, (2) the extrapolation of the capsule results to the pressure vessel wall, and (3) the determination of the heatup and cooldown limits for normal, upset, and test operation. This paper will present data obtained from commercial light water reactor surveillance programs to illustrate the methods of analysis currently in use at Southwest Research Institute and to demonstrate some of the limitations imposed by the data available. Details concerning the procedures for testing the surveillance capsule specimens will not be included because they are considered to be outside of the scope of this paper

  6. TMI-2 Vessel Investigation Project (VIP) Metallurgical Program

    International Nuclear Information System (INIS)

    Diercks, D.R.; Neimark, L.A.

    1990-06-01

    The TMI-2 Vessel Investigation Project (VIP) Metallurgical Program is a part of the international TMI-2 Vessel Investigation Project being conducting jointly by the US Nuclear Regulatory Commission and the Organization for Economic Co-operation and Development (OECD). The overall project consists of three phases, namely (1) recovery of material samples from the lower head of the TMI-2 reactor, (2) examination and analysis of the lower head samples and the preparation and testing of archive material subjected to a similar thermal history, and (3) procurement, examination, and analysis of companion core material located adjacent to or near the lower head material. The specific objectives of the ANL Metallurgical Program, which comprises a major portion of Phase 2, are to prepare metallographic and mechanical test specimen blanks from the TMI-2 lower head material, prepare similar test specimen blanks from suitable archive material subjected to the appropriate thermal processing, determine the mechanical properties of the lower vessel head and archive materials under the conditions of the core-melt accident, and assess the lower head integrity and margin-to-failure during the accident. The ANL work consists of three tasks: (1) archive materials program, (2) fabrication of metallurgical and mechanical test specimens from the TMI-2 pressure vessel samples, and (3) mechanical property characterization of TMI-2 lower pressure vessel head and archive material

  7. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  8. 33 CFR 165.103 - Safety and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone...

    Science.gov (United States)

    2010-07-01

    ... within a 500-yard radius of any Liquefied Petroleum Gas (LPG) vessel while it is moored at the LPG... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones; LPG... and Security Zones; LPG Vessel Transits in Portland, Maine, Captain of the Port Zone, Portsmouth...

  9. Testing program for burning plasma experiment vacuum vessel bolted joint

    International Nuclear Information System (INIS)

    Hsueh, P.K.; Khan, M.Z.; Swanson, J.; Feng, T.; Dinkevich, S.; Warren, J.

    1992-01-01

    As presently designed, the Burning Plasma Experiment vacuum vessel will be segmentally fabricated and assembled by bolted joints in the field. Due to geometry constraints, most of the bolted joints have significant eccentricity which causes the joint behavior to be sensitive to joint clamping forces. Experience indicates that as a result of this eccentricity, the joint will tend to open at the side closest to the applied load with the extent of the opening being dependent on the initial preload. In this paper analytical models coupled with a confirmatory testing program are developed to investigate and predict the non-linear behavior of the vacuum vessel bolted joint

  10. Stress analysis program system for nuclear vessel: STANSAS

    International Nuclear Information System (INIS)

    Okamoto, Asao; Michikami, Shinsuke

    1979-01-01

    IHI has developed a computer system of stress analysis and evaluation for nuclear vessels: STANSAS (STress ANalysis System for Axi-symmetric Structure). The system consists of more than twenty independent programs divided into the following six parts. 1. Programs for opening design by code rule. 2. Calculation model generating programs. 3. Load defining programs. 4. Structural analysis programs. 5. Load data/calculation results plotting programs. 6. Stress evaluation programs. Each program is connected with its pre- or post-processor through three data-bases which enable automatic data transfer. The user can make his choice of structural analysis programs in accordance with the problem to be solved. The interface to STANSAS can be easily installed in generalized structural analysis programs such as NASTRAN and MARC. For almost all tables and figures in the stress report, STANSAS has the function to print or plot out. The complicated procedures of ''Design by Analysis'' for pressure vessels have been well standardized by STANSAS. The system will give a high degree of efficiency and confidence to the design work. (author)

  11. Secure Execution of Distributed Session Programs

    Directory of Open Access Journals (Sweden)

    Nuno Alves

    2011-10-01

    Full Text Available The development of the SJ Framework for session-based distributed programming is part of recent and ongoing research into integrating session types and practical, real-world programming languages. SJ programs featuring session types (protocols are statically checked by the SJ compiler to verify the key property of communication safety, meaning that parties engaged in a session only communicate messages, including higher-order communications via session delegation, that are compatible with the message types expected by the recipient. This paper presents current work on security aspects of the SJ Framework. Firstly, we discuss our implementation experience from improving the SJ Runtime platform with security measures to protect and augment communication safety at runtime. We implement a transport component for secure session execution that uses a modified TLS connection with authentication based on the Secure Remote Password (SRP protocol. The key technical point is the delicate treatment of secure session delegation to counter a previous vulnerability. We find that the modular design of the SJ Runtime, based on the notion of an Abstract Transport for session communication, supports rapid extension to utilise additional transports whilst separating this concern from the application-level session programming task. In the second part of this abstract, we formally prove the target security properties by modelling the extended SJ delegation protocols in the pi-calculus.

  12. Hygiene and Industrial Security Program: General aspects

    International Nuclear Information System (INIS)

    1988-01-01

    This Venezuelan standard establishes the aspects that must be included in the elaboration and monitoring of an Hygiene and Industrial Security Program (Prevention of Accidents and Occupational Diseases Program). It is applicable to any type of exploitation company, or any kind of task (in nature or importance) where people work, no matter the number workers [es

  13. Aspects with Program Analysis for Security Policies

    DEFF Research Database (Denmark)

    Yang, Fan

    Enforcing security policies to IT systems, especially for a mobile distributed system, is challenging. As society becomes more IT-savvy, our expectations about security and privacy evolve. This is usually followed by changes in regulation in the form of standards and legislation. In many cases......, small modification of the security requirement might lead to substantial changes in a number of modules within a large mobile distributed system. Indeed, security is a crosscutting concern which can spread to many business modules within a system, and is difficult to be integrated in a modular way....... This dissertation explores the principles of adding challenging security policies to existing systems with great flexibility and modularity. The policies concerned cover both classical access control and explicit information flow policies. We built our solution by combining aspect-oriented programming techniques...

  14. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45... SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45 Information Security Program Review. (a) The Director, OSTP, shall require an annual formal review of the OSTP...

  15. Physical security technology base programs for physical security

    International Nuclear Information System (INIS)

    Jacobs, J.

    1986-01-01

    Sandia National Laboratories is the US Department of Energy's lead laboratory for physical security research and development (R and D). In support of this mission, Sandia has maintained for several years an R and D program in each of the following technology areas: Intrusion Detection, Entry Control, CCTV Assessment, Access Delay, Alarm Display, and Guard Equipment and Training. The purpose of the technology base programs is to maintain cognizance of the capabilities of the commercial market, identify improvements and transfer technology to industry and facilities. The output of these programs supports the development of new equipment and advanced system concepts, demonstrations of proof-of-principles and system implementation. This paper will review the status of current developments and discuss trends in new technologies which are being explored for future applications, i.e., artificial intelligence, expert systems, robotics, and more automated systems

  16. Department of Defense: Observations on the National Industrial Security Program

    National Research Council Canada - National Science Library

    Barr, Ann C; Denomme, Thomas J; Booth, Brandon; Krump, John; Sloan, Karen; Slodkowski, Lillian; Sterling, Suzanne

    2008-01-01

    .... In terms of facility oversight, DSS maintained files on contractor facilities security programs and their security violations, but it did not analyze this information to determine, for example...

  17. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  18. User Interface Program for secure electronic tags

    International Nuclear Information System (INIS)

    Cai, Y.; Koehl, E.R.; Carlson, R.D.; Raptis, A.C.

    1995-05-01

    This report summarizes and documents the efforts of Argonne National Laboratory (ANL) in developing a secure tag communication user interface program comprising a tag monitor and a communication tool. This program can perform the same functions as the software that was developed at the Lawrence Livermore National Laboratory (LLNL), but it is enhanced with a user-friendly screen. It represents the first step in updating the TRANSCOM Tracking System (TRANSCOM) by incorporating a tag communication screen menu into the main menu of the TRANSCOM user program. A working version of TRANSCOM, enhanced with ANL secure-tag graphics, will strongly support the Department of Energy Warhead Dismantlement/Special Nuclear Materials Control initiatives. It will allow commercial satellite tracking of the movements and operational activities of treaty-limited items and transportation vehicles throughout Europe and the former USSR, as well as the continental US

  19. 7 CFR 772.7 - Leasing minor program loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Leasing minor program loan security. 772.7 Section 772..., DEPARTMENT OF AGRICULTURE SPECIAL PROGRAMS SERVICING MINOR PROGRAM LOANS § 772.7 Leasing minor program loan security. (a) Eligibility. The Agency may consent to the borrower leasing all or a portion of security...

  20. 33 CFR 165.1317 - Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone; Large Passenger Vessel Protection, Puget Sound and adjacent waters, Washington. 165.1317 Section 165.1317 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS...

  1. 33 CFR 165.1318 - Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of...

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security and Safety Zone Regulations, Large Passenger Vessel Protection, Portland, OR Captain of the Port Zone 165.1318 Section 165.1318 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND...

  2. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  3. TMI-2 Vessel Investigation Project (VIP) Metallurgical Program

    International Nuclear Information System (INIS)

    Diercks, D.R.; Neimark, L.A.

    1991-01-01

    The Three Mile Island Unite 2 (TMI-2) Vessel Investigation Project Metallurgical Program is a part of the international TMI-2 Vessel Investigation Project being conducted jointly by the U.S. Nuclear Regulatory Commission and the Organization for Economic Cooperation and Development. The objectives of the metallurgical program are to deduce the temperatures of, determine the mechanical properties of, and assess the integrity of the TMI-2 lower head during the loss-of-coolant accident. Fifteen samples have been removed from the lower head and are being examined. In addition, archive material from the lower head of the Midland nuclear reactor has been procured for conducting supplemental metallurgical evaluations and mechanical property determinations. Evaluations of the microstructure and mechanical properties of the as-received archive material have been completed, and a series of heat treatment experiments has been conducted to develop standard microstructures to be compared with those present in the TMI-2 samples. Results have been obtained from examinations of two of the fifteen TMI-2 lower head samples. These results indicate that one of these two samples, which contained cracks in the weld cladding extending ∼3 mm into the underlying base metal, apparently reached temperatures on the order of 1000 to 1100C during the accident. A preliminary examination of the core debris deposited on this sample has been performed. The other sample, from an area away from the region of core relocation, did not exceed 727C during the accident

  4. The security analyzer, a security analyzer program written in Prolog

    International Nuclear Information System (INIS)

    Zimmerman, B.D.; Densley, P.J.; Carlson, R.L.

    1987-01-01

    A technique has been developed to characterize a nuclear facility and measure the strengths and weaknesses of the physical protection system. It utilizes the artificial intelligence capabilities available in the prolog programming language to probe a facility's defenses and find potential attack paths that meet designated search criteria. As sensors or barriers become inactive due to maintenance, failure, or inclement weather conditions, the protection system can rapidly be reanalyzed to discover weaknesses that would need to be strengthened by alternative means. Conversely, proposed upgrades and enhancements can be easily entered into the database and their effect measured against a variety of potential adversary attacks. Thus the security analyzer is a tool that aids the protection planner as well as the protection operations staff

  5. Effectiveness of the Civil Aviation Security Program.

    Science.gov (United States)

    1978-03-31

    Passenger Screening Results 12. Scope of Civil Aviation Security Program 13. Basic Policies 14. Explosives Detection Dog Teams 15. Explosives Detection... policies guiding the program recognize airline responsibilities for the safety of passengers, baggage and cargo in their care as well as for the...U *i * (U U Los -7 .cn cf) 1-4 ~~LL _m e- Hf LMU 0- u,-C -oL -ccJLL LII -~ LLIOL 0 _ CL. LLJ cr-L LCnIJ C ~ ~ CnCD C. ) &j 2ic- nc r JL AJ -L JC C.- L

  6. Cost-Benefit Analysis Methodology: Install Commercially Compliant Engines on National Security Exempted Vessels?

    Science.gov (United States)

    2015-11-05

    environment track record. Commercial compliance measures are checked to ensure the vessel can meet all intact and damage stability (center of gravity...From NAVSEA, the authors would like to thank Mr. Abe Boughner (NAVSEA 05D4); and Mr. Philip McCormick and Mr. Brittany Basilone, [NAVSEA 05C...sourceapportionmentbpttsd.pdf US EPA, 40 CFR 94 (Title 40—Protection of Environment , Chapter I – EPA, Subchapter C – Air Programs, Part 94 – Control

  7. 75 FR 1566 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-01-12

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office 32 CFR Part 2004 [NARA-09-0005] RIN 3095-AB34 National Industrial Security Program Directive No. 1 AGENCY... the National Industrial Security Program Directive No. 1. This correction assigns a Federal Docket...

  8. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2013-04-30

    Title 10 Code of Federal Regulations (CFR) Part 835, “Occupational Radiation Protection,” establishes radiation protection standards, limits, and program requirements for protecting individuals from ionizing radiation resulting from the conduct of U.S. Department of Energy (DOE) activities. 10 CFR 835.101(a) mandates that DOE activities be conducted in compliance with a documented Radiation Protection Program (RPP) as approved by DOE. This document promulgates the RPP for the Nevada National Security Site (NNSS), related (on-site or off-site) U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) operations, and environmental restoration off-site projects. This RPP section consists of general statements that are applicable to the NNSS as a whole. The RPP also includes a series of appendices which provide supporting detail for the associated NNSS Tennant Organizations (TOs). Appendix H, “Compliance Demonstration Table,” contains a cross-walk for the implementation of 10 CFR 835 requirements. This RPP does not contain any exemptions from the established 10 CFR 835 requirements. The RSPC and TOs are fully compliant with 10 CFR 835 and no additional funding is required in order to meet RPP commitments. No new programs or activities are needed to meet 10 CFR 835 requirements and there are no anticipated impacts to programs or activities that are not included in the RPP. There are no known constraints to implementing the RPP. No guides or technical standards are adopted in this RPP as a means to meet the requirements of 10 CFR 835.

  9. The Office of Safeguards and Security Nonproliferation Support Program

    International Nuclear Information System (INIS)

    Desmond, W.J.

    1996-01-01

    The Nonproliferation Support Program was established in the Department of Energy, Office of Safeguards and Security on october 1, 1995. its mission includes providing assistance to Departmental efforts for improved international material protection, control and accounting programs by coordinating and leveraging domestic safeguards and security policy, practice and experience into the international arena. A major objective of the program is to balance US national security requirements with global support of the nonproliferation objectives. This paper describes the organization of the Office of Safeguards and Security and the Nonproliferation Support Program role and responsibility, and presents some of the current areas of program emphasis and activity

  10. Review on Cyber Security Programs for NPP Application

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Eung Se [KEPRI, Daejeon (Korea, Republic of)

    2010-10-15

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS; CFR; RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  11. Review on Cyber Security Programs for NPP Application

    International Nuclear Information System (INIS)

    Oh, Eung Se

    2010-01-01

    Increased history records of cyber security (CS) attacks and concerns for computers and networks technical mishaps pull out cyber security to open places. In spite of secrete nature of security, transparent and shared knowledge of many security features are more required at modern plant floors. Korea Institute of Nuclear Safety (KINS), US Government and Nuclear Regulatory Commission (NRC) requested to develop cyber security plans and enforce their implementing to the NPPs. [KINS] [CFR] [RG 5.71] This paper reviews various cyber security guidelines and suggests an applicable cyber security program development models during the life cycle of NPP's Instrumentation and Control (I and C) systems

  12. Reactor vessel assessment and the development of a reactor vessel life extension program for Calvert Cliffs Units One and Two

    International Nuclear Information System (INIS)

    Montgomery, B.; Hijeck, P.J.

    1988-01-01

    A study has been undertaken to provide a general assessment of the life extension capabilities for the Calvert Cliffs Units One and Two reactor pressure vessels. The purpose of the study is to assess the general life extension capabilities for the Calvert Cliffs reactor pressure vessels based upon an extension and variation of the Surry pilot plant life extension study. This assessment provided a detailed reactor vessel surveillance program for plant life extension along with a hierarchy of specific tasks necessary for attaining maximum useful life. The assessment identified a number of critical issues which may impact life attainment and extension along with potential solutions to address these issues to ensure the life extension option is not precluded

  13. Physical protection educational program - information security aspects

    International Nuclear Information System (INIS)

    Tolstoy, A.

    2002-01-01

    Full text: Conceptual approaches for designing an expert training program on object physical protection taking into account information security aspects are examined. A special educational course does not only address the immediate needs for an educational support but also ensures that new professionals include new concepts and knowledge in their practice and encourages current practitioners towards such practice. Features of the modern physical protection systems (PPS) and classification of information circulating at them are pointed out. The requirements to the PPS information protection subsystem are discussed. During the PPS expert training on information security (IS) aspects they should receive certain knowledge, on the basis of which they could competently define and carry out the PPS IS policy for a certain object. Thus, it is important to consider minimally necessary volume of knowledge taught to the PPS experts for independent and competent implementation of the above listed tasks. For the graduate PPS IS expert training it is also necessary to examine the normative and legal acts devoted to IS as a whole and the PPS IS in particular. It is caused by necessity of conformity of methods and information protection tools implemented on a certain object to the federal and departmental IS requirements. The departmental normative IS requirements define an orientation of the PPS expert training. By curriculum development it is necessary to precisely determine for whom the PPS experts are taught. The curriculum should reflect common features of the PPS functioning of the certain object type, i.e. it should be adapted to a certain customer of the experts. The specified features were taken into account by development of an educational course 'Information security of the nuclear facility physical protection systems', taught at the Moscow Engineering Physics Institute (State University) according to the Russian-American educational program 'Master in Physical

  14. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    International Nuclear Information System (INIS)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon

    2016-01-01

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  15. Study on Nuclear Facility Cyber Security Awareness and Training Programs

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jung-Woon; Song, Jae-Gu; Lee, Cheol-Kwon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    Cyber security awareness and training, which is a part of operational security controls, is defined to be implemented later in the CSP implementation schedule. However, cyber security awareness and training is a prerequisite for the appropriate implementation of a cyber security program. When considering the current situation in which it is just started to define cyber security activities and to assign personnel who has responsibilities for performing those activities, a cyber security awareness program is necessary to enhance cyber security culture for the facility personnel to participate positively in cyber security activities. Also before the implementation of stepwise CSP, suitable education and training should be provided to both cyber security teams (CST) and facility personnel who should participate in the implementation. Since such importance and urgency of cyber security awareness and training is underestimated at present, the types, trainees, contents, and development strategies of cyber security awareness and training programs are studied to help Korean nuclear facilities to perform cyber security activities more effectively. Cyber security awareness and training programs should be developed ahead of the implementation of CSP. In this study, through the analysis of requirements in the regulatory standard RS-015, the types and trainees of overall cyber security training programs in nuclear facilities are identified. Contents suitable for a cyber security awareness program and a technical training program are derived. It is suggested to develop stepwise the program contents in accordance with the development of policies, guides, and procedures as parts of the facility cyber security program. Since any training programs are not available for the specialized cyber security training in nuclear facilities, a long-term development plan is necessary. As alternatives for the time being, several cyber security training courses for industrial control systems by

  16. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... shall have, at a minimum, the following security devices: (1) A means of protecting cash or other liquid assets, such as a vault, safe, or other secure space; (2) A lighting system for illuminating, during the...

  17. Firefighter's compressed air breathing system pressure vessel development program

    Science.gov (United States)

    Beck, E. J.

    1974-01-01

    The research to design, fabricate, test, and deliver a pressure vessel for the main component in an improved high-performance firefighter's breathing system is reported. The principal physical and performance characteristics of the vessel which were required are: (1) maximum weight of 9.0 lb; (2) maximum operating pressure of 4500 psig (charge pressure of 4000 psig); (3) minimum contained volume of 280 in. 3; (4) proof pressure of 6750 psig; (5) minimum burst pressure of 9000 psig following operational and service life; and (6) a minimum service life of 15 years. The vessel developed to fulfill the requirements described was completely sucessful, i.e., every category of performence was satisfied. The average weight of the vessel was found to be about 8.3 lb, well below the 9.0 lb specification requirement.

  18. 78 FR 261 - Moving Security Zone Around Escorted Vessels on the Lower Mississippi River

    Science.gov (United States)

    2013-01-03

    ... provides for enhanced protection of escorted vessels while causing little if any disruption to other routine navigation since most vessels will be allowed to transit within the outer 250 yards of the...

  19. A locking mechanism for securing a loading buoy to a vessel. Lsemekanisme for fastgjring av en lastebye til et farty

    Energy Technology Data Exchange (ETDEWEB)

    Breivik, K.; Smedal, A.

    1994-07-04

    The invention relates to a locking mechanism for securing a loading/unloading buoy on a vessel. The buoy is of the type to be introduced into a submerged downwardly open receiving space in the vessel, and to be fastened in a releasable manner in the receiving space. The mechanism comprises hydraulically actuated locking elements, mounted about horizontal axes at the sides of the receiving space, to pivot between the locking and releasing positions, the buoy having a peripheral collar having a downwards facing abutment edge for engagement with the locking elements in the locking position thereof. 6 figs.

  20. 78 FR 59706 - Secure Supply Chain Pilot Program; Correction

    Science.gov (United States)

    2013-09-27

    ...] Secure Supply Chain Pilot Program; Correction AGENCY: Food and Drug Administration, HHS. ACTION: Notice... Federal Register of August 20, 2013 (78 FR 51192). The document announced the start of the Secure Supply Chain Pilot Program (SSCPP). The document was published with an incorrect email address for the SSCPP...

  1. 76 FR 46907 - Ammonium Nitrate Security Program

    Science.gov (United States)

    2011-08-03

    ... Maritime Transportation Security Act NAICS North American Industrial Classification System NPRM Notice of.... Commenters noted, for example, that equipment used for transporting bulk ammonium nitrate, such as hoppers...

  2. Nuclear Security Education Program at the Pennsylvania State University

    Energy Technology Data Exchange (ETDEWEB)

    Uenlue, Kenan [The Pennsylvania State University, Radiation Science and Engineering Center, University Park, PA 16802-2304 (United States); The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States); Jovanovic, Igor [The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304 (United States)

    2015-07-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  3. Nuclear Security Education Program at the Pennsylvania State University

    International Nuclear Information System (INIS)

    Uenlue, Kenan; Jovanovic, Igor

    2015-01-01

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basis of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale

  4. EURCYL. A program to generate finite element meshes for pressure vessel nozzles

    International Nuclear Information System (INIS)

    De Windt, P.; Reynen, J.

    1974-12-01

    EURCYL is a program dealing with the automatic generation of finite element meshes for pressure vessel nozzles, using isoparametric elements with 8, 20 or 32 nodes. Options exist to generate BWR nozzles as well as PWR nozzles

  5. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  6. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  7. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  8. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  9. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  10. Use of computer programs to evaluate effectiveness of security systems

    International Nuclear Information System (INIS)

    Harris, L. Jr.; Goldman, L.A.; Mc Daniel, T.L.

    1987-01-01

    Thirty or more computer programs for security vulnerability analysis were developed from 1975 through 1980. Most of these programs are intended for evaluating security system effectiveness against outsider threats, but at least six programs are primarily oriented to insider threats. Some strengths and weaknesses of these programs are described. Six of these programs, four for outsider threats and two for insider threats, have been revised and adapted for use with IBM personal computers. The vulnerability analysis process is discussed with emphasis on data collection. The difference between design data and operational data is described. For performance-type operational data, such as detection probabilities and barrier delay times, the difference between unstressed and stressed performance data is discussed. Stressed performance data correspond to situations where an adversary attempts to weaken a security system by mitigating certain security measures. Suggestions are made on the combined use of manual analysis and computer analysis

  11. Preliminary Performance Analysis Program Development for Safety System with Safeguard Vessel

    International Nuclear Information System (INIS)

    Kang, Han-Ok; Lee, Jun; Park, Cheon-Tae; Yoon, Ju-Hyeon; Park, Keun-Bae

    2007-01-01

    SMART is an advanced modular integral type pressurized water reactor for a seawater desalination and an electricity production. Major components of the reactor coolant system such as the pressurizer, Reactor Coolant Pump (RCP), and steam generators are located inside the reactor vessel. The SMART can fundamentally eliminate the possibility of large break loss of coolant accidents (LBLOCAs), improve the natural circulation capability, and better accommodate and thus enhance a resistance to a wide range of transients and accidents. The safety goals of the SMART are enhanced through highly reliable safety systems such as the passive residual heat removal system (PRHRS) and the safeguard vessel coupled with the passive safety injection feature. The safeguard vessel is a steel-made, leak-tight pressure vessel housing the RPV, SIT, and the associated valves and pipelines. A primary function of the safeguard vessel is to confine any radioactive release from the primary circuit within the vessel under DBAs related to loss of the integrity of the primary system. A preliminary performance analysis program for a safety system using the safeguard vessel is developed in this study. The developed program is composed of several subroutines for the reactor coolant system, passive safety injection system, safeguard vessel including the pressure suppression pool, and PRHRS. A small break loss of coolant accident at the upper part of a reactor is analyzed and the results are discussed

  12. Resources available for applying metrics in security and safety programming.

    Science.gov (United States)

    Luizzo, Anthony

    2016-01-01

    Incorporating metrics into security surveys has been championed as a better way of substantiating program-related effectiveness and expenditures. Although security surveys have been aroundfor well over 40 years, rarely, if ever, have metric-related strategies been part of the equation, the author says. In this article, he cites several published articles and research findings available to security professionals and their surveyors that may give them the expertise and confidence they need to make use of this valuable tool.

  13. Department of Energy security program needs effective information systems

    International Nuclear Information System (INIS)

    1991-10-01

    Although security is an important, nearly billion-dollar-a-year function in the Department of Energy (DOE), key information systems that hold important data about security weaknesses and incidents have limited analytical capabilities and contain unreliable information. The resultant difficulty in identifying patterns and trends reduces managers' ability to ensure the effectiveness of the security program. Resources are also wasted because DOE has deployed incompatible systems that are unable to electronically share or transfer data, often forcing employees to manually re-enter data that are already stored in computers elsewhere. Finally, continuing data problems with other important security information systems, such as those used to track security clearances and classified documents, indicate that information system deficiencies are extensive. A major reason for these problems is that DOE has not done a comprehensive, strategic assessment of its information and information technology needs of the security program. DOE's efforts are fragmented because it has not assigned to any organization the leadership responsibility to determine security information needs and to plan and manage security information resources Department-wide. This paper reports that a number of changes are needed to correct these problems and take advantage of information technology to help strengthen the security program

  14. Dynamic Positioning Capability Analysis for Marine Vessels Based on A DPCap Polar Plot Program

    Science.gov (United States)

    Wang, Lei; Yang, Jian-min; Xu, Sheng-wen

    2018-03-01

    Dynamic positioning capability (DPCap) analysis is essential in the selection of thrusters, in their configuration, and during preliminary investigation of the positioning ability of a newly designed vessel dynamic positioning system. DPCap analysis can help determine the maximum environmental forces, in which the DP system can counteract in given headings. The accuracy of the DPCap analysis is determined by the precise estimation of the environmental forces as well as the effectiveness of the thrust allocation logic. This paper is dedicated to developing an effective and efficient software program for the DPCap analysis for marine vessels. Estimation of the environmental forces can be obtained by model tests, hydrodynamic computation and empirical formulas. A quadratic programming method is adopted to allocate the total thrust on every thruster of the vessel. A detailed description of the thrust allocation logic of the software program is given. The effectiveness of the new program DPCap Polar Plot (DPCPP) was validated by a DPCap analysis for a supply vessel. The present study indicates that the developed program can be used in the DPCap analysis for marine vessels. Moreover, DPCap analysis considering the thruster failure mode might give guidance to the designers of vessels whose thrusters need to be safer.

  15. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    Keywords: static security, gene expression programming, probabilistic neural network ... Hence digital computers are usually installed in operations control centers to gather ...... power system protection, and applications of AI in power systems.

  16. 33 CFR 165.114 - Safety and Security Zones: Escorted Vessels-Boston Harbor, Massachusetts.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Safety and Security Zones... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY REGULATED NAVIGATION... Guard District § 165.114 Safety and Security Zones: Escorted Vessels—Boston Harbor, Massachusetts. (a...

  17. "Business Continuity and Information Security Maintenance" Masters’ Training Program

    OpenAIRE

    Miloslavskaya , Natalia; Senatorov , Mikhail; Tolstoy , Alexandr; Zapechnikov , Sergei

    2013-01-01

    Part 1: WISE 8; International audience; The experience of preparing for the "Business Continuity and Information Security Maintenance" (BC&ISM) Masters’ program implementation and realization at the "Information Security of Banking Systems" Department of the National Research Nuclear University MEPhI (NRNU MEPhI, Moscow, Russia) is presented. Justification of the educational direction choice for BC&ISM professionals is given. The model of IS Master being trained on this program is described. ...

  18. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  19. Nevada National Security Site Radiation Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Managers' Council, Radiological Control

    2018-03-12

    This is a shared document required by 10 CFR 835 for all contractors conducting radiological work at the Nevada National Security Site. Please record the Author as "Radiological Control Managers' Council" for consistency with previous RPPs and Rad Con Manuals.

  20. Speeding decisions. Social security's information exchange program.

    Science.gov (United States)

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  1. Vessel head penetrations: French approach for maintenance in the PLIM program

    International Nuclear Information System (INIS)

    Champigny, F.

    2002-01-01

    Full text: In 1991, in the Bugey nuclear power plant, for the first time a leak occurred at the level of a vessel head penetration made with base nickel alloy (Inconel 600). This leak was caused by a primary stress corrosion cracking coming from inside the penetration tube. The crack was trough wall extent and primary fluid went out from the top of the vessel head. Immediately, Electricite de France launched important research programs and expertise in order to understand the root causes and propose solutions to this problem. The root causes confirmed PWSCC, and in the same time solutions for repair were studied and an inspection program was established to check the base metal of other vessel head penetrations. After several tests, repair solutions were abandoned because of their high costs (financial and dosimetry). EDF decided to replace all the vessel heads with Inconel 600 penetrations. Non destructive developments leaded to use eddy currents for detection and characterization but also televisual techniques to confirm. In a second step, in order to inspect without removing the inside thermal sleeve, eddy current and ultrasonic sword probes were achieved and used to inspect all vessel heads penetrations. Up to now, 75% of the vessel head have been replaced on the 900 MW and 1300 MW fleets but to replace wisely the last vessel heads EDF continues to perform NDE of the penetrations on the basis of safety criteria. This paper describes the different steps of the applied policy in France, NDE methods, criteria and the results obtained. (author)

  2. Methodological efficiency of reactor pressure vessel control samples programs and reliability of WWER vessels at the Ukraine NPP

    International Nuclear Information System (INIS)

    Kovbasenko, S.N.; Brednev, V.I.; Zinchenko, O.Ya.

    2000-01-01

    An analysis is made for the programs with the use of check specimens (CS) for reactor vessel (RV) control which is considered as the only method for estimating embrittlement in RV material and its operational capability. Advantages and disadvantages of the programs are noted. Other methods are developed and improved to estimate properties of RV metal and welded joints. It is shown that the most valid information about RV metal state can be obtained only by testing specimens prepared from templets cut directly from a RV wall in the region of reactor core. Ukrainian researchers designed the equipment and performed successful tests on templet cutting from the surface of the metal to study mechanical properties of critical pipelines [ru

  3. Leveraging Safety Programs to Improve and Support Security Programs

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Snell, Mark K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pratt, R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandoval, S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-10-01

    There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.

  4. Improved fireman's compressed air breathing system pressure vessel development program

    Science.gov (United States)

    King, H. A.; Morris, E. E.

    1973-01-01

    Prototype high pressure glass filament-wound, aluminum-lined pressurant vessels suitable for use in a fireman's compressed air breathing system were designed, fabricated, and acceptance tested in order to demonstrate the feasibility of producing such high performance, lightweight units. The 4000 psi tanks have a 60 standard cubic foot (SCF) air capacity, and have a 6.5 inch diamter, 19 inch length, 415 inch volume, weigh 13 pounds when empty, and contain 33 percent more air than the current 45 SCF (2250 psi) steel units. The current steel 60 SCF (3000 psi) tanks weigh approximately twice as much as the prototype when empty, and are 2 inches, or 10 percent shorter. The prototype units also have non-rusting aluminum interiors, which removes the hazard of corrosion, the need for internal coatings, and the possibility of rust particles clogging the breathing system.

  5. Standard Practice for Design of Surveillance Programs for Light-Water Moderated Nuclear Power Reactor Vessels

    CERN Document Server

    American Society for Testing and Materials. Philadelphia

    2010-01-01

    1.1 This practice covers procedures for designing a surveillance program for monitoring the radiation-induced changes in the mechanical properties of ferritic materials in light-water moderated nuclear power reactor vessels. This practice includes the minimum requirements for the design of a surveillance program, selection of vessel material to be included, and the initial schedule for evaluation of materials. 1.2 This practice was developed for all light-water moderated nuclear power reactor vessels for which the predicted maximum fast neutron fluence (E > 1 MeV) at the end of license (EOL) exceeds 1 × 1021 neutrons/m2 (1 × 1017 n/cm2) at the inside surface of the reactor vessel. 1.3 This practice applies only to the planning and design of surveillance programs for reactor vessels designed and built after the effective date of this practice. Previous versions of Practice E185 apply to earlier reactor vessels. 1.4 This practice does not provide specific procedures for monitoring the radiation induced cha...

  6. The DOE safeguards and security technology development program

    International Nuclear Information System (INIS)

    Cherry, R.C.; Wheelock, A.J.

    1991-01-01

    This paper reports that strategic planning for safeguards and security within the Department of Energy emphasizes the contributions of advanced technologies to the achievement of Departmental protection program goals. The Safeguards and Security Technology Development Program provides state-of-the-art technologies, systems and technical services in support of the policies and programmatic requirements for the protection of Departmental assets. The Program encompasses research and development in physical security, nuclear material control and accountability, information security and personnel security, and the integration of these disciplines in advanced applications. Technology development tasks serve goals that range from the maintenance of an effective technology base to the development, testing and evaluation of applications to meet field needs. A variety of factors, from the evolving threat to reconfiguration of the DOE complex and the technical requirements of new facilities, are expected to influence safeguards and security technology requirements and development efforts. Implementation of the Program is based on the systematic identification, prioritization and alignment of technology development tasks and needs. Initiatives currently underway are aimed at enhancing technology development project management. Increased management attention is also being placed on efforts to promote the benefits of the Program through technology transfer and interagency liaison

  7. The Planning, Licensing, Modifications, and Use of a Russian Vessel for Shipping Spent Nuclear Fuel by Sea in Support of the DOE RRRFR Program

    International Nuclear Information System (INIS)

    Tyacke, Michael; Bolshinsky, Igor; Tomczak, Wlodzimierz; Naletov, Sergey; Pichugin, Oleg

    2001-01-01

    The Russian Research Reactor Fuel Return (RRRFR) Program, under the U.S. Department of Energy's Global Threat Reduction Initiative, began returning Russian-supplied high-enriched uranium (HEU) spent nuclear fuel (SNF), stored at Russian-designed research reactors throughout the world, to Russia in January 2006. During the first years of making HEU SNF shipments, it became clear that the modes of transportation needed to be expanded from highway and railroad to include sea and air to meet the extremely aggressive commitment of completing the first series of shipments by the end of 2010. The first shipment using sea transport was made in October 2008 and used a non-Russian flagged vessel. The Russian government reluctantly allowed a one-time use of the foreign-owned vessel into their highly secured seaport, with the understanding that any future shipments would be made using a vessel owned and operated by a Russian company. ASPOL-Baltic of St. Petersburg, Russia, owns and operates a small fleet of vessels and has a history of shipping nuclear materials. ASPOL-Baltic's vessels were licensed for shipping nuclear materials; however, they were not licensed to transport SNF materials. After a thorough review of ASPOL Baltic's capabilities and detailed negotiations, it was agreed that a contract would be let with ASPOL-Baltic to license and refit their MCL Trader vessel for hauling SNF in support of the RRRFR Program. This effort was funded through a contract between the RRRFR Program, Idaho National Laboratory, and Radioactive Waste Management Plant of Swierk, Poland. This paper discusses planning, Russian and international maritime regulations and requirements, Russian authorities reviews and approvals, licensing, design, and modifications made to the vessel in preparation for SNF shipments. A brief summary of actual shipments using this vessel, experiences, and lessons learned also are described.

  8. The Planning, Licensing, Modifications, and Use of a Russian Vessel for Shipping Spent Nuclear Fuel by Sea in Support of the DOE RRRFR Program

    Energy Technology Data Exchange (ETDEWEB)

    Michael Tyacke; Dr. Igor Bolshinsky; Wlodzimierz Tomczak; Sergey Naletov; Oleg Pichugin

    2001-10-01

    The Russian Research Reactor Fuel Return (RRRFR) Program, under the U.S. Department of Energy’s Global Threat Reduction Initiative, began returning Russian-supplied high-enriched uranium (HEU) spent nuclear fuel (SNF), stored at Russian-designed research reactors throughout the world, to Russia in January 2006. During the first years of making HEU SNF shipments, it became clear that the modes of transportation needed to be expanded from highway and railroad to include sea and air to meet the extremely aggressive commitment of completing the first series of shipments by the end of 2010. The first shipment using sea transport was made in October 2008 and used a non-Russian flagged vessel. The Russian government reluctantly allowed a one-time use of the foreign-owned vessel into their highly secured seaport, with the understanding that any future shipments would be made using a vessel owned and operated by a Russian company. ASPOL-Baltic of St. Petersburg, Russia, owns and operates a small fleet of vessels and has a history of shipping nuclear materials. ASPOL-Baltic’s vessels were licensed for shipping nuclear materials; however, they were not licensed to transport SNF materials. After a thorough review of ASPOL Baltic’s capabilities and detailed negotiations, it was agreed that a contract would be let with ASPOL-Baltic to license and refit their MCL Trader vessel for hauling SNF in support of the RRRFR Program. This effort was funded through a contract between the RRRFR Program, Idaho National Laboratory, and Radioactive Waste Management Plant of Swierk, Poland. This paper discusses planning, Russian and international maritime regulations and requirements, Russian authorities’ reviews and approvals, licensing, design, and modifications made to the vessel in preparation for SNF shipments. A brief summary of actual shipments using this vessel, experiences, and lessons learned also are described.

  9. Hardware-Assisted System for Program Execution Security of SOC

    Directory of Open Access Journals (Sweden)

    Wang Xiang

    2016-01-01

    Full Text Available With the rapid development of embedded systems, the systems’ security has become more and more important. Most embedded systems are at the risk of series of software attacks, such as buffer overflow attack, Trojan virus. In addition, with the rapid growth in the number of embedded systems and wide application, followed embedded hardware attacks are also increasing. This paper presents a new hardware assisted security mechanism to protect the program’s code and data, monitoring its normal execution. The mechanism mainly monitors three types of information: the start/end address of the program of basic blocks; the lightweight hash value in basic blocks and address of the next basic block. These parameters are extracted through additional tools running on PC. The information will be stored in the security module. During normal program execution, the security module is designed to compare the real-time state of program with the information in the security module. If abnormal, it will trigger the appropriate security response, suspend the program and jump to the specified location. The module has been tested and validated on the SOPC with OR1200 processor. The experimental analysis shows that the proposed mechanism can defence a wide range of common software and physical attacks with low performance penalties and minimal overheads.

  10. Development of Ultrasonic Visual Inspection Program for In-Vessel Structures of SFR

    International Nuclear Information System (INIS)

    Joo, Y. S.; Park, C. G.; Lee, J. H.

    2009-02-01

    As the liquid sodium of a sodium-cooled fast reactor (SFR) is opaque to light, a conventional visual inspection is unavailable for the evaluation of the in-vessel structures under a sodium level. ASME Section XI Division 3 provides rules and guidelines for an in-service inspection (ISI) and testing of the components of SFR. For the ISI of in-vessel structures, the ASME code specifies visual examinations. An ultrasonic wave should be applied for an under-sodium visual inspection of the in-vessel structures. The plate-type waveguide sensor has been developed and the feasibility of the waveguide sensor technique has been successfully demonstrated for an ultrasonic visual inspection of the in-vessel structures of SFR. In this study, the C-scan image mapping program (Under-Sodium MultiView) is developed to apply this waveguide sensor technology to an under-sodium visual inspection of in-vessel structures in SFR by using a LabVIEW graphical programming language. The Under-Sodium MultiVIEW program has the functions of a double rotating scanner motion control, a high power pulser receiver control, a image mapping and a signal processing. The performance of Under-Sodium MultiVIEW program was verified by a C-scanning test

  11. In-service inspection program for the NCS-80 reactor pressure vessel

    International Nuclear Information System (INIS)

    Scharge, J.; Wehowsky, P.; Zeibig, H.

    1978-01-01

    The in-service inspection program of reactor pressure vessels is mainly based on the ultra-sonic method, visual checking of inner and outer surfaces as well as pressure and leak tests. The test procedure require a design of the pressure vessel suitable for the test methods and the possibility to remove the pressure vessel internals. For the outside inspection a gap of sufficient width is mandatory. The present status of the ultra-sonic method and of the inner and outer manipulators affords to conduct the in-service inspection program in form of automatic checkings. The in-service inspection program for NCS-80, the Nuclear Container-Ship design of 80,000 shp, is integrated in the refueling periods due to the request for a high availability of the ship and reactor plant

  12. R and D Developments. Research Programs on Irradiation Embrittlement of Reactor Vessel Steels

    International Nuclear Information System (INIS)

    Gomez Briceno, D.; Lapena, J.; Serrano, M.; Perosanz, F.

    2000-01-01

    Irradiation embrittlement of pressure vessel steels is a degradation mechanism time dependent that can lead to operational restrictions with adverse effects in the efficiency and life of a plant. For the last year, several research programs have been devoted to study thye evaluation of neutronic radiation effect on mechanical properties of pressure vessel steels. However, at the present, there is a growing interest on the development of new methodologies to optimize the surveillance program information, and the understanding of the irradiation damage mechanism. This paper give an overview of international research programs, and on the R+D activities carried out by the Structural Materials Project on irradiation embrittlement on pressure vessel steels. (Author)

  13. Ensuring Secure Non-interference of Programs by Game Semantics

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    Non-interference is a security property which states that improper information leakages due to direct and indirect flows have not occurred through executing programs. In this paper we investigate a game semantics based formulation of non-interference that allows to perform a security analysis...... of closed and open procedural programs. We show that such formulation is amenable to automated verification techniques. The practicality of this method is illustrated by several examples, which also emphasize its advantage compared to known operational methods for reasoning about open programs....

  14. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  15. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  16. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  17. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  18. Creation of security engineering programs by the Southwest Surety Institute

    Science.gov (United States)

    Romero, Van D.; Rogers, Bradley; Winfree, Tim; Walsh, Dan; Garcia, Mary Lynn

    1998-12-01

    The Southwest Surety Institute includes Arizona State University (ASU), Louisiana State University (LSU), New Mexico Institute of Mining and Technology (NM Tech), New Mexico State University (NMSU), and Sandia National Laboratories (SNL). The universities currently offer a full spectrum of post-secondary programs in security system design and evaluation, including an undergraduate minor, a graduate program, and continuing education programs. The programs are based on the methodology developed at Sandia National Laboratories over the past 25 years to protect critical nuclear assets. The programs combine basic concepts and principles from business, criminal justice, and technology to create an integrated performance-based approach to security system design and analysis. Existing university capabilities in criminal justice (NMSU), explosives testing and technology (NM Tech and LSU), and engineering technology (ASU) are leveraged to provide unique science-based programs that will emphasize the use of performance measures and computer analysis tools to prove the effectiveness of proposed systems in the design phase. Facility managers may then balance increased protection against the cost of implementation and risk mitigation, thereby enabling effective business decisions. Applications expected to benefit from these programs include corrections, law enforcement, counter-terrorism, critical infrastructure protection, financial and medical care fraud, industrial security, and border security.

  19. 76 FR 30374 - Cruise Vessel Safety and Security Act of 2010, Available Technology

    Science.gov (United States)

    2011-05-25

    ... http://www.regulations.gov on or before July 25, 2011 or reach the Docket Management Facility by that... that occur on the vessel, and provide law enforcement officials in the course and scope of an... industry best practices for placement and retention of video recording devices exist? If yes, please...

  20. A Domain-Specific Programming Language for Secure Multiparty Computation

    DEFF Research Database (Denmark)

    Nielsen, Janus Dam; Schwartzbach, Michael Ignatieff

    2007-01-01

    We present a domain-specific programming language for Secure Multiparty Computation (SMC). Information is a resource of vital importance and considerable economic value to individuals, public administration, and private companies. This means that the confidentiality of information is crucial...... on secret values and results are only revealed according to specific protocols. We identify the key linguistic concepts of SMC and bridge the gap between high-level security requirements and low-level cryptographic operations constituting an SMC platform, thus improving the efficiency and security of SMC...

  1. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    Science.gov (United States)

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  2. A flexible framework for secure and efficient program obfuscation.

    Energy Technology Data Exchange (ETDEWEB)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  3. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    Science.gov (United States)

    2015-12-01

    two decades have demonstrated that attacks of this type are indeed possible, and that current security measures may not be sufficient to mitigate such...attack by small surface crafts. The past two decades have demonstrated that attacks of this type are indeed possible, and that current security measures ...xiii LIST OF ACRONYMS AND ABBREVIATIONS ADAPT AP ARA AT/FP COTS DARPA DOD DODINST EF-21 GPS GUI IEEE ISR LCS LiDAR LTE MAC MAGTF

  4. Language Issues in Mobile Program Security

    Science.gov (United States)

    1998-01-01

    primitives for instance synchronous operations Nondeterminism and Privacy Now suppose we introduce nondeterminism via a simple concurrent language...code setting is that the only observable events are those that can be observed from within a mobile program using language primitives and any host...Possibilistic NI is given in It uses a main thread and two triggered threads each with a busy wait loop implementing a semaphore to copy every bit of

  5. BLOW.MOD2: program for a vessel depressurization calculation with the contribution of structures

    International Nuclear Information System (INIS)

    Doval, A.

    1990-01-01

    The BLOW.MOD2 program developed to calculate pressure vessels' depressurization is presented, considering heat contribution of the structures. The results are opposite to those obtained from other more complex numerical models, being the comparison extremely satisfactory. BLOW.MOD2 is a software of the 'Systems Sub-Branch', INVAP S.E. (Author) [es

  6. Audit program for physical security systems at nuclear power plants

    International Nuclear Information System (INIS)

    Minichino, C.

    1982-01-01

    Licensees of nuclear power plants conduct audits of their physical security systems to meet the requirements of 10 CFR 73, Physical Protection of Plants and Materials. Section 73.55, Requirements for physical Protection of Licensed Activities in Nuclear Power Reactors Against Radiological Sabotage, requires that the security programs be reviewed at least every 12 months, that the audit be conducted by individuals independent of both security management and security supervision, and that the audit program review all aspects of the physical security system: hardware, personnel, and operational and maintenance procedures. This report contains information for the Nuclear Regulatory Commission (NRC) and for the licensees of nuclear power reactors who carry out these comprehensive audits. Guidance on the overall management of the audit function includes organizational structure and issues concerning the auditors who perform the review: qualifications, independence, due professional care, and standards. Guidance in the audit program includes purpose and scope of the audit, planning, techniques, post-audit procedures, reporting, and follow-up

  7. Security Measures in Automated Assessment System for Programming Courses

    Directory of Open Access Journals (Sweden)

    Jana Šťastná

    2015-12-01

    Full Text Available A desirable characteristic of programming code assessment is to provide the learner the most appropriate information regarding the code functionality as well as a chance to improve. This can be hardly achieved in case the number of learners is high (500 or more. In this paper we address the problem of risky code testing and availability of an assessment platform Arena, dealing with potential security risks when providing an automated assessment for a large set of source code. Looking at students’ programs as if they were potentially malicious inspired us to investigate separated execution environments, used by security experts for secure software analysis. The results also show that availability issues of our assessment platform can be conveniently resolved with task queues. A special attention is paid to Docker, a virtual container ensuring no risky code can affect the assessment system security. The assessment platform Arena enables to regularly, effectively and securely assess students' source code in various programming courses. In addition to that it is a motivating factor and helps students to engage in the educational process.

  8. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  9. Nuclear regulation. NRC's security clearance program can be strengthened

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Kruslicky, Mary Ann; Bagnulo, John E.

    1988-12-01

    Because of the national security implications of its programs, the Nuclear Regulatory Commission (NRC) investigates the background of its employees and consultants as well as others to ensure that they are reliable and trustworthy. If the investigation indicates that an employee will not endanger national security, NRC grants a security clearance that allows access to classified information, material, and facilities. NRC also requires periodic checks for some clearance holders to ensure their continued clearance eligibility. The Chairman, Subcommittee on Environment, Energy, and Natural Resources, House Committee on Government Operations, asked GAO to review NRC's personnel security clearance program and assess the procedures that NRC uses to ensure that those who operate nuclear power plants do not pose a threat to the public. The Atomic Energy Act of 1954 requires NRC to conduct background investigations of its employees and consultants as well as others who have access to classified information, material, or facilities. To do this, NRC established a personnel security clearance program. Under NRC policies, a security clearance is granted after the Office of Personnel Management (OPM) or the Federal Bureau of Investigation checks the background of those applying for an NRC clearance. NRC also periodically reassesses the integrity of those holding the highest level clearance. NRC employees, consultants, contractors, and licensees as well as other federal employees hold approximately 10,600 NRC clearances. NRC does not grant clearances to commercial nuclear utility employees unless they require access to classified information or special nuclear material. However, the utilities have voluntarily established screening programs to ensure that their employees do not pose a threat to nuclear plants. NRC faces a dilemma when it hires new employees. Although its policy calls for new hires to be cleared before they start work, the security clearance process takes so long

  10. Nuclear security. DOE actions to improve the personnel clearance program

    International Nuclear Information System (INIS)

    Fultz, Keith O.; Bannerman, Carl J.; Daniel, Beverly A.

    1988-11-01

    The status of the Department of Energy's (DOE) implementation of recommendations in our two reports on DOE's personnel security clearance program was determined. The recommendations were aimed at improving the timeliness, accuracy, and efficiency of personnel security clearance decisions. Specifically, the objective was to determine and report on steps DOE is taking to implement these recommendations. In summary, it was found that DOE has either initiated action or is studying ways to address all the recommendations, but none of the recommendations have been completely implemented. The effectiveness of the DOE actions will depend, in part, on the adequacy of its internal control system for overseeing and evaluating program operations. DOE's personnel security clearance program is intended to provide reasonable assurance that personnel with access to classified information and materials are trustworthy. The Department requests that the Office of Personnel Management or the Federal Bureau of Investigation collect personal data on each person who requires such access to do his or her job. Based on these background investigations, DOE officials authorize individuals whose personal histories indicate that they are trustworthy to have access to classified information, secured facilities, and controlled materials as needed to perform their jobs. DOE has five types of these authorizations or personnel security clearances and must update information on personnel holding each type at 5-year intervals to confirm their continuing reliability. The five types are based on the types of security interests to which the person needs access, e.g., persons needing nuclear weapons-related data must have a Q clearance, and persons with a top secret clearance can have access to national security data classified as top secret

  11. Building effective cybersecurity programs a security manager's handbook

    CERN Document Server

    Schreider, Tari

    2017-01-01

    You know by now that your company could not survive without the Internet. Not in today's market. You are either part of the digital economy or reliant upon it. With critical information assets at risk, your company requires a state-of-the-art cybersecurity program. But how do you achieve the best possible program? Tari Schreider, in Building Effective Cybersecurity Programs: A Security Manager's Handbook, lays out the step-by-step roadmap to follow as you build or enhance your cybersecurity program.

  12. 76 FR 44880 - Security Zone; Escorted Vessels in Captain of the Port Ohio Valley Zone

    Science.gov (United States)

    2011-07-27

    ... potential terrorist acts and would enhance public and maritime safety and security. DATES: Comments and... coast of Yemen and the prior attack on the USS COLE demonstrate the maritime terrorism threat. These attacks manifest a continuing threat to U.S. maritime assets as described in the President's finding in...

  13. 32 CFR 2004.20 - National Industrial Security Program Operating Manual (NISPOM) [201(a)].

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false National Industrial Security Program Operating... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1 Operations § 2004.20 National Industrial Security Program...

  14. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-07-09

    ... Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for a meeting of the National Industrial Security Program Policy Advisory Committee. The meeting will be held to discuss National Industrial Security Program policy matters. DATES: The meeting...

  15. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  16. An Undergraduate Information Security Program: More than a Curriculum

    Science.gov (United States)

    Woodward, Belle; Imboden, Thomas; Martin, Nancy L.

    2013-01-01

    This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…

  17. 48 CFR 2804.470 - Contractor Personnel Security Program.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Contractor Personnel Security Program. 2804.470 Section 2804.470 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE General ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 2804.470 Contractor...

  18. 15 CFR 2008.16 - Security education program.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16 Section 2008.16 Commerce and Foreign Trade Regulations Relating to Foreign Trade Agreements OFFICE OF THE UNITED STATES TRADE REPRESENTATIVE REGULATIONS TO IMPLEMENT E.O. 12065; OFFICE OF THE UNITED STATES TRADE...

  19. Supporting secure programming in web applications through interactive static analysis

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  20. Supporting secure programming in web applications through interactive static analysis

    Directory of Open Access Journals (Sweden)

    Jun Zhu

    2014-07-01

    Full Text Available Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  1. Supporting secure programming in web applications through interactive static analysis.

    Science.gov (United States)

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  2. DOD/COCOM Water Security Program Strategy Document

    Science.gov (United States)

    2011-04-22

    treatment and disposal. DOD/COCOM Water Security Program Strategy 22 18. Toxic Minerals In regions where there are naturally occurring unsafe...surface hydrologic observations using remote sensing to provide data on precipitation, radiation, temperature, soil moisture, groundwater, snowcover...habitat alteration and aquaculture . 13. Centers for Disease Control (CDC) Works with partners throughout the nation and the world to monitor health

  3. Carboy Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors

  4. Cyber Security Testing and Training Programs for Industrial Control Systems

    International Nuclear Information System (INIS)

    Noyes, Daniel

    2012-01-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  5. Cyber Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  6. State of the reactor vessel surveillance programs in Korea and foreign countries

    International Nuclear Information System (INIS)

    Kim, Jeong Kyu; Hwang, Jong Keun; Park, Keon Woo; Kim, Bum Sik; Jeong, Kyung Hoon

    1996-06-01

    ASTM standards are dominating all over the world in the field of the reactor vessel surveillance program. They are mainly used directly or that the national standards in use correspond quite well with ASTM. According to, however, increasing concerns about the protection of environment and safety of nuclear plant, various approaches to establish and reinforce the national standards are made actively in Europe. In addition, some methods to share the nuclear data by integrating the existing test, analysis procedures and units system are considered. For nuclear plants in Korea, MOST Notice No. 92-20 should be applied for all PWRs after UCN units 3 and 4 since it was promulgated at Dec. 1992. The notice almost reflects the contents of ASTM E 185. But, the notice has much to be desired to provide the technical back-ground for reactor vessel surveillance program because it is not a standard such as ASTM or ASME code but regulation such as CFR or RG. Several Korean Standards are also used in limited area of the surveillance program. Therefore, practical requirements and rules for surveillance program are in accordance with the ASTM and CFR. In this report, the state of application of the standards to the surveillance program in Korea and Europe are reviewed and their national standards re compared with US standards or regulations. Current level and the future prospect of surveillance technology for PWR vessel are discussed at this point of view. 15 tabs., 12 figs., 38 refs. (Author)

  7. 75 FR 82037 - National Protection and Programs Directorate; President's National Security Telecommunications...

    Science.gov (United States)

    2010-12-29

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0050] National Protection and Programs Directorate; President's National Security Telecommunications Advisory Committee AGENCY: National Protection... Committee Meeting. SUMMARY: The President's National Security Telecommunications Advisory Committee (NSTAC...

  8. From Deck Hand to Program Manager - 30 years with Research Vessels

    Science.gov (United States)

    Prince, J. M.

    2012-12-01

    Starting in 1980 as a Mate and Deck Hand and working my way up to Captain, Marine Superintendent, UNOLS Executive Secretary and now as an ONR Research Facilities Program Manager focused on the acquisition of two new Ocean Class Research Vessels, I have witnessed first hand the evolution of the U.S. Academic Research Fleet. The author will focus on a few key events in the evolution of the modern research fleet. As a deck hand, mate and Captain, I was involved in an early multi-disciplinary effort often using two ships working together to conduct sampling and analysis in Physical, Chemical and Biological oceanography. The VERTEX cruises led by John Martin and others used the R/V CAYUSE and R/V WECOMA extensively through out the NE Pacific Ocean conducting research that led to Dr. Martin's Iron Hypothesis. This work and that of others involving trace metal clean sampling and clean laboratories on board our ships pushed many new and demanding requirements for future vessels. As a ship scheduler and as chair of the Research Vessel Operators Committee (RVOC) I saw the increasing use of Remotely Operated Vehicles to complement the work being done with the ALVIN and other occupied submersibles. This led to scheduling challenges and changes to our safety standards, but also to many new opportunities for discoveries on the many mid-ocean ridges and hydro-thermal vent fields. More recently, Autonomous Underwater Vehicles (AUV) and Unmanned Aerial Vehicles (UAV) and aircraft have been used simultaneously with research vessels such as during a multi-PI, multi-ship program in the Monterey Bay. Communications at sea have changed dramatically in the past thirty years. No longer are we limited to reading the data from a spreadsheet over a Single Side Band radio so that the PI ashore can track the progress of a cruise and provide guidance for the next day's sampling. Full bandwidth communications are becoming the norm with the capability of streaming video from an ROV to shore or to

  9. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, D.

    2005-01-01

    Full text: In support of United States Government (USG) and International Atomic Energy Agency (IAEA) nuclear security programs, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been developed and implemented as the basis for a performance-based methodology for the design and evaluation of physical protection systems against a design basis threat (DBT) for theft and sabotage of nuclear and/or radiological materials. Integrated systems must include technology, people, and the man-machine interface. A critical aspect of the human element is training on the systems-approach for all the stakeholders in nuclear security. Current training courses and workshops have been very beneficial but are still rather limited in scope. SNL has developed two primary international classes - the international training course on the physical protection of nuclear facilities and materials, and the design basis threat methodology workshop. SNL is also completing the development of three new courses that will be offered and presented in the near term. They are vital area identification methodology focused on nuclear power plants to aid in their protection against radiological sabotage, insider threat analysis methodology and protection schemes, and security foundations for competent authority and facility operator stakeholders who are not security professionals. In the long term, we envision a comprehensive nuclear security curriculum that spans policy and technology, regulators and operators, introductory and expert levels, classroom and laboratory/field, and local and offsite training options. This training curriculum will be developed in concert with a nuclear security series of guidance documents that is expected to be forthcoming from the IAEA. It is important to note that while appropriate implementation of systems based on such training and documentation can improve the risk reduction, such a

  10. Application of advanced irradiation analysis methods to light water reactor pressure vessel test and surveillance programs

    International Nuclear Information System (INIS)

    Odette, R.; Dudey, N.; McElroy, W.; Wullaert, R.; Fabry, A.

    1977-01-01

    Inaccurate characterization and inappropriate application of neutron irradiation exposure variables contribute a substantial amount of uncertainty to embrittlement analysis of light water reactor pressure vessels. Damage analysis involves characterization of the irradiation environment (dosimetry), correlation of test and surveillance metallurgical and dosimetry data, and projection of such data to service conditions. Errors in available test and surveillance dosimetry data are estimated to contribute a factor of approximately 2 to the data scatter. Non-physical (empirical) correlation procedures and the need to extrapolate to the vessel may add further error. Substantial reductions in these uncertainties in future programs can be obtained from a more complete application of available damage analysis tools which have been developed for the fast reactor program. An approach to reducing embrittlement analysis errors is described, and specific examples of potential applications are given. The approach is based on damage analysis techniques validated and calibrated in benchmark environments

  11. A Constraint Programming Model for Fast Optimal Stowage of Container Vessel Bays

    DEFF Research Database (Denmark)

    Delgado-Ortegon, Alberto; Jensen, Rune Møller; Janstrup, Kira

    2012-01-01

    Container vessel stowage planning is a hard combinatorial optimization problem with both high economic and environmental impact. We have developed an approach that often is able to generate near-optimal plans for large container vessels within a few minutes. It decomposes the problem into a master...... planning phase that distributes the containers to bay sections and a slot planning phase that assigns containers of each bay section to slots. In this paper, we focus on the slot planning phase of this approach and present a constraint programming and integer programming model for stowing a set...... of containers in a single bay section. This so-called slot planning problem is NP-hard and often involves stowing several hundred containers. Using state-of-the-art constraint solvers and modeling techniques, however, we were able to solve 90% of 236 real instances from our industrial collaborator to optimality...

  12. 75 FR 75486 - Maritime Security Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk...

    Science.gov (United States)

    2010-12-03

    ... Directive 104-6 (Rev. 4); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... Maritime Transportation Security Act (MTSA) on international voyages through or in designated high risk... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  13. Evaluation Report on The Department's Unclassified Cyber Security Program - 2009

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter

  14. No nation is home alone: understanding the international dimension of homeland security through global transportation security programs

    OpenAIRE

    Tarpey, Dominique

    2016-01-01

    Approved for public release; distribution is unlimited Terrorist actors focus on the global transportation system to introduce threats and target attacks. As the lead department for securing the transportation system into the United States, the Department of Homeland Security (DHS) works both domestically and internationally to implement programs and foreign assistance activities to secure the global transportation network. This thesis examines DHS’ international role by analyzing programs...

  15. LANL Safeguards and Security Assurance Program. Revision 6

    International Nuclear Information System (INIS)

    1995-01-01

    The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impacts on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms

  16. Carboy Security Testing and Training Programs for Industrial Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Noyes, Daniel [Idaho National Laboratory, Idaho (United States)

    2012-03-15

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall security posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These training vary from web-based cyber security training for control systems engineers to more advanced hands-on training that culminates with a Red Team/Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.

  17. Human resource development program for nuclear safety and security in Tokyo Institute of Technology

    International Nuclear Information System (INIS)

    Han, Chi Young; Sagara, Hiroshi; Nagasaka, Hideo

    2014-01-01

    The Academy for Global Nuclear Safety and Security Agent was established at Tokyo Institute of Technology in 2011, to develop global nuclear human resources in the field of 3S (Safety, Security, and Safeguards) as a Program for Leading Graduate Schools supported by MEXT (Ministry of Education, Culture, Sports, Science and Technology). New courses of nuclear safety and security were developed in addition to the existing nuclear engineering program; 1) Environmental Dynamics of Radioactive Nuclides; Numerical simulation of the environmental dispersion of radioactive materials released from hypothetical nuclear accidents and evaluation of the public exposure are performed, by using a computer-based emergency response system, to have students predict the environmental dispersion of radionuclides and radiological consequence by nuclear accidents. 2) Measurement of Environmental Radiation; Students acquire hands-on experiences measuring environmental radiation contamination caused by the nuclear accident in Fukushima with multiple types of radiation detectors. Environmental samples are collected and analyzed for isotope identification and its spatial distribution. 3) Simulation of Severe Nuclear Accidents; The evaluation results of Fukushima accident progression are discussed as well as typical sever accidents that threaten the integrity of reactor vessel. Students simulate BWR (Boiling Water Cooled Reactor) transients, design basis accidents, and severe accidents by using simulators. 4) Nuclear Security Training; Design of physical protection systems, its fundamental physics, and regulatory frameworks are covered and students gain the practical experiences by use of intrusion detection systems at JAEA (Japan Atomic Energy Agency), and by numerical simulation of hydro-dynamics of structure material and nuclear material criticality at the university. (author)

  18. 78 FR 31955 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2013-05-28

    ... 1974; Department of Homeland Security National Protection and Programs Directorate--001 Arrival and... of records titled Department of Homeland Security/National Protection and Programs Directorate--001... of 1974, 5 U.S.C. 552a, the Department of Homeland Security (DHS) National Protection and Programs...

  19. Development of a supplemental surveillance program for reactor pressure vessel thermal annealing

    International Nuclear Information System (INIS)

    Server, W.L.; Rosinski, S.T.

    1997-01-01

    The technical decision to thermally anneal a nuclear reactor pressure vessel (RPV) depends upon the level of embrittlement in the RPV steels, the amount of recovery of fracture toughness properties expected from the anneal, and the rate of re-embrittlement after the vessel is placed back into service. The recovery of Charpy impact toughness properties after annealing can be estimated initially by using a recovery model developed using experimental measurements of recovery (such as that developed by Eason et al. for U.S. vessel materials). However, actual validation measurements on plant-specific archived vessel materials (hopefully in the existing surveillance program) are needed; otherwise, irradiated surrogate materials, essentially the same as the RPV steels or bounding in expected behavior, must be utilized. The efficient use of any of these materials requires a supplemental surveillance program focused at both recovery and reirradiation embrittlement. Reconstituted Charpy specimens and new surveillance capsules will most likely be needed as part of this supplemental surveillance program. A new version of ASTM E 509 has recently been approved which provides guidance on thermal annealing in general and specifically for the development of an annealing supplemental surveillance program. The post-anneal re-embrittlement properties are crucial for continued plant operation, and the use of a re-embrittlement model, such as the lateral shift approach, may be overly conservative. This paper illustrates the new ASTM E 509 Standard Guide methodology for an annealing supplemental surveillance program. As an example, the proposed program for the Palisades RPV beltline steels is presented which covers the time from annealing to the end of operating license and beyond, if license renewal is pursued. The Palisades nuclear power plant RPV was planned to be annealed in 1998, but that plant is currently being re-evaluated. The proposed anneal was planned to be conducted at a

  20. Security auditing: a prescription for keeping protection programs healthy.

    Science.gov (United States)

    Luizzo, Anthony

    2010-01-01

    The different aspects of security auditing and the role of the security auditor is explained in detail by the author in this primer for security professionals with specific advice on what should be included in a security audit report.

  1. Evaluation of a Secure Laptop-Based Testing Program in an Undergraduate Nursing Program: Students' Perspective.

    Science.gov (United States)

    Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan

    2016-01-01

    Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.

  2. The National Security Education Program and Its Service Requirement: An Exploratory Study of What Areas of Government and for What Duration National Security Education Program Recipients Have Worked

    Science.gov (United States)

    Comp, David J.

    2013-01-01

    The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…

  3. Preliminary irradiation test results from the Yankee Atomic Electric Company reactor vessel test irradiation program

    International Nuclear Information System (INIS)

    Biemiller, E.C.; Fyfitch, Stephen; Campbell, C.A.

    1994-01-01

    The Yankee Atomic Electric Company test irradiation program was implemented to characterize the irradiation response of representative Yankee Rowe reactor vessel beltline plate materials and to remove uncertainties in the analysis of existing irradiation data on the Yankee Rowe reactor vessel steel. Plate materials each containing 0.24 w/o copper, but different nickel contents at 0.63 w/o and 0.19 w/o, were heat treated to simulate the Yankee vessel heat treatment (austenitized at 982 o C (1800 o F)) and to simulate Regulatory Guide 1.99 database materials (austenitized at 871 o C (1600 o F)). These heat treatments produced different microstructures so the effect of microstructure on irradiation damage sensitivity could be tested. Because the nickel content of the test plates varied and the copper level was constant, the effect of nickel on irradiation embrittlement was also tested. Correlation monitor material, HSST-02, was included in the program to benchmark the Ford Nuclear Reactor (University of Michigan Test Reactor) which had never been used before for this type of irradiation program. Materials taken from plate surface locations (versus 1/4 T) were included to test whether or not the improved toughness properties of the plate surface layer, resulting from the rapid quench, are maintained after irradiation. If the improved properties are maintained, pressurized thermal shock calculations could utilize this margin. Finally, for one experiment, irradiations were conducted at two irradiation temperatures (260 o C and 288 o C) to determine the effect of irradiation temperature on embrittlement. (Author)

  4. Fast neutron fluence calculations as support for a BWR pressure vessel and internals surveillance program

    International Nuclear Information System (INIS)

    Lucatero, Marco A.; Palacios-Hernandez, Javier C.; Ortiz-Villafuerte, Javier; Xolocostli-Munguia, J. Vicente; Gomez-Torres, Armando M.

    2010-01-01

    Materials surveillance programs are required to detect and prevent degradation of safety-related structures and components of a nuclear power reactor. In this work, following the directions in the Regulatory Guide 1.190, a calculational methodology is implemented as additional support for a reactor pressure vessel and internals surveillance program for a BWR. The choice of the neutronic methods employed was based on the premise of being able of performing all the expected future survey calculations in relatively short times, but without compromising accuracy. First, a geometrical model of a typical BWR was developed, from the core to the primary containment, including jet pumps and all other structures. The methodology uses the Synthesis Method to compute the three-dimensional neutron flux distribution. In the methodology, the code CORE-MASTER-PRESTO is used as the three-dimensional core simulator; SCALE is used to generate the fine-group flux spectra of the components of the model and also used to generate a 47 energy-groups job cross section library, collapsed from the 199-fine-group master library VITAMIN-B6; ORIGEN2 was used to compute the isotopic densities of uranium and plutonium; and, finally, DORT was used to calculate the two-dimensional and one-dimensional neutron flux distributions required to compute the synthesized three-dimensional neutron flux. Then, the calculation of fast neutron fluence was performed using the effective full power time periods through six operational fuel cycles of two BWR Units and until the 13th cycle for Unit 1. The results showed a maximum relative difference between the calculated-by-synthesis fast neutron fluxes and fluences and those measured by Fe, Cu and Ni dosimeters less than 7%. The dosimeters were originally located adjacent to the pressure vessel wall, as part of the surveillance program. Results from the computations of peak fast fluence on pressure vessel wall and specific weld locations on the core shroud are

  5. Application of a general purpose finite element program system in pressure vessel technology

    International Nuclear Information System (INIS)

    Aamodt, B.; Sandsmark, N.; Medonos, S.

    1977-01-01

    Main advantages of using general purpose finite element program systems in structural analysis are summarized. Several illustrative applications of the program system SESAM-69 to pressure vessel problems are described. The first example is a dynamic analysis of the motor housing of the internal main circulation pump of a BWR nuclear reactor. The next example is a transient heat conduction and stress analysis of deflector of feeding nozzle of PWR nuclear reactor. Then, numerical calculations of stress intensity factors and fatigue crack growth of semi-elliptical surface cracks are discussed. And finally, an elasto-plastic analysis of a thick plate with edge-cracks is considered. It is concluded that due to the fact that general purpose finite element program systems are general and user-orientated, they will gain increasingly higher popularity in the years ahead

  6. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  7. Security Transition Program Office 1994 fiscal year work plan WBS 6.11

    International Nuclear Information System (INIS)

    Brogdon, R.C. Jr.

    1993-10-01

    The Security Transition Program Office (STPO) will change the Hanford Safeguards and Security Protection Program from one that supported the national defense program to one that supports environmental restoration and waste management. A Successful Safeguards and Security Protection Program transition will have an industrial security foundation supplemented to protect material interests and information resources. The transition will change the current approaches to protection philosophy to ones that will provide the Hanford Site with the following: consolidation, reduction, and elimination of safeguards and security interests and targets; greater open Site access; maximum application of technology and automation; interpretation of security policies and procedures in light of the Hanford Site's environmental mission; coexistence with other emergency services; streamlined operations; and protection of employees and the public from health, safety, fire, security, and safeguards risks. This report describes the 1994 program objectives, the technical base, schedule baseline, cost, funding, manpower, and the 1993 program workscope

  8. Report: Fiscal Year 2006 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2006-S-00008, September 25, 2006. Although the Agency has made substantial progress to improve its security program, the OIG identified weaknesses in the Agency’s incident reporting practices.

  9. Report: Fiscal Year 2015 Federal Information Security Modernization Act Report: Status of CSB’s Information Security Program

    Science.gov (United States)

    Report #16-P-0086, January 27, 2016. The effectiveness of the CSB’s information security program is challenged by its lack of personal identity verification cards for logical access, complete system inventory.

  10. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  11. Preliminary irradiation test results from the Yankee Atomic Electric Company reactor vessel test irradiation program

    International Nuclear Information System (INIS)

    Biemiller, E.C.; Fyfitch, S.; Campbell, C.A.

    1993-01-01

    The Yankee Atomic Electric Company test irradiation program was implemented to characterize the irradiation response of representative Yankee Rowe reactor vessel beltline plate materials and to remove uncertainties in the analysis of existing irradiation data on the Yankee Rowe reactor vessel steel. Plate materials each containing 0.24 w/o copper, but different nickel contents at 0.63 w/o and 0.19 w/o, were heat treated to simulate the Yankee vessel heat treatment (austenitized at 1800 deg F) and to simulate Regulatory Guide 1.99 database materials (austenitized at 1600 deg. F). These heat treatments produced different microstructures so the effect of microstructure on irradiation damage sensitivity could be tested. Because the nickel content of the test plates varied and the copper level was constant, the effect of nickel on irradiation embrittlement was also tested. Correlation monitor material, HSST-02, was included in the program to benchmark the Ford Nuclear Reactor (U. of Michigan Test Reactor) which had never been used for this type of irradiation program. Materials taken from plate surface locations (vs. 1/4T) were included to test whether or not the improved toughness properties of the plate surface layer, resulting from the rapid quench, is maintained after irradiation. If the improved properties are maintained, pressurized thermal shock calculations could utilize this margin. Finally, for one experiment, irradiations were conducted at two irradiation temperatures (500 deg. F and 550 deg. F) to determine the effect of irradiation temperature on embrittlement. The preliminary results of the irradiation program show an increase in T 30 shift of 69 deg. F for a decrease in irradiation temperature of 50 deg. F. The results suggest that for nickel bearing steels, the superior toughness of plate surface material is maintained after irradiation and for the copper content tested, nickel had no apparent effect on irradiation response. No apparent microstructure

  12. Heavy section steel technology program technical report No. 38. Fracture toughness characterization of HSST intermediate pressure vessel material

    International Nuclear Information System (INIS)

    Mager, T.R.; Yanichko, S.E.; Singer, L.R.

    1974-12-01

    The primary objective of the Heavy Section Steel Technology (HSST) Program is to develop pertinent fracture technology to demonstrate the structural reliability of present and contemplated water-cooled nuclear reactor pressure vessels. In order to demonstrate the ability to predict failure of large, heavy-walled pressure vessels under service type loading conditions, the fracture toughness properties of the vessel's materials must be characterized. The sampling procedure and test results are presented for vessel material supplied by the Oak Ridge National Laboratory that were used to characterize the fracture toughness of the HSST Intermediate Test Vessels. The metallurgical condition and heat treatment of the test material was representative of the vessel simulated service test condition. Test specimen locations and orientations were selected by the Oak Ridge National Laboratory and are representative of flaw orientations incorporated in the test vessels. The fracture toughness is documented for the materials from each of the eight HSST Intermediate Pressure Vessels tested to date. 7 references. (U.S.)

  13. Development of the Simulation Program for the In-Vessel Fuel Handling System of Double Rotating Plug Type

    International Nuclear Information System (INIS)

    Kim, S. H.; Kim, J. B.

    2011-01-01

    In-vessel fuel handling machines are the main equipment of the in-vessel fuel handling system, which can move the core assembly inside the reactor vessel along with the rotating plug during refueling. The in vessel fuel handling machines for an advanced sodium cooled fast reactor(SFR) demonstration plant are composed of a direct lift machine(DM) and a fixed arm machine(FM). These machines should be able to access all areas above the reactor core by means of the rotating combination of double rotating plugs. Thus, in the in vessel fuel handling system of the double rotating plug type, it is necessary to decide the rotating plug size and evaluate the accessibility of in-vessel fuel handling machines in given core configuration. In this study, the simulation program based on LABVIEW which can effectively perform the arrangement design of the in vessel fuel handling system and simulate the rotating plug motion was developed. Fig. 1 shows the flow chart of the simulation program

  14. Augmenting Space Technology Program Management with Secure Cloud & Mobile Services

    Science.gov (United States)

    Hodson, Robert F.; Munk, Christopher; Helble, Adelle; Press, Martin T.; George, Cory; Johnson, David

    2017-01-01

    The National Aeronautics and Space Administration (NASA) Game Changing Development (GCD) program manages technology projects across all NASA centers and reports to NASA headquarters regularly on progress. Program stakeholders expect an up-to-date, accurate status and often have questions about the program's portfolio that requires a timely response. Historically, reporting, data collection, and analysis were done with manual processes that were inefficient and prone to error. To address these issues, GCD set out to develop a new business automation solution. In doing this, the program wanted to leverage the latest information technology platforms and decided to utilize traditional systems along with new cloud-based web services and gaming technology for a novel and interactive user environment. The team also set out to develop a mobile solution for anytime information access. This paper discusses a solution to these challenging goals and how the GCD team succeeded in developing and deploying such a system. The architecture and approach taken has proven to be effective and robust and can serve as a model for others looking to develop secure interactive mobile business solutions for government or enterprise business automation.

  15. Report: EPA’s National Security Information Program Could Be Improved

    Science.gov (United States)

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  16. The Department of Energy's safeguards and security technology development program

    International Nuclear Information System (INIS)

    Smith, G.D.; Pocratsky, C.A.

    1995-01-01

    The US DOE has had a program that develops technologies to protect sensitive nuclear weapons facilities for more than thirty years. The mission of the program is overwhelmingly diverse, as it must be to protect an array of assets such as nuclear weapons, special nuclear material in various forms, components of nuclear weapons, and classified nuclear weapons design information. Considering that the nuclear weapons complex consists of dozens of facilities that are scattered all over the US, the technology development mission is very challenging. Complicating matters further is the ever uncertain future of the DOE. Some examples of dramatic Departmental mission changes that directly impact their security technology development program are given. A few development efforts are highlighted as examples of efforts currently being sponsored. They are: automated sensor testing devices to help reduce the requirement for personnel to enter vaults containing highly radioactive nuclear materials; a vehicle inspection portal to screen vehicles for hidden passengers, nuclear material, explosives, and other contraband; non-lead and short-range ammunition as an environmentally safe alternative to lead ammunition; a complex-wide visitor access control system to allow all DOE employees to travel to all sites with a commonly recognized credential; automated nuclear material monitoring technologies to provide assurance that material in storage has not been tampered with; laser radar as a potential solution to early warning deficiencies throughout the Department; performance testing standards for many security products to include an automated and consistent standard for assessing the quality of video; low temperature pyrotechnic smoke as a possible adversary delay mechanism; modular vaults to provide temporary protection for nuclear material during D and D activities, and a protection approach for restricted passage areas such as the volume above a tiled ceiling or within a crawl space

  17. 46 CFR 176.620 - Description of the Alternative Hull Examination (AHE) Program for certain passenger vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Description of the Alternative Hull Examination (AHE... Hull and Tailshaft Examinations § 176.620 Description of the Alternative Hull Examination (AHE) Program for certain passenger vessels. The Alternative Hull Examination (AHE) Program provides you with an...

  18. 46 CFR 71.50-15 - Description of the Alternative Hull Examination (AHE) Program for certain passenger vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 3 2010-10-01 2010-10-01 false Description of the Alternative Hull Examination (AHE... Description of the Alternative Hull Examination (AHE) Program for certain passenger vessels. The Alternative Hull Examination (AHE) Program provides you with an alternative to a drydock examination by allowing...

  19. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    Science.gov (United States)

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  20. DATA Act File B Object Class and Program Activity - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File B. File B includes the agency object class and program activity detail obligation and...

  1. Maritime Security Fleet: Factors to Consider before Deciding to Select Participants Competitively

    National Research Council Canada - National Science Library

    1997-01-01

    The Maritime Security Act established the Maritime Security Fleet (MSF) program, authorizing MARAD to enter into agreements with maritime shipping companies to provide DOD access to commercial vessels operating under U.S...

  2. Reactor Vessel External Cooling for Corium Retention SULTAN Experimental Program and Modelling with CATHARE Code

    International Nuclear Information System (INIS)

    Rouge, S.; Dor, I.; Geffraye, G.

    1999-01-01

    In case of severe accident, a molten pool may form at the bottom of the lower head, and some pessimistic scenarios estimate that heat fluxes up to 1.5 MW/m 2 should be transferred through the vessel wall. An efficient, though completely passive, removal of heat flux during a long time is necessary to prevent total wall ablation, and a possible solution is to flood the cavity with water and establish boiling in natural convection. High heat exchanges are expected, especially if the system design (deflector along the vessel, riser...) emphasize water natural circulation, but are unfortunately limited by the critical heat flux phenomena (CHF). CHF data are very scarce in the adequate range of hydraulic and geometric parameters and are clearly dependent of the system effect in natural convection. The system effect can both modify flow velocity and two phase flow regimes, counter-current phenomena and flow static or dynamic instabilities. The SULTAN experimental program purpose was of two kinds, increasing CHF data for realistic situations, and improving the modeling of large 3D two phase flow circuits in natural convection. The CATHARE thermal-hydraulic code is used for interpreting the data and for extrapolation to real geometry. As a first step, a one-dimensional model is used. It is shown that some closure laws have to be improved. Reasonable predictions may be obtained but, for some test conditions, multi-dimensional effects such as recirculation appear to be dominant. Therefore the 3-dimensional module of CATHARE is also used to investigate these effects. This model well predicts qualitatively the existence and the development of a 2-phase layer along the heated wall as well as the existence of a recirculation zone. But modelling problems still require further development as part of a long term program for a better prediction of multi-dimensional two-phase flows

  3. 49 CFR 659.25 - Annual review of system safety program plan and system security plan.

    Science.gov (United States)

    2010-10-01

    ... system security plan. 659.25 Section 659.25 Transportation Other Regulations Relating to Transportation... and system security plan. (a) The oversight agency shall require the rail transit agency to conduct an annual review of its system safety program plan and system security plan. (b) In the event the rail...

  4. 5 CFR 930.301 - Information systems security awareness training program.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems § 930.301 Information systems security awareness training program. Each Executive Agency must develop a...

  5. 75 FR 56858 - Improvements to the Supplemental Security Income Program-Heroes Earnings Assistance and Relief...

    Science.gov (United States)

    2010-09-17

    ... number, 1-800-772-1213, or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA-2009-0017] RIN 0960-AH00 Improvements to the Supplemental Security Income Program--Heroes Earnings Assistance and Relief Tax Act of 2008...

  6. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Senior FEMA official... Senior FEMA official responsible for the information security program. The Director of the Security Division, has been designated as the senior official to direct and administer the FEMA information security...

  7. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  8. Gene expression programming for power system static security ...

    African Journals Online (AJOL)

    user

    fuzzy logic, artificial neural networks and expert systems have been explored for static security assessment problems (Bansal et ..... MATLAB version 7.6 neural network toolbox was ..... Vision 2020 Dynamic Security Assessment in Real time.

  9. Enhancing Global Health Security: US Africa Command's Disaster Preparedness Program.

    Science.gov (United States)

    Morton Hamer, Melinda J; Reed, Paul L; Greulich, Jane D; Beadling, Charles W

    2018-03-07

    US Africa Command's Disaster Preparedness Program (DPP), implemented by the Center for Disaster and Humanitarian Assistance Medicine, partnered with US Government agencies and international organizations to promote stability and security on the African continent by engaging with African Partner Nations' (PN) civil and military authorities to improve disaster management capabilities. From 2008 to 2015, DPP conducted disaster preparedness and response programming with 17 PNs. DPP held a series of engagements with each, including workshops, strategic planning, developing preparedness and response plans, tabletop exercises, and prioritizing disaster management capability gaps identified through the engagements. DPP partners collected data for each PN to further capacity building efforts. Thus far, 9 countries have completed military pandemic plans, 10 have developed national pandemic influenza plans, 9 have developed military support to civil authorities plans, and 11 have developed disaster management strategic work plans. There have been 20 national exercises conducted since 2009. DPP was cited as key in implementation of Ebola response plans in PNs, facilitated development of disaster management agencies in DPP PNs, and trained nearly 800 individuals. DPP enhanced PNs' ability to prepare and respond to crises, fostering relationships between international agencies, and improving civil-military coordination through both national and regional capacity building. (Disaster Med Public Health Preparedness. 2018;page 1 of 11).

  10. I and C security program for nuclear facilities: implementation guide - TAFICS/IG/2

    International Nuclear Information System (INIS)

    2016-04-01

    This is the second in a series of documents being developed by TAFICS for protecting computer-based I and C systems of Indian nuclear facilities from cyber attacks. The document provides guidance to nuclear facility management to establish, implement and maintain a robust I and C security program - consisting of security plan and a set of security controls. In order to provide a firm basis for the security program, the document also identifies the fundamental security principles and foundational security requirements related to computer-based I and C systems of nuclear facilities. It is recommended that all applicable Indian nuclear facilities should implement the security program - with required adaptation - so as to provide the necessary assurance that the I and C systems are adequately protected against cyber attacks. (author)

  11. Applying the National Industrial Security Program (NISP) in the laboratory environment

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1995-01-01

    With continuing changes in the world safeguards and security environment the effectiveness of many laboratory operations depends on correctly assessing the risk to its programs and developing protection technologies, research and concepts of operations being employed by the scientific community. This paper explores the opportunities afforded by the National Industrial Security Program (NISP) to uniformly and simply protect Laboratory security assets, sensitive and classified information and matter, during all aspects of a laboratory program. The developments in information systems, program security, physical security and access controls suggest an industrial security approach. This paper's overall objective is to indicate that the Laboratory environment is particularly well suited to take advantage being pursued by NISP and the performance objectives of the new DOE orders

  12. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    International Nuclear Information System (INIS)

    Song, S. H.; Lee, M. S.; Kim, T. H.; Park, C. H.; Park, S. P.; Kim, H. S.

    2014-01-01

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system

  13. A Case Study on Cyber-security Program for the Programmable Logic Controller of Modern NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Song, S. H. [Korea University, Seoul (Korea, Republic of); Lee, M. S.; Kim, T. H. [Formal Work Inc., Seoul (Korea, Republic of); Park, C. H. [LINE Corp., Tokyo (Japan); Park, S. P. [Ahnlab Inc., Seoul (Korea, Republic of); Kim, H. S. [Sejong University, Seoul (Korea, Republic of)

    2014-08-15

    As instrumentation and control (I and C) systems for modern Nuclear Power Plants (NPPs) have been digitalized to cope with their growing complexity, the cyber-security has become an important issue. To protect the I and C systems adequately from cyber threats, such as Stuxnet that attacked Iran's nuclear facilities, regulations of many countries require a cyber-security program covering all the life cycle phases of the system development, from the concept to the retirement. This paper presents a case study of cyber-security program that has been performed during the development of the programmable logic controller (PLC) for modern NPPs of Korea. In the case study, a cyber-security plan, including technical, management, and operational controls, was established through a security risk assessment. Cyber-security activities, such as development of security functions and periodic inspections, were conducted according to the plan: the security functions were applied to the PLC as the technical controls, and periodic inspections and audits were held to check the security of the development environment, as the management and operational controls. A final penetration test was conducted to inspect all the security problems that had been issued during the development. The case study has shown that the systematic cyber-security program detected and removed the vulnerabilities of the target system, which could not be found otherwise, enhancing the cyber-security of the system.

  14. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  15. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  16. 46 CFR 115.620 - Description of the Alternative Hull Examination (AHE) Program for certain passenger vessels.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Description of the Alternative Hull Examination (AHE... ACCOMMODATIONS FOR MORE THAN 49 PASSENGERS INSPECTION AND CERTIFICATION Hull and Tailshaft Examinations § 115.620 Description of the Alternative Hull Examination (AHE) Program for certain passenger vessels. The Alternative...

  17. 22 CFR 126.6 - Foreign-owned military aircraft and naval vessels, and the Foreign Military Sales program.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Foreign-owned military aircraft and naval vessels, and the Foreign Military Sales program. 126.6 Section 126.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS GENERAL POLICIES AND PROVISIONS § 126.6 Foreign-owned military...

  18. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  19. 76 FR 28315 - Security Zone; Vessels Carrying Hazardous Cargo, Sector Columbia River Captain of the Port Zone

    Science.gov (United States)

    2011-05-17

    ... determination based on the fact that the security zones created by this rule will only be in effect during the... its effects on them and participate in the rulemaking process. Small businesses may send comments on... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2009-1134] RIN 1625...

  20. Integrating Programming Language and Operating System Information Security Mechanisms

    Science.gov (United States)

    2016-08-31

    suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17

  1. INFORMATION SECURITY RISKS OPTIMIZATION IN CLOUDY SERVICES ON THE BASIS OF LINEAR PROGRAMMING

    Directory of Open Access Journals (Sweden)

    I. A. Zikratov

    2013-01-01

    Full Text Available The paper discusses theoretical aspects of secure cloud services creation for information processing of various confidentiality degrees. A new approach to the reasoning of information security composition in distributed computing structures is suggested, presenting the problem of risk assessment as an extreme problem of decisionmaking. Linear programming method application is proved to minimize the risk of information security for given performance security in compliance with the economic balance for the maintenance of security facilities and cost of services. An example is given to illustrate the obtained theoretical results.

  2. Establishing cyber security programs for I and C systems at nuclear facilities

    International Nuclear Information System (INIS)

    Waedt, Karl

    2012-01-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  3. Establishing cyber security programs for I and C systems at nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Waedt, Karl [AREVA NP GmbH (Germany)

    2012-11-01

    In recent years, across the international nuclear community, cyber security issues have quickly gained significant attention from safety authorities and plant designers alike. This increased attention was accelerated by news of the Stuxnet virus, which impaired control systems at Iranian nuclear facilities in 2010, but is also fueled by regular news about cyber security breaches of data systems at large business corporations. This paper discusses key aspects of establishing a cyber security program for Instrumentation and Control (I and C) systems at a nuclear facility, and identifies inherent aspects of nuclear power plant (NPP) design, that differentiate the needs of such a cyber security program from those of typical corporate data systems. (orig.)

  4. Minutes of the Twelfth LWR pressure vessel surveillance dosimtery improvement program meeting

    International Nuclear Information System (INIS)

    1989-01-01

    The 1983 Twelfth Light Water Reactor Pressure Vessel Surveillance Dosimetry Improvement Program (LWR-PV-SDIP) Meeting, which was held October 24-28, 1983. Sections 1 through 14 of this report provide documentation of agreements, commitments, and reports that are subject to the approval and concurrence of the participating laboratories and supporting agencies and organizations. Attachment No. 1 provides information on the preparation of a number of NUREG publications that will document the results of various aspects of the LWR-PV-SDIP. For each NUREG publication, a tentative ''Table of Contents'' is provided in addition to suggested interlaboratory writing assignments and camera-ready copy contribution due dates, as appropriate. Attachment No. 2 provides information on planning for the Fifth ASTM-EURATOM Symposium. Attachment No. 3 provides information on an ASTM press release about an MPC-6 meeting and dpa and E > 1 MeV exposure parameters. Attachments No. 4 and 5 provide copies of two LWR-PV-SDIP related papers presented at the Eleventh WRSR Information Meeting, October 24-28, 1983

  5. An Enterprise Security Program and Architecture to Support Business Drivers

    Directory of Open Access Journals (Sweden)

    Brian Ritchot

    2013-08-01

    Full Text Available This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropriate. Through a discussion of information assurance, this article makes a case for leveraging enterprise security architectures to meet an organizations' need for information assurance. The approach is derived from the Sherwood Applied Business Security Architecture (SABSA methodology, as put into practice by Seccuris Inc., an information assurance integrator. An understanding of Seccuris’ approach will illustrate the importance of aligning security activities with high-level business objectives while creating increased awareness of the duality of risk. This business-driven approach to enterprise security architecture can help organizations change the perception of IT security, positioning it as a tool to enable and assure business success, rather than be perceived as an obstacle to be avoided.

  6. Development of containers sealing system like part of surveillance program of the vessel in nuclear power plants

    International Nuclear Information System (INIS)

    Romero C, J.; Hernandez C, R.; Fernandez T, F.; Rocamontes A, M.; Perez R, N.

    2009-10-01

    The owners of nuclear power plants should be demonstrate that the embrittlement effects by neutronic radiation do not commit the structural integrity from the pressure vessel of nuclear reactors, during conditions of routine operation and below postulate accident. For this reason, there are surveillance programs of vessels of nuclear power plants, in which are present surveillance capsules. A surveillance capsule is compound by the support, six containers for test tubes and dosimeters. The containers for test tubes are of two types: rectangular container for test tubes, Charpy V and Cylindrical Container for tension test tubes. These test tubes are subject to a same or bigger neutronic flow to that of vessel, being representative of vessel mechanical conditions. The test tubes are rehearsed to watch over the increase of embrittlement that presents the vessel. This work describes the development of welding system to seal the containers for test tubes, these should be filled with helium of ultra high purity, to a pressure of an atmosphere. In this system the welding process Gas Tungsten Arc Welding is used, a hermetic camera that allows to place the containers with three grades of freedom, a vacuum subsystem and pressure, high technology equipment's like: power source with integrated computer, arc starter of high frequency, helium flow controller, among others. Finally, the advances in the inspection system for the qualification of sealing system are mentioned, system that should measure the internal pressure of containers and the helium purity inside these. (Author)

  7. How to implement security controls for an information security program at CBRN facilities

    International Nuclear Information System (INIS)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.; Glantz, Clifford S.; Landine, Guy P.; Bryant, Janet L.; Lewis, John; Mathers, Gemma; Rodger, Robert; Johnson, Christopher

    2015-01-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  8. How to implement security controls for an information security program at CBRN facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lenaeus, Joseph D. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); O' Neil, Lori Ross [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Leitch, Rosalyn M. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Glantz, Clifford S. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Landine, Guy P. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Bryant, Janet L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Lewis, John [National Nuclear Lab., Workington (United Kingdom); Mathers, Gemma [National Nuclear Lab., Workington (United Kingdom); Rodger, Robert [National Nuclear Lab., Workington (United Kingdom); Johnson, Christopher [National Nuclear Lab., Workington (United Kingdom)

    2015-12-01

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in an easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.

  9. Report: EPA’s Information Security Program Is Established, but Improvements Are Needed to Strengthen Its Processes

    Science.gov (United States)

    Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.

  10. 75 FR 17305 - National Industrial Security Program Directive No. 1

    Science.gov (United States)

    2010-04-06

    ... Top Secret; Communications Security, except classified keys used for data transfer; Restricted Data... clearance under an SSA to Top Secret unless an approved NID covering the prospective Top Secret access has...

  11. Research Awards: Agriculture and Food Security program Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... HEAD OFFICE / SIÈGE : 150 Kent Street / 150, rue Kent PO Box ... to pursue their research goals in a dynamic team environment in ... You should have an interest in agriculture, food security, nutrition, rural livelihoods, and.

  12. Zero based programming: a viable security budgeting approach.

    Science.gov (United States)

    Roll, Frederick G

    2003-01-01

    To get additional dollars or avoid budget cuts or personnel reductions, healthcare security directors should consider a budget approach that best justifies the needs of the department or organization.

  13. Heavy-Section Steel Technology Program intermediate-scale pressure vessel tests

    International Nuclear Information System (INIS)

    Bryan, R.H.; Merkle, J.G.; Smith, G.C.; Whitman, G.D.

    1977-01-01

    The tests of intermediate-size vessels with sharp flaws permitted the comparison of experimentally observed behavior with analytical predictions of the behavior of flawed pressure vessels. Fracture strains estimated by linear elastic fracture mechanics (LEFM) were accurate in the cases in which the flaws resided in regions of high transverse restraint and the fracture toughness was sufficiently low for unstable fracture to occur prior to yielding through the vessel wall. When both of these conditions were not present, unstable fracture did occur, always preceded by stable crack growth; and the cylinders with flaws initially less than halfway through the wall attained gross yield prior to burst. Predictions of failure pressure of the vessels with flawed nozzles, based upon LEFM estimates of failure strain, were very conservative. LEFM calculations of critical load were based upon small-specimen fracture toughness test data. Whenever gross yielding preceded failure, the actual strains achieved were considerably greater than the estimated strains at failure based on LEFM. In such cases the strength of the vessel may be no longer dependent upon plane-strain fracture toughness but upon the capacity of the cracked section to carry the imposed load stably in the plastic range. Stable crack growth, which has not been predictable quantitatively, is an important factor in elastic-plastic analysis of strength. The ability of the flawed vessels to attain gross yield in unflawed sections has important qualitative implications on pressure vessel safety margins. The gross yield condition occurs in light-water-reactor pressure vessels at about 2 x design pressure. The intermediate vessel tests that demonstrated a capacity for exceeding this load confirm that the presumed margin of safety is not diminished by the presence of flaws of substantial size, provided that material properties are adequate

  14. An Enterprise Security Program and Architecture to Support Business Drivers

    OpenAIRE

    Brian Ritchot

    2013-01-01

    This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropr...

  15. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  16. 76 FR 34732 - Privacy Act of 1974; Department of Homeland Security/National Protection and Programs Directorate...

    Science.gov (United States)

    2011-06-14

    ... 1974; Department of Homeland Security/National Protection and Programs Directorate--002 Chemical... Homeland Security/National Protection and Programs Directorate--002 Chemical Facility Anti-Terrorism.... 552a, the Department of Homeland Security (DHS)/National Protection and Programs Directorate (NPPD...

  17. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  18. 78 FR 35945 - Request for Comments on Security Training Programs for Surface Mode Employees

    Science.gov (United States)

    2013-06-14

    ... million for training projects. Similarly, under the Intercity Bus Security Grant Program (IBSGP), which... related to the security elements in Table 1, per employee? (Please indicate whether this includes travel... on the size and scope of the exercise, including the phases of an exercise, travel expenses for...

  19. Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution (PPBE) System in Georgia

    Science.gov (United States)

    2004-06-01

    Roy J. What Determines Economic Growth? Economic Review – Second Quarter 1993 [References: Barro (1991); Mankiw , Romer, and Well (1992); De Long...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release: distribution unlimited ECONOMIC SECURITY...DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE: Economic Security Environment and Implementation of Planning, Programming, Budgeting, Execution

  20. The effectiveness of online gaming as part of a security awareness program

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2014-07-01

    Full Text Available the human element whose actions can be considered as erratic and unpredictable thus posing a threat to the security of the organization. Security awareness programs aim to equip users of cyberspace with the necessary knowledge to identify and mitigate...

  1. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  2. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  3. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  4. Training programs for the systems approach to nuclear security

    International Nuclear Information System (INIS)

    Ellis, Doris E.

    2005-01-01

    In support of the US Government and the International Atomic Energy Agency (IAEA) Nuclear Security Programmes, Sandia National Laboratories (SNL) has advocated and practiced a risk-based, systematic approach to nuclear security. The risk equation has been implemented as the basis for a performance methodology for the design and evaluation of Physical Protection Systems against a Design Basis Threat (DBT) for theft or sabotage of nuclear and/or radiological materials. Since integrated systems must include people as well as technology and the man-machine interface, a critical aspect of the human element is to train all stakeholders in nuclear security on the systems approach. Current training courses have been beneficial but are still limited in scope. SNL has developed two primary international courses and is completing development of three new courses that will be offered and presented in the near term. In the long-term, SNL envisions establishing a comprehensive nuclear security training curriculum that will be developed along with a series of forthcoming IAEA Nuclear Security Series guidance documents.

  5. Building a National Security Program at a Small School: Identifying Opportunities and Overcoming Challenges

    Science.gov (United States)

    Grossman, Michael; Schortgen, Francis

    2016-01-01

    This article offers insights into the overall program development process and--institutional obstacles and constraints notwithstanding--successful introduction of a new national security program at a small liberal arts university at a time of growing institutional prioritization of science, technology, engineering, and mathematics (STEM) programs.…

  6. Security, Dignity, Caring Relationships, and Meaningful Work: Needs Motivating Participation in a Job-Training Program

    Science.gov (United States)

    Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David

    2008-01-01

    Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…

  7. Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed

    Science.gov (United States)

    Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.

  8. Design of large scale applications of secure multiparty computation : secure linear programming

    NARCIS (Netherlands)

    Hoogh, de S.J.A.

    2012-01-01

    Secure multiparty computation is a basic concept of growing interest in modern cryptography. It allows a set of mutually distrusting parties to perform a computation on their private information in such a way that as little as possible is revealed about each private input. The early results of

  9. Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols

    NARCIS (Netherlands)

    Pettorossi, Alberto; Delzanno, Giorgio; Etalle, Sandro

    2001-01-01

    We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder

  10. How the Office of Safeguards and Security Technology development program facilitates safeguarding and securing the DOE complex

    International Nuclear Information System (INIS)

    Smoot, W.

    1995-01-01

    The technology development program's (TDP's) mission is to provide technologies or methodologies that address safeguards and security requirements throughout the U.S. DOE complex as well as to meet headquarters' policy needs. This includes developing state-of-the-art technologies or modifying existing technologies in physical security, material control and accountability, information security, and integrated safeguards systems. The TDP has an annual process during which it solicits user requirements from the field. These requirements are analyzed by DOE headquarters and laboratory personnel for technical merit. The requirements are then prioritized at headquarters, and the highest priorities are incorporated into our budget. Although this user-needs process occurs formally once a year, user requirements are accepted at any time. The status of funded technologies is communicated through briefings, programs reviews, and various documents that are available to all interested parties. Participants in several interagency groups allows our program to benefit from what others are doing and to prevent duplications of efforts throughout the federal community. Many technologies are transferred to private industry

  11. Reactor pressure vessel structural integrity research in the US Nuclear Regulatory Commission HSST and HSSI Programs

    International Nuclear Information System (INIS)

    Pennell, W.E.; Corwin, W.R.

    1994-01-01

    This report discusses development on the technology used to assess the safety of irradiation-embrittled nuclear reactor pressure vessels containing flaws. Fracture mechanics tests on reactor pressure vessel steel have shown that local brittle zones do not significantly degrade the material fracture toughness, constraint relaxation at the crack tip of shallow surface flaws results in increased fracture toughness, and biaxial loading reduces but does not eliminate the shallow-flaw fracture toughness elevation. Experimental irradiation investigations have shown that the irradiation-induced shift in Charpy V-notch versus temperature behavior may not be adequate to conservatively assess fracture toughness shifts due to embrittlement and the wide global variations of initial chemistry and fracture properties of a nominally uniform material within a pressure vessel may confound accurate integrity assessments that require baseline properties

  12. Strong tobacco control program requirements and secure funding are not enough: lessons from Florida.

    Science.gov (United States)

    Kennedy, Allison; Sullivan, Sarah; Hendlin, Yogi; Barnes, Richard; Glantz, Stanton

    2012-05-01

    Florida's Tobacco Pilot Program (TPP; 1998-2003), with its edgy Truth media campaign, achieved unprecedented youth smoking reductions and became a model for tobacco control programming. In 2006, 3 years after the TPP was defunded, public health groups restored funding for tobacco control programming by convincing Florida voters to amend their constitution. Despite the new program's strong legal structure, Governor Charlie Crist's Department of Health implemented a low-impact program. Although they secured the program's strong structure and funding, Florida's nongovernmental public health organizations did not mobilize to demand a high-impact program. Implementation of Florida's Amendment 4 demonstrates that a strong programmatic structure and secure funding are insufficient to ensure a successful public health program, without external pressure from nongovernmental groups.

  13. Diamond High Assurance Security Program: Trusted Computing Exemplar

    Science.gov (United States)

    2002-09-01

    computing component, the Embedded MicroKernel Prototype. A third-party evaluation of the component will be initiated during development (e.g., once...target technologies and larger projects is a topic for future research. Trusted Computing Reference Component – The Embedded MicroKernel Prototype We...Kernel The primary security function of the Embedded MicroKernel will be to enforce process and data-domain separation, while providing primitive

  14. Overview of experimental results obtained under the Prestressed Concrete Nuclear Pressure Vessel Development Program at the Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Naus, D.J.

    1978-01-01

    Under the Prestressed Concrete Nuclear Pressure Vessel Development Program at the Oak Ridge National Laboratory, various aspects of Prestressed Concrete Pressure Vessels (PCPVs) are investigated and evaluated with respect to reliability, structural performance, constructability, and economy. Based upon identified needs, analytical and experimental investigations are conducted. Areas of interest include finite-element analysis development, materials and structural behavior tests, instrumentation evaluation and development, and structural model tests. Studies have been recently completed in the following areas: concrete embedment instrumentation systems for PCPVs, grouted-nongrouted prestressing systems, acoustic emission as a technique for structural integrity monitoring, and model tests of steam-generator cavity closure plugs for a Gas-Cooled Fast Reactor (GCFR). An overview of results is presented

  15. Establishing a national biological laboratory safety and security monitoring program.

    Science.gov (United States)

    Blaine, James W

    2012-12-01

    The growing concern over the potential use of biological agents as weapons and the continuing work of the Biological Weapons Convention has promoted an interest in establishing national biological laboratory biosafety and biosecurity monitoring programs. The challenges and issues that should be considered by governments, or organizations, embarking on the creation of a biological laboratory biosafety and biosecurity monitoring program are discussed in this article. The discussion focuses on the following questions: Is there critical infrastructure support available? What should be the program focus? Who should be monitored? Who should do the monitoring? How extensive should the monitoring be? What standards and requirements should be used? What are the consequences if a laboratory does not meet the requirements or is not willing to comply? Would the program achieve the results intended? What are the program costs? The success of a monitoring program can depend on how the government, or organization, responds to these questions.

  16. Safeguards and security research and development: Program status report, February-July 1981

    International Nuclear Information System (INIS)

    Henry, C.N.; Walton, R.B.

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards

  17. Safeguards and security research and development: Program status report, February-July 1981

    Energy Technology Data Exchange (ETDEWEB)

    Henry, C.N.; Walton, R.B. (comps.)

    1982-04-01

    This report, one of a series of biannual progress reports, describes the status of research and development in the Safeguards and Security Program at Los Alamos from February-July 1981. Most work covered here is sponsored by the Office of Safeguards and Security of the Department of Energy; however, project activities that are technically closely related to nuclear safeguards and security also are included where appropriate for conveying information useful to the nuclear community. The report comprises four major subject areas: Security Development and Support; Nuclear Materials Measurement and Engineering; Nuclear Facility Safeguards Support; and International Safeguards, Technology Transfer, and Training. Some technical topics included in the subject areas are computer and informational security, chemical and nondestructive analysis of nuclear materials, process modeling and analysis, nuclear materials accounting systems, evaluation of prototype measurement instrumentation and procedures in nuclear facilities, design and consultation for facilities, technical exchange, training courses, and international safeguards.

  18. Vessel Operating Units (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains data for vessels that are greater than five net tons and have a current US Coast Guard documentation number. Beginning in1979, the NMFS...

  19. Light Water Reactor Pressure Vessel Surveillance Dosimetry Improvement Program. PSF Blind Test workshop minutes. Summary

    International Nuclear Information System (INIS)

    Guthrie, G.L.; Lippincott, E.P.; McGarry, E.D.

    1984-01-01

    A ''Blind Test'' workshop was held on April 9-11, 1984, at the Holiday Inn in Richland, WA. At the workshop, participant groups compared ''Blind'' calculations with existing data which was unavailable to them at the time the calculations were made. The purpose of the exercise was to allow each participant group to test the group's ability to predict ''in-wall'' mechanical property degradation for a simulated nuclear reactor pressure vessel irradiation

  20. Fabrication and mechanical test data for the four 6-inch-thick intermediate test vessels made from steel plate for the Heavy Section Steel Program

    International Nuclear Information System (INIS)

    Childress, C.E.

    1976-01-01

    The HSST Program has among its goals the objective of demonstrating the capability to predict safe behavior of thick-walled pressure vessels containing flaws of known dimensions under frangible, transitional, and tough loading regimes. To accomplish these objectives the program is conducting a series of tests involving 6-in.-thick pressure vessels which will serve as test specimens for assisting in the characterization of failure under these loading conditions. Among the vessels a number of parameters, such as weld type, weld location, flaw size and shape, and test temperature and pressure, will be selectively varied to show that a rationale exists for dealing with the varied stress and metallurgical states which normally exist in commercial nuclear reactor vessels. Each vessel will serve as a go, no-go determination of critical flaw size for a specific set of test parameters. Item 4 of the previous issues in this series covers the fabrication details of the first six 6-in.-thick test vessels, which were fabricated from ASTM A-508 Cl 2 forging materials. This report covers the fabrication details of four additional 6-in.-thick intermediate test vessels having shell courses fabricated from ASTM A-533 Gr B Cl 1 plate. The remaining components were made from forgings. Essentially this report is a continuation of ORNL-TM-4351; it describes the manufacturing details of the individual parts and their ultimate assembly into finished vessels. Details concerning chemical composition and mechanical and nondestructive test data are presented

  1. Measuring the Effect of Supplemental Nutrition Assistance Program (SNAP) Participation on Food Security.

    OpenAIRE

    James Mabli; Jim Ohls; Lisa Dragoset; Laura Castner; Betsy Santos

    2013-01-01

    The Supplemental Nutrition Assistance Program (SNAP) provides food assistance to more than 47 million low-income Americans every month. It aims to reduce hunger by facilitating beneficiaries’ access to enough food for a healthy, active lifestyle, otherwise known as "food security." Our study conducted for the Food and Nutrition Service of the U.S. Department of Agriculture shows that SNAP participation is associated with improved food security. The study is the largest and most rigorous one...

  2. Secure Programming Cookbook for C and C++ Recipes for Cryptography, Authentication, Input Validation & More

    CERN Document Server

    Viega, John

    2009-01-01

    Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix® (including Linux®) and Windows® environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.

  3. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  4. Seluge++: a secure over-the-air programming scheme in wireless sensor networks.

    Science.gov (United States)

    Doroodgar, Farzan; Abdur Razzaque, Mohammad; Isnin, Ismail Fauzi

    2014-03-11

    Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.

  5. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  6. Equitably Distributing Quality of Marine Security Guards Using Integer Programming

    Science.gov (United States)

    2013-03-01

    ARB BALMOD COM DoD DoS E HAF HQ 10 IP IQ LP MOS MCESG MSG MSGAT NLP NMC OSAB PCS PP&O Q RSO SAl SD SE SNCO T-ODP LIST OF...and Eurasia 2 Abu Dhabi, United Arab Emirates India and the Middle East 3 Bangkok, Thailand East Asia and Pacific 4 Fort Lauderdale, Florida South...integer, goal, and quadratic programming. LP models and nonlinear programming ( NLP ) models are very similar in model development for both maximizing

  7. 78 FR 51192 - Secure Supply Chain Pilot Program

    Science.gov (United States)

    2013-08-20

    ... importers that volunteer to participate in partnership programs for highly compliant companies and pass a... to share the names of the participants and information related to these companies with other Federal... Letter, Cyber Letter, or Warning Letter, that cite violations of the Federal Food, Drug, and Cosmetic Act...

  8. Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques

    Directory of Open Access Journals (Sweden)

    T. R. Khabibullin

    2012-09-01

    Full Text Available The article reviews the most common mistakes made by developers when writing software for mobile platforms which lead to appearing vulnerabilities that allow attackers to perform various types of attacks. The basic principles of defensive programming are presented.

  9. Food Security and Weight Status in Children: Interactions With Food Assistance Programs.

    Science.gov (United States)

    Nguyen, Binh T; Ford, Christopher N; Yaroch, Amy L; Shuval, Kerem; Drope, Jeffrey

    2017-02-01

    It is unclear whether Supplemental Nutrition Assistance Program (SNAP) or National School Lunch Program (NSLP) participation modifies the relationship between food insecurity and obesity in children. Data were included for 4,719 children aged 9-17 years who participated in the National Health and Nutrition Survey between 2003-2004 and 2011-2012. Linear regression was used to examine the relationship between household food security (full, marginal, low, and very low) and BMI percentile. Adjusted models were also stratified by SNAP and NSLP participation. There was no significant overall relationship between household food security and BMI percentile. In SNAP non-participants, there was no apparent overall relationship between BMI percentile and household food security. However, BMI percentile in children from households with low food security was significantly higher than that of children from fully food-secure households (risk difference [RD]=5.95, 95% CI=1.11, 10.80). Among SNAP participants, there was no significant relationship between household food security and BMI percentile. By NSLP participation category, there was a non-significant trend toward increasing BMI percentile with decreasing household food security in those reporting two or fewer (RD=1.75, 95% CI= -0.79, 4.29) and two to three (RD=1.07; 95% CI= -1.74, 3.89) lunches/week. There was no apparent relationship between household food security and BMI percentile in those reporting four or more lunches/week. Although the overall relationship between household food security and weight status in school-aged children was not statistically significant, there was some evidence that the relationship may differ by SNAP or NSLP participation, suggesting the need for more research. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  10. TRANSPETRO gas security of supply program; Programa de confiabilidade de suprimento de gas natural da TRANSPETRO

    Energy Technology Data Exchange (ETDEWEB)

    Faertes, Denise [PETROBRAS Transporte S.A. (TRANSPETRO), Rio de Janeiro, RJ (Brazil)

    2005-07-01

    The purpose of this paper is to present the Gas Security of Supply Program that is being implemented at TRANSPETRO since 2002. It includes the application of the state of the art techniques and models related to reliability engineering. The main objective of the program is to evaluate and optimize overall gas network performance and to provide gas to different consumers (industrial, residential, thermo-plants and vehicles) in compliance with stated reliability levels. Heavy fines will be applied to PETROBRAS in case of occurrence of shortfalls. We hope that this paper can contribute to a wider discussion about this subject of performance indicators involving security of supply, safety and environment preservation. (author)

  11. 33 CFR 90.3 - Pushing vessel and vessel being pushed: Composite unit.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pushing vessel and vessel being... HOMELAND SECURITY INLAND NAVIGATION RULES INLAND RULES: INTERPRETATIVE RULES § 90.3 Pushing vessel and vessel being pushed: Composite unit. Rule 24(b) of the Inland Rules states that when a pushing vessel and...

  12. 33 CFR 82.3 - Pushing vessel and vessel being pushed: Composite unit.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Pushing vessel and vessel being... HOMELAND SECURITY INTERNATIONAL NAVIGATION RULES 72 COLREGS: INTERPRETATIVE RULES § 82.3 Pushing vessel and vessel being pushed: Composite unit. Rule 24(b) of the 72 COLREGS states that when a pushing vessel and a...

  13. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  14. Protecting nuclear power plants. Chapter 2. On the importance of the security and safety of the reactor pressure vessel to external threats

    International Nuclear Information System (INIS)

    Ballesteros, A.; Gonzalez, J.; Debarberis, L.

    2006-01-01

    Nuclear power plants have blong been recognized as potential targets of terrorist attacks, and critics have long questioned the adequacy of the existing measures to defend against such attacks. The 11-S 2001, 11-M 2004 and 7-J 2005 attacks in USA, Spain and UK illustrated the deadly intention and abilities of modern terrorist groups. These attacks also brought to surface long standing concerns about the vulnerability of nuclear installations to possible terrorist attacks. Commercial nuclear reactors contain large inventory of radioactive fission products which, if dispersed, could pose a direct radiation hazard on the population. The reactor pressure vessel (RPV), which contains the nuclear fuel, is the most critical component of the plant. This paper shows that small amount of explosive material can produce irreversible damage in the RPV and the release of radioactive material. Therefor, access of working personal to the vicinity of the RPV during the refuelling outage should be stricktly limited. It should be considered a high priority security issue

  15. Heavy-Section Steel Irradiation Program on irradiation effects in light-water reactor pressure vessel materials

    International Nuclear Information System (INIS)

    Nanstad, R.K.; Corwin, W.R.; Alexander, D.J.; Haggag, F.M.; Iskander, S.K.; McCabe, D.E.; Sokolov, M.A.; Stoller, R.E.

    1995-01-01

    The safety of commercial light-water nuclear plants is highly dependent on the structural integrity of the reactor pressure vessel (RPV). In the absence of radiation damage to the RPV, fracture of the vessel is difficult to postulate. Exposure to high energy neutrons can result in embrittlement of radiation-sensitive RPV materials. The Heavy-Section Steel Irradiation (HSSI) Program at Oak Ridge National Laboratory, sponsored by the US Nuclear Regulatory Commission (USNRC), is assessing the effects of neutron irradiation on RPV material behavior, especially fracture toughness. The results of these and other studies are used by the USNRC in the evaluation of RPV integrity and regulation of overall nuclear plant safety. In assessing the effects of irradiation, prototypic RPV materials are characterized in the unirradiated condition and exposed to radiation under varying conditions. Mechanical property tests are conducted to provide data which can be used in the development of guidelines for structural integrity evaluations, while metallurgical examinations and mechanistic modeling are performed to improve understanding of the mechanisms responsible for embrittlement. The results of these investigations, in conjunction with results from commercial reactor surveillance programs, are used to develop a methodology for the prediction of radiation effects on RPV materials. This irradiation-induced degradation of the materials can be mitigated by thermal annealing, i.e., heating the RPV to a temperature above that of normal operation. Thus, thermal annealing and evaluation of reirradiation behavior are major tasks of the HSSI Program. This paper describes the HSSI Program activities by summarizing some past and recent results, as well as current and planned studies. 30 refs., 8 figs., 1 tab

  16. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  17. Historical summary of the heavy-section steel technology program and some related activities in light-water reactor pressure vessel safety research

    International Nuclear Information System (INIS)

    Whitman, G.D.

    1986-03-01

    The accomplishments of the Heavy-Section Steel Technology Program and other programs having a close relationship to the development of information used in the assessment of light-water reactor pressure vessel integrity are reviewed. The early Pressure Vessel Research Committee planning, the principals contributing to program formulation, the role of the US Atomic Energy Commission, and the developments under the US Nuclear Regulatory Commission sponsorship are identified. The need for major research and development accomplishments in fracture mechanics, heavy-section steel procurement, materials properties, irradiation effects, fatigue crack growth, and structural testing are summarized. The impact of program results on regulatory issues and the development of data used in the preparation of codes, standards, and guides are discussed. Continuing activities and recommendations for future research and development in support of pressure vessel integrity assessments are presented

  18. Safeguard and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support U.S. nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  19. Safeguards and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support US nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  20. Standardized physics-dosimetry for US pressure vessel cavity surveillance programs

    International Nuclear Information System (INIS)

    Ruddy, F.H.; McElroy, W.N.; Lippincott, E.P.

    1984-01-01

    Standardized Physics-Dosimetry procedures and data are being developed and tested for monitoring the neutron doses accumulated by reactor pressure vessels (PV) and their support structures. These procedures and data are governed by a set of 21 ASTM standard practices, guides, and methods for the prediction of neutron-induced changes in light water reactor (LWR) PVs and support structure steels throughout the service life of the PV. This paper summarizes the applications of these standards to define the selection and deployment of recommended dosimetry sets, the selection of dosimetry capsules and thermal neutron shields, the placement of dosimetry, the methods of measurement of dosimetry sensor reaction products, data analysis procedures, and uncertainty evaluation procedures. It also describes the validation of these standards both by in-reactor testing of advanced PV cavity surveillance physics-dosimetry and by data development. The use of these standards to guide selection and deployment of advanced dosimetry sets for commercial reactors is also summarized

  1. Impact of Security Awareness Programs on End-User Security Behavior: A Quantitative Study of Federal Workers

    Science.gov (United States)

    Smith, Gwendolynn T.

    2012-01-01

    The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…

  2. HEXANN-EVALU - a Monte Carlo program system for pressure vessel neutron irradiation calculation

    International Nuclear Information System (INIS)

    Lux, Ivan

    1983-08-01

    The Monte Carlo program HEXANN and the evaluation program EVALU are intended to calculate Monte Carlo estimates of reaction rates and currents in segments of concentric angular regions around a hexagonal reactor-core region. The report describes the theoretical basis, structure and activity of the programs. Input data preparation guides and a sample problem are also included. Theoretical considerations as well as numerical experimental results suggest the user a nearly optimum way of making use of the Monte Carlo efficiency increasing options included in the program

  3. DoD Information Security Program and Protection of Sensitive Compartmented Information (SCI)

    Science.gov (United States)

    2016-04-21

    Sensitive Compartmented Information ( SCI ) References: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD...collateral, special access program, SCI , and controlled unclassified information (CUI) within an overarching DoD Information Security Program...use, and dissemination of SCI within the DoD pursuant to References (a), (c), and (e) and Executive Order 12333 (Reference (h)). 2

  4. Automated Source Code Analysis to Identify and Remove Software Security Vulnerabilities: Case Studies on Java Programs

    OpenAIRE

    Natarajan Meghanathan

    2013-01-01

    The high-level contribution of this paper is to illustrate the development of generic solution strategies to remove software security vulnerabilities that could be identified using automated tools for source code analysis on software programs (developed in Java). We use the Source Code Analyzer and Audit Workbench automated tools, developed by HP Fortify Inc., for our testing purposes. We present case studies involving a file writer program embedded with features for password validation, and ...

  5. A two-factor, stochastic programming model of Danish mortgage-backed securities

    DEFF Research Database (Denmark)

    Nielsen, Søren S.; Poulsen, Rolf

    2004-01-01

    -trivial, both in terms of deciding on an initial mortgage, and in terms of managing (rebalancing) it optimally.We propose a two-factor, arbitrage-free interest-rate model, calibrated to observable security prices, and implement on top of it a multi-stage, stochastic optimization program with the purpose...

  6. From Charity to Security: The Emergence of the National School Lunch Program

    Science.gov (United States)

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  7. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  8. AspectKE*:Security Aspects with Program Analysis for Distributed Systems

    DEFF Research Database (Denmark)

    2010-01-01

    AspectKE* is the first distributed AOP language based on a tuple space system. It is designed to enforce security policies to applications containing untrusted processes. One of the key features is the high-level predicates that extract results of static program analysis. These predicates provide...

  9. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  10. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    Science.gov (United States)

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  11. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ...; Computer Matching Program (SSA/ Department of Homeland Security (DHS))--Match Number 1010 AGENCY: Social Security Administration (SSA). ACTION: Notice of a renewal of an existing computer matching program that... amended by the Computer Matching and Privacy Protection Act of 1988, as amended, and the regulations and...

  12. Program to develop acoustic emission: flaw relationship for inservice monitoring of nuclear pressure vessels. Progress report No. 1, July 1, 1976--February 1, 1977

    International Nuclear Information System (INIS)

    Hutton, P.H.; Schwenk, E.B.

    1977-03-01

    This is a laboratory research program to characterize acoustic emission (AE) from flaw growth and noise from innocuous sources in A533B Class 1 pressure vessel steel. The objectives are: characterize AE from a limited range of defects and material property conditions of concern to reactor pressure vessel integrity; characterize AE from innocuous sources (including defects); develop criteria for distinguishing significant flaws from innocuous sources; and develop an AE flaw damage model to serve as a basis for relating in-service AE to pressure vessel integrity. The purpose of the program is to build an experimental evaluation of the feasibility of detecting and analyzing flaw growth in reactor pressure boundaries by continuously monitoring for AE. A detailed program plan in the form of an analysis-before-test document has been prepared and approved

  13. Security management internship program: a great recruiting tool for your company.

    Science.gov (United States)

    Yaross, Dan; Morris, Ronald J

    2013-01-01

    A well thought out and managed internship program is easily a "win-win" situation, according to the authors, who established such a program for the security department of their hospital. The program benefits not only the students with gaining practical experience of the business environment, but also the colleges/universities in coordinating internship opportunities for its students and business organizations in a number of ways including the possible identification of potential young career candidates to augment their current workforces. The article is based on the authors' presentation at the ASIS International Annual Seminar in September 2012.

  14. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... As such, our ability to ensure the security of those systems is also increasing in import. Traditional information security measures tend to be system-oriented and often fail to address the human element that is critical to system success...

  15. 10 CFR Appendix H to Part 50 - Reactor Vessel Material Surveillance Program Requirements

    Science.gov (United States)

    2010-01-01

    ... arrangement for data sharing between plants. d. There must be a contingency plan to assure that the... Requirements I. Introduction II. Definitions III. Surveillance Program Criteria IV. Report of Test Results I..., Rockville, MD 20852-2738. II. Definitions All terms used in this appendix have the same meaning as in...

  16. The first 50 years: A review of the Department of Energy domestic safeguards and security program

    Energy Technology Data Exchange (ETDEWEB)

    Desmond, W.J.; Zack, N.R.; Tape, J.W.

    1997-12-01

    World War II not only brought the United States rapidly into the nuclear age, but it also brought a new term, {open_quotes}safeguards.{close_quotes} By that time, physical security was an already established activity that dealt with the protection of possessions such as property, vehicles, and other valuables. A secret nuclear project under a stadium at the University of Chicago would add a new dimension to physical security. Similarly, a community known only by its post office box at a location 27 miles from Santa Fe, New Mexico (PO Box 1663) would initiate new programs to protect information and technology while their programs changed the science and warfare around the world. The Manhattan Project and what was to become the Los Alamos Scientific Laboratory (now Los Alamos National Laboratory) would extend the applications of physical security and, soon to be implemented, safeguards to produce important technical advances for the protection, accounting, control, and nonproliferation of fissile nuclear materials. Security for nuclear materials and weapons information began as a foremost consideration with the start of the nuclear programs in the early 1940s. In the 1960s, the Atoms for Peace Program promoted the peaceful use of nuclear energy and made the US a supplier of nuclear materials and peaceful-use nuclear technology to other states. This program also changed the focus on nuclear materials from that of worldwide control to inspection by an independent agency, the proposed International Atomic Energy Agency. At this same time the nuclear weapons states increased from three to five. Other nations worked to obtain a nuclear weapons capability, resulting in increasing concerns about nuclear proliferation.

  17. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Directory of Open Access Journals (Sweden)

    Arnon Hershkovitz

    2015-09-01

    Full Text Available In recent years, schools (as well as universities have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8 and security (derived from CERT Secure Coding Standards. We use a multi-view, data-driven approach, by (a using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751. Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels. The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.

  18. Lessons learned from the scaling-up of a weekly multimicronutrient supplementation program in the integrated food security program (PISA).

    Science.gov (United States)

    Lechtig, Aarón; Gross, Rainer; Vivanco, Oscar Aquino; Gross, Ursula; López de Romaña, Daniel

    2006-01-01

    Weekly multimicronutrient supplementation was initiated as an appropriate intervention to protect poor urban populations from anemia. To identify the lessons learned from the Integrated Food Security Program (Programa Integrado de Seguridad Alimentaria [PISA]) weekly multimicronutrient supplementation program implemented in poor urban populations of Chiclayo, Peru. Data were collected from a 12-week program in which multimicronutrient supplements were provided weekly to women and adolescent girls 12 through 44 years of age and children under 5 years of age. A baseline survey was first conducted. Within the weekly multimicronutrient supplementation program, information was collected on supplement distribution, compliance, biological effectiveness, and cost. Supplementation, fortification, and dietary strategies can be integrated synergistically within a micronutrient intervention program. To ensure high cost-effectiveness of a weekly multimicronutrient supplementation program, the following conditions need to be met: the program should be implemented twice a year for 4 months; the program should be simultaneously implemented at the household (micro), community (meso), and national (macro) levels; there should be governmental participation from health and other sectors; and there should be community and private sector participation. Weekly multimicronutrient supplementation programs are cost effective options in urban areas with populations at low risk of energy deficiency and high risk of micronutrient deficiencies.

  19. The Importance of the Brain Neuro-Programming Technologies in National and Regional Security

    Directory of Open Access Journals (Sweden)

    Vasyl H. Fatkhutdinov

    2018-02-01

    Full Text Available The authors’ understanding of neuro-programming is the result of the impact on the human brain of information and communication technology (including educational one, through which in the human brain the programs of manifestation in the ontogenesis of internal creative potentials are written. This article summarizes the history of the formation of key neuro-programming technologies of the human brain as well as proves that the changes in the society’s worldview are caused by the possibilities and quality of neuro-programming technologies that society uses. Having influence over worldview stereotypes and behaviour set by the society, neuro-programming technologies essentially ensure the national security of any state and the peaceful coexistence of states in the regions and on the planet as a whole. Using historical and philosophical methods, methods of conceptualization, systematization, modeling, etc., the authors have come to the conclusion that the modern world lies in a confrontation of security strategies, in which neuro-programming technologies play a key role.

  20. Extracting classification rules from an informatic security incidents repository by genetic programming

    Directory of Open Access Journals (Sweden)

    Carlos Javier Carvajal Montealegre

    2015-04-01

    Full Text Available This paper describes the data mining process to obtain classification rules over an information security incident data collection, explaining in detail the use of genetic programming as a mean to model the incidents behavior and representing such rules as decision trees. The described mining process includes several tasks, such as the GP (Genetic Programming approach evaluation, the individual's representation and the algorithm parameters tuning to upgrade the performance. The paper concludes with the result analysis and the description of the rules obtained, suggesting measures to avoid the occurrence of new informatics attacks. This paper is a part of the thesis work degree: Information Security Incident Analytics by Data Mining for Behavioral Modeling and Pattern Recognition (Carvajal, 2012.

  1. Roadmap for Nondestructive Evaluation of Reactor Pressure Vessel Research and Development by the Light Water Reactor Sustainability Program

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Cyrus M [ORNL; Nanstad, Randy K [ORNL; Clayton, Dwight A [ORNL; Matlack, Katie [Georgia Institute of Technology; Ramuhalli, Pradeep [Pacific Northwest National Laboratory (PNNL); Light, Glenn [Southwest Research Institute, San Antonio

    2012-09-01

    The Department of Energy s (DOE) Light Water Reactor Sustainability (LWRS) Program is a five year effort which works to develop the fundamental scientific basis to understand, predict, and measure changes in materials and systems, structure, and components as they age in environments associated with continued long-term operations of existing commercial nuclear power reactors. This year, the Materials Aging and Degradation (MAaD) Pathway of this program has placed emphasis on emerging Non-Destructive Evaluation (NDE) methods which support these objectives. DOE funded Research and Development (R&D) on emerging NDE techniques to support commercial nuclear reactor sustainability is expected to begin next year. This summer, the MAaD Pathway invited subject matter experts to participate in a series of workshops which developed the basis for the research plan of these DOE R&D NDE activities. This document presents the results of one of these workshops which are the DOE LWRS NDE R&D Roadmap for Reactor Pressure Vessels (RPV). These workshops made a substantial effort to coordinate the DOE NDE R&D with that already underway or planned by the Electric Power Research Institute (EPRI) and the Nuclear Regulatory Commission (NRC) through their representation at these workshops.

  2. Feasibility of and methodology for thermal annealing an embrittled reactor vessel. Volume 1. Program overview. Final report

    International Nuclear Information System (INIS)

    Mager, T.R.

    1983-01-01

    An EPRI sponsored program was carried out by Westinghouse to determine the extent of fracture toughness recovery as a function of annealing time and temperature for neutron embrittlement sensitive reactor vessel material and to develop an optimal thermal anneal procedure for field applications. Program materials were three weldments fabricated by Combustion Engineering, Inc., from the same heat of A533 Grade B Class 1 plate material and the same heat of MnMoNi weld wire. The only variables were the target copper level and the welding flux which was Linde Grade 80 and Linde 0091. Weldments of 0.22, 0.36, and 0.41 wt % copper were produced. It was concluded from this study that excellent recovery of all properties could be achieved by annealing at 850 0 F (454 0 C) and above for 168 hours. Such an annealing resulted in ductile-brittle transition temperature shift recovery of 80 to 100%, and reirradiation after this annealing indicated that the ductile-brittle transition temperature shift appears to continue at the rate which would have been expected had no anneal been performed. System limitations were identified for both wet and dry annealing methods

  3. Radiological Threat Reduction (RTR) program: implementing physical security to protect large radioactive sources worldwide

    International Nuclear Information System (INIS)

    Lowe, Daniel L.

    2004-01-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security

  4. Research vessels

    Digital Repository Service at National Institute of Oceanography (India)

    Rao, P.S.

    The role of the research vessels as a tool for marine research and exploration is very important. Technical requirements of a suitable vessel and the laboratories needed on board are discussed. The history and the research work carried out...

  5. Foreign research reactor uranium supply program: The Y-12 national security complex process

    International Nuclear Information System (INIS)

    Nelson, T.; Eddy, B.G.

    2010-01-01

    The Foreign Research Reactor (FRR) Uranium Supply Program at the Y-12 National Security Complex supports the nonproliferation objectives of the HEU Disposition Program, the Reduced Enrichment Research and Test Reactors (RERTR) Program, and the United States FRR Spent Nuclear Fuel (SNF) Acceptance Program. The Y-12 National Nuclear Security Administration (NNSA) Y-12 Site Office maintains the prime contracts with foreign governments for the supply of Low-Enriched Uranium (LEU) for their research reactors. The LEU is produced by down blending Highly Enriched Uranium (HEU) that has been declared surplus to the U.S. national defense needs. The down blending and sale of the LEU supports the Surplus HEU Disposition Program Record of Decision to make the HEU non-weapons usable and to recover the economic value of the uranium to the extent feasible. This program supports the important U.S. government and nuclear nonproliferation commitment to serve as a reliable and cost-effective uranium supplier for those foreign research reactors that are converting or have converted to LEU fuel under the guidance of the NNSA RERTR Program. In conjunction with the FRR SNF Acceptance Program which supports the global nonproliferation efforts to disposition U.S.-origin HEU, the Y-12 FRR Uranium Supply Program can provide the LEU for the replacement fuel fabrication. In addition to feedstock for fuel fabrication, Y-12 supplies LEU for target fabrication for medical isotope production. The Y-12 process uses supply forecasting tools, production improvements and efficient delivery preparations to successfully support the global research reactor community

  6. Final report for the 'Melt-Vessel Interactions' Project. European Union R and TD Program 4th Framework. MVI project final research report

    Energy Technology Data Exchange (ETDEWEB)

    Sehgal, B.R.; Dinh, T.N.; Nourgaliev, R.R.; Bui, V.A.; Green, J.; Kolb, G.; Karbojian, A.; Theerthan, S.A.; Gubaidulline, A. [Royal Inst. of Tech., Stockholm (Sweden). Div. of Nuclear Power Safety; Helle, M.; Kymaelaeinen, O.; Tuomisto, H. [IVO Power Engineering Ltd., Vantaa (Finland); Bonnet, J.M.; Rouge, S.; Narcoux, M.; Liegeois, A. [CEA - Grenoble (France); Turland, B.D.; Dobson, G.P. [AEA Technology plc, Dorchester (United Kingdom); Siccama, A. [ECN Nuclear Research, Petten (Netherlands); Ikonen, K. [VTT Energy, Helsinki (Finland); Parozzi, F. [ENEL - SRI/PAM/GRA, Segrate, MI (Italy); Kolev, N. [Siemens AG, Erlangen (Germany); Caira, M. [Univ. of Roma (Italy)

    1999-04-01

    The Melt Vessel Interaction (MVI) project is concerned with the consequences of the interactions that a core melt, generated during a postulated severe accident in a light water reactor, may have with the pressure vessel. In particular, the issues concerned with the failure of the vessel bottom head are the focus of the research. The specific objectives of the project are to obtain data and develop validated models, which could be applied to prototypic plants, and accident conditions, for resolution of issues related to the melt vessel interactions. The project work has been performed by nine partners having varied responsibility. The work included a large number of experiments, with simulant materials, whose observations and results are employed, respectively, to understand the physical mechanisms and to develop validated models. Applications to the prototypic geometry and conditions have also been performed. This report is volume 1 of the Final Report for the Project, in which a summary of the progress achieved in the experimental program is provided. We have, however, included some aspects of the modeling activities. Volume 2 of the Final report describes the progress achieved in the modeling program. The progress achieved in the experimental and modeling parts of the Project has led to the resolution of some of the issues of melt vessel interaction. Considerable progress was also achieved towards resolution of the remaining issues.

  7. Final report for the 'Melt-Vessel Interactions' Project. European Union R and TD Program 4th Framework. MVI project final research report

    International Nuclear Information System (INIS)

    Sehgal, B.R.; Dinh, T.N.; Nourgaliev, R.R.; Bui, V.A.; Green, J.; Kolb, G.; Karbojian, A.; Theerthan, S.A.; Gubaidulline, A.; Bonnet, J.M.; Rouge, S.; Narcoux, M.; Liegeois, A.; Turland, B.D.; Dobson, G.P.; Siccama, A.; Ikonen, K.; Parozzi, F.; Kolev, N.; Caira, M.

    1999-04-01

    The Melt Vessel Interaction (MVI) project is concerned with the consequences of the interactions that a core melt, generated during a postulated severe accident in a light water reactor, may have with the pressure vessel. In particular, the issues concerned with the failure of the vessel bottom head are the focus of the research. The specific objectives of the project are to obtain data and develop validated models, which could be applied to prototypic plants, and accident conditions, for resolution of issues related to the melt vessel interactions. The project work has been performed by nine partners having varied responsibility. The work included a large number of experiments, with simulant materials, whose observations and results are employed, respectively, to understand the physical mechanisms and to develop validated models. Applications to the prototypic geometry and conditions have also been performed. This report is volume 1 of the Final Report for the Project, in which a summary of the progress achieved in the experimental program is provided. We have, however, included some aspects of the modeling activities. Volume 2 of the Final report describes the progress achieved in the modeling program. The progress achieved in the experimental and modeling parts of the Project has led to the resolution of some of the issues of melt vessel interaction. Considerable progress was also achieved towards resolution of the remaining issues

  8. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    Energy Technology Data Exchange (ETDEWEB)

    Koech, H K [Program Manager CBP/DHS Office Number 363-6109 Cell Number 0722-774-912, Office Location: Ground Floor U.S. Embassy Nairobi (Kenya)

    2010-07-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  9. Capacity building program: Framework of Standards to secure and facilitate Global Trade

    International Nuclear Information System (INIS)

    Koech, H.K.

    2010-01-01

    Effective implementation of capacity building program in Kenya will result in maximum protection against terrorist activity/counter terrorism worldwide due to countries meeting the requirements of the program via safety and security measures at land borders, seaports, and airports. It will also result in enforcement of illegal trade pertaining to terrorist financing, money laundering, trade fraud, strategic cases including weapons of mass destruction, child pornography, intellectual property rights, document fraud, alien smuggling, drug smuggling, and general smuggling. It will also facilitate legitimate commerce.

  10. Adaptive identification of vessel's added moments of inertia with program motion

    Science.gov (United States)

    Alyshev, A. S.; Melnikov, V. G.

    2018-05-01

    In this paper, we propose a new experimental method for determining the moments of inertia of the ship model. The paper gives a brief review of existing methods, a description of the proposed method and experimental stand, test procedures and calculation formulas and experimental results. The proposed method is based on the energy approach with special program motions. The ship model is fixed in a special rack consisting of a torsion element and a set of additional servo drives with flywheels (reactive wheels), which correct the motion. The servo drives with an adaptive controller provide the symmetry of the motion, which is necessary for the proposed identification procedure. The effectiveness of the proposed approach is confirmed by experimental results.

  11. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  12. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  13. DESIGN OF A VIBRATION AND STRESS MEASUREMENT SYSTEM FOR AN ADVANCED POWER REACTOR 1400 REACTOR VESSEL INTERNALS COMPREHENSIVE VIBRATION ASSESSMENT PROGRAM

    OpenAIRE

    KO, DO-YOUNG; KIM, KYU-HYUNG

    2013-01-01

    In accordance with the US Nuclear Regulatory Commission (US NRC), Regulatory Guide 1.20, the reactor vessel internals comprehensive vibration assessment program (RVI CVAP) has been developed for an Advanced Power Reactor 1400 (APR1400). The purpose of the RVI CVAP is to verify the structural integrity of the reactor internals to flow-induced loads prior to commercial operation. The APR1400 RVI CVAP consists of four programs (analysis, measurement, inspection, and assessment). Thoughtful prepa...

  14. A stochastic security approach to energy and spinning reserve scheduling considering demand response program

    International Nuclear Information System (INIS)

    Partovi, Farzad; Nikzad, Mehdi; Mozafari, Babak; Ranjbar, Ali Mohamad

    2011-01-01

    In this paper a new algorithm for allocating energy and determining the optimum amount of network active power reserve capacity and the share of generating units and demand side contribution in providing reserve capacity requirements for day-ahead market is presented. In the proposed method, the optimum amount of reserve requirement is determined based on network security set by operator. In this regard, Expected Load Not Supplied (ELNS) is used to evaluate system security in each hour. The proposed method has been implemented over the IEEE 24-bus test system and the results are compared with a deterministic security approach, which considers certain and fixed amount of reserve capacity in each hour. This comparison is done from economic and technical points of view. The promising results show the effectiveness of the proposed model which is formulated as mixed integer linear programming (MILP) and solved by GAMS software. -- Highlights: → Determination of optimal spinning reserve capacity requirement in order to satisfy desired security level set by system operator based on stochastic approach. → Scheduling energy and spinning reserve markets simultaneously. → Comparing the stochastic approach with deterministic approach to determine the advantages and disadvantages of each. → Examine the effect of demand response participation in reserve market to provide spinning reserve.

  15. WTO Compliance Status of the Conservation Security Program (CSP) and the Conservation Reserve Program (CRP)

    National Research Council Canada - National Science Library

    Schnepf, Randy

    2007-01-01

    .... This report is not a legal opinion, but describes both the CSP and CRP programs, the WTO Annex II provisions that govern compliance, and the potential issues involved in evaluating the compliance status of the two programs. This report will be updated as events warrant.

  16. Communications and Information: Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS) Network Security Program. Volume 2

    National Research Council Canada - National Science Library

    1997-01-01

    ...) Systems, and 33-2, Information Protection. This instruction prescribes the requirements, responsibilities and procedures for the security program for the Strategic Automated Command Control System-Data Transmission Subsystem (SACCS-DTS...

  17. Building and implementing a security certification and accreditation program official (ISC)2 guide to the CAPCM CBK

    CERN Document Server

    Howard, Patrick D

    2004-01-01

    Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professionals with an overview of C&A components, enabling them to document the status of the security controls of their IT systems, and learn how to secure systems via standard, repeatable processes.  This book consists of four main sections. It begins with a description of what it

  18. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  19. Sowing the Seeds of Strategic Success Across West Africa: Propagating the State Partnership Program to Shape the Security Environment

    Science.gov (United States)

    2017-06-09

    region’s continued growth in economics , population, influence, and the correlating 17 increase in risks to stability from radicalization and...environment and stem the tide of regional instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic... instability . The National Guard’s State Partnership Program is a security cooperation tool that Geographic Combatant Commanders can leverage to enhance the

  20. Studies and development of essential systems in the surveillance program, life extension potential of the vessel and master curve in nuclear power plants

    International Nuclear Information System (INIS)

    Romero C, J.; Hernandez C, R.; Rocamontes A, M.; Perez R, N.

    2010-01-01

    The nuclear power plants owners should demonstrate that the effects of the embrittlement by neutronic radiation do not commit the structural integrity of the pressure vessel of the nuclear reactors, so much under conditions of routine operation as below an accident postulate. In consequence, in Mexico surveillance programs of the vessels of the nuclear power plant of Laguna Verde exist, in which three surveillance capsules are have by reactor. A surveillance capsule is composed by a support and between six and eight containers for test tubes and dosemeters. The containers for test tubes are of two types: rectangular container for Charpy V test tubes and cylindrical container for tension test tubes. These test tubes are subject to a same or bigger neutronic flow that of the vessel, being representative witness of the mechanical conditions of the vessel. The objective of to assay the test tubes to impact is to evaluate the embrittlement grade of the vessel beforehand during its useful life of operation, as well as to determinate the running of the ductile-fragile transition temperature in function of the time. (Author)

  1. Cost of the Cervical Cancer Screening Program at the Mexican Social Security Institute

    Directory of Open Access Journals (Sweden)

    Víctor Granados-García

    2014-09-01

    Full Text Available Objective. To estimate the annual cost of the National Cervical Cancer Screening Program (CCSP of the Mexican Institute of Social Security (IMSS. Materials and methods. This cost analysis examined regional coverage rates reported by IMSS. We estimated the number of cytology, colposcopy, biopsy and pathology evaluations, as well as the diagnostic test and treatment costs for cervical intraepithelial neoplasia grade II and III (CIN 2/3 and cervical cancer. Diagnostic test costs were estimated using a micro-costing technique. Sensitivity analyses were performed. Results. The cost to perform 2.7 million cytology tests was nearly 38 million dollars, which represents 26.1% of the total program cost (145.4 million. False negatives account for nearly 43% of the program costs. Conclusion. The low sensitivity of the cytology test generates high rates of false negatives, which results in high institutional costs from the treatment of undetected cervical cancer cases.

  2. 77 FR 4573 - Maritime Security Directive 104-6 (Rev 6); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2012-01-30

    ... political complexity. Despite these efforts, piracy persists and the combination of piracy and weak rule of... Development, Naval Criminal Investigative Service, Customs and Border Protection, Transportation Security...

  3. Security programs for Category I or II nuclear material or certain nuclear facilities. Regulatory guide G-274

    International Nuclear Information System (INIS)

    2003-03-01

    The purpose of this regulatory guide is to help applicants for a Canadian Nuclear Safety Commission (CNSC) licence in respect of Category I or II nuclear material - other than a licence to transport - , or a nuclear facility consisting of a nuclear reactor that may exceed 10 MW thermal power during normal operation, prepare and submit the security information to be included with the application, pursuant to the Nuclear Safety and Control Act (NSCA). Category I and II nuclear material are defined in Appendix B to this guide. This guide describes: the security information that should typically be included with the application for any licence referred to above; how the security information may be organized and presented in a separate document (hereinafter 'the security program description'), in order to assist CNSC review and processing of the application; and, the administrative procedures to be followed when preparing, submitting or revising the security program description. (author)

  4. Human Factors in Coast Guard Computer Security - An Analysis of Current Awareness and Potential Techniques to Improve Security Program Viability

    National Research Council Canada - National Science Library

    Whalen, Timothy

    2001-01-01

    .... This thesis attempts to identify both the susceptibility of Coast Guard information systems to human factors-based security risks and possible means for increasing user awareness of those risks...

  5. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  6. The School Breakfast Program strengthens household food security among low-income households with elementary school children.

    Science.gov (United States)

    Bartfeld, Judith S; Ahn, Hong-Min

    2011-03-01

    The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.

  7. No Nation Is Home Alone: Understanding The International Dimension Of Homeland Security Through Global Transportation Security Programs

    Science.gov (United States)

    2016-03-01

    global economy have produced security gaps susceptible to exploitation. Transportation infrastructure , such as air and seaports, can be the target...15 Karen DeYoung, “New Issue of Jihadist Magazine Produced by Al-Qaeda in Yemen Suggests Attacks on U.S.,” Washington Post, December 24, 2014. http...is a complex system of people, things, and infrastructure that cross national boundaries; security policies must continue to be implemented to

  8. Department of energy defense programs perspectives on safeguards, security, and classification

    International Nuclear Information System (INIS)

    Eyck, E.Q.T.

    1989-01-01

    This paper discusses why national and international safeguards and the protection of sensitive information are important to the United States and to other nations. It demonstrates that while the opposite consequence appears logical these functions will probably become even more important if the major powers agree on further arms reductions. Some of the steps taken by the U.S. Department of Energy to improve the effectiveness of its safeguards, security, and classification programs are reviewed. The valuable contributions in these areas since 1968 and 1976, respectively by the Technical Support Organization and the International Safeguards Project Offoce at Brookhaven are noted

  9. Novel methods for Solving Economic Dispatch of Security-Constrained Unit Commitment Based on Linear Programming

    Science.gov (United States)

    Guo, Sangang

    2017-09-01

    There are two stages in solving security-constrained unit commitment problems (SCUC) within Lagrangian framework: one is to obtain feasible units’ states (UC), the other is power economic dispatch (ED) for each unit. The accurate solution of ED is more important for enhancing the efficiency of the solution to SCUC for the fixed feasible units’ statues. Two novel methods named after Convex Combinatorial Coefficient Method and Power Increment Method respectively based on linear programming problem for solving ED are proposed by the piecewise linear approximation to the nonlinear convex fuel cost functions. Numerical testing results show that the methods are effective and efficient.

  10. 76 FR 2402 - Maritime Security Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters

    Science.gov (United States)

    2011-01-13

    ... Directive 104-6 (Rev 5); Guidelines for U.S. Vessels Operating in High Risk Waters AGENCY: Coast Guard, DHS... designated high risk waters, and provides additional counter-piracy guidance and mandatory measures for these... MARSEC Directives are available at your local Captain of the Port (COTP) office. Phone numbers and...

  11. 75 FR 29358 - Maritime Security Directive 104-6 (Rev 2 and 3); Guidelines for U.S. Vessels Operating in High...

    Science.gov (United States)

    2010-05-25

    ... designated high risk waters, and provides additional anti-piracy guidance and mandatory measures for these vessels operating in these areas where acts of piracy and armed robbery against ships are prevalent... piratical activities. The combination of piracy and weak rule of law in the region offers a potential...

  12. Synergies between Communicable and Noncommunicable Disease Programs to Enhance Global Health Security.

    Science.gov (United States)

    Kostova, Deliana; Husain, Muhammad J; Sugerman, David; Hong, Yuling; Saraiya, Mona; Keltz, Jennifer; Asma, Samira

    2017-12-01

    Noncommunicable diseases are the leading cause of death and disability worldwide. Initiatives that advance the prevention and control of noncommunicable diseases support the goals of global health security in several ways. First, in addressing health needs that typically require long-term care, these programs can strengthen health delivery and health monitoring systems, which can serve as necessary platforms for emergency preparedness in low-resource environments. Second, by improving population health, the programs might help to reduce susceptibility to infectious outbreaks. Finally, in aiming to reduce the economic burden associated with premature illness and death from noncommunicable diseases, these initiatives contribute to the objectives of international development, thereby helping to improve overall country capacity for emergency response.

  13. (In)security factor atomic bomb. An analysis of the crisis with the Iranian nuclear program

    International Nuclear Information System (INIS)

    Bock, Andreas

    2012-04-01

    Iran is a rational actor in the international politics that decides on the basis of the perception of threat. Iran's security situation is comparable with that of Israel with the rational consequence to rely on the atomic program with respect to deterrence and self-defense. The solution of the Iran crisis is basically dependent on a change of the perception of threat. A military act against the Iranian nuclear facilities would be counterproductive, would only slowing down the program but not prevent further activities. In fact a military act would enhance the perception of threat. For the analysis of the Iran crises the author used the Cuba crisis as blueprint, were mislead perceptions were responsible for the escalation.

  14. Coast guard : better logistics planning needed to aid operational decisions related to the deployment of the national security cutter and its support assets.

    Science.gov (United States)

    2009-07-01

    As part of its more than $$24 billion Deepwater program to replace aging vessels and aircraft with new or upgraded assets, the Coast Guard is preparing the National Security Cutter (NSC) for service. GAO previously reported on Deepwater assets' deplo...

  15. Impact of the National Food Supplementary Program for Children on Household Food Security and Maternal Weight Status in Iran.

    Science.gov (United States)

    Ghodsi, Delaram; Omidvar, Nasrin; Eini-Zinab, Hassan; Rashidian, Arash; Raghfar, Hossein

    2016-01-01

    Food aid programs are strategies that aim to improve nutritional status and to tackle food insecurity. This study aimed to evaluate the effect of a National Food Supplementary Program for Children on households' food security. The study sample included 359 mothers of children aged 6-72 months under the coverage of the program in two provinces of Iran. Demographic and socioeconomic characteristics of the households and percentage of supplementary food items consumed by target child were assessed by a questionnaire and checklist. Data on household food security were collected by locally adapted Household Food Insecurity Access Scale at the baseline of the study and 6 months thereafter. At the baseline, only 4.7% of families were food secure, while 43.5% were severely food insecure, and these proportions were changed to 7.9% and 38%, respectively ( P security in the baseline and at the end of the study ( P > 0.05). Findings show that the food supplementary program for children can also improve the household food security status. Further research is needed to assess other factors that affect the effectiveness of this kind of programs.

  16. Irradiation effects in low-alloy reactor pressure vessel steels (Heavy-Section Steel Technology program series 4 and 5)

    International Nuclear Information System (INIS)

    McGowan, J.J.; Nanstad, R.K.; Thoms, K.R.; Menke, B.H.

    1985-01-01

    This report presents studies on the irradiation effects in low-alloy reactor pressure vessel steels. The Fourth Heavy-Section Steel Technology (HSST) Irradiation Series, almost completed, was aimed at elastic-plastic and fully plastic fracture toughness of low-copper weldments (''current practice welds''). A typical nuclear pressure vessel plate steel was included for statistical purposes. The Fifth HSST Irradiation Series, now in progress, is aimed at determining the shape of the K/sub IR/ curve after significant radiation-induced shift of the transition temperatures. This series includes irradiated test specimens of thicknesses up to 100 mm and weldment compositions typical of early nuclear power reactor pressure vessel welds. 27 refs., 22 figs

  17. National programs for the development and development of the culture of Security in the nuclear activities in Cuba

    International Nuclear Information System (INIS)

    Ferro Fernandez, R.; Guillen Campos, A.; Arnau Fernandez, A.

    2003-01-01

    From their appearance, as a result of the investigations of the accident in the Nuclear Power station of Chernobyl, the term Culture of Security has been considered a key element to achieve a elevated level of security in the nuclear facilities, becoming a basic principle of security, grateful internationally. The Organ Cuban Regulator understood from very early the importance of to promote and to develop attitudes and characteristic in the organizations and the personnel linked to the nuclear sector that you/they reflected a high culture of security, for to propitiate a bigger involvement of all in the topics of security and in that way to contribute significantly to the prevention of accidents in the nuclear facilities. Although the Program Nuclear Cuban suffered serious reductions in the decade of the years 90, the Organ Regulator has continuous working in this address, assimilating all the international experience for its application in their strategies of development of the culture of security in the nuclear activities that today they are executed in the country. The present work picks up the Cuban experience in the conformation of a National Program for the development and development of the Culture of Security

  18. Source Security Program in the Philippines: a lost source search experience

    International Nuclear Information System (INIS)

    Romallosa, Kristine M.; Salabit, Maria T.; Caseria, Estrella; Valdezco, Eulinia

    2008-01-01

    The Philippine Nuclear Research Institute (PNRI), the national agency in the licensing and regulations of radioactive materials in the country, is strengthening its capabilities in the security of radioactive sources. Part of this program is the PNRI's participation in the Regional Security of Radioactive Sources (RSRS) Project of the Australian Nuclear Science and Technology Organization (ANSTO). The project has provided equipment and methods training, assistance in the development of PNRI's own training program and support for actual orphan source search activities. On May 2007, a source search for the two lost Cs-137 level gauges of a steel manufacturing company was conducted by the PNRI and ANSTO. The source search are the: a) Development of instrument and source search training for the team, the National Training Workshop on Orphan Source Searches which was organized and conducted as a result of train-the-trainors fellowship under the RSRS project; and b) Planning and implementation of the lost source search activity. The conduct of the actual search on warehouses, product yard, canals, dust storage, steel making building, scrap yards and nearby junk shops of the steel plant took one week. The week-long search did not find the lost sources. However, naturally occurring radioactive materials identified to be Thorium, were found on sands, bricks and sack piles that are stored and/or generally present in the warehouses, yard and steel making building. The search activity had therefore cleared the facility of the lost source and its corresponding hazards. The NORM found present in the plant's premises on the other hand brought the attention of the management of the needed measures to ensure safety of the staff from possible hazards of these materials. Currently, the course syllabus that was developed is continuously enhanced to accommodate the training needs of the PNRI staff particularly for the emergency response and preparedness. This component of the source

  19. Nuclear security personnel for power plants. Content and review procedures for a security training and qualification program

    International Nuclear Information System (INIS)

    1978-06-01

    The applicant and licensee training and qualification plans will outline the process by which guard, watchman, armed response persons and other members of the security organization will be selected, trained, equipped and qualified. This plan should contain: (1) job descriptions for all security positions; (2) duties defined for all positions; (3) critical tasks defined for all duties; (4) skills, knowledge and abilities defined for all critical tasks; (5) performance objectives stated for all critical tasks; and (6) training and qualification plans to train and test to appropriate performance objectives. The document gives guidance on the preparation of this training and qualification plan and contains three parts: (1) an introduction to and brief explanation of job analysis and performance objectives; (2) a statement of the information that should be submitted in response to the requirements and the NRR review procedures; and (3) a sample qualification submittal

  20. [Theoretic basis on the same therapeutic program for different degenerative brain diseases in terms of the Governor Vessel: Alzheimer's disease and Parkinson's disease].

    Science.gov (United States)

    Wu, Junyan; Wang, Jie; Zhang, Junlong

    2015-05-01

    Through the consultation of TCM ancient classical theory, the relationship of kidney essence, marrow and brain is analyzed. It is discovered that the degenerative brain diseases, represented by Alzheimer's disease (AD) and Parkinson's disease (PD) share the same etiological basis as "kidney essence deficiency and brain marrow emptiness" and have the mutual pathological outcomes as yang qi declining. The Governor Vessel gathers yang qi of the whole body and maintains the normal functional activity of zangfu organs in the human body through the storage, regulation and invigoration of yang qi. It is viewed that the theory of the Governor Vessel is applied to treat the different degenerative brain diseases, which provides the theoretic support and practice guide for the thought of TCM as the same therapeutic program for the different diseases. As a result, the degenerative brain diseases can be retarded and the approach is provided to the effective prevention and treatment of degenerative diseases in central nerve system:

  1. Analisis Remaining Life dan Penjadwalan Program Inspeksi pada Pressure Vessel dengan Menggunakan Metode Risk Based Inspection (RBI

    Directory of Open Access Journals (Sweden)

    Dyah Arina Wahyu Lillah

    2017-01-01

    Full Text Available Seiring perkembangan eksplorasi minyak dan gas bumi di dunia, perusahaan minyak dan gas di Indonesia juga turut berlomba-lomba untuk mendapatkan ladang minyak dan gas bumi sebanyak-banyaknya. Perkembangan ini turut dipengaruhi oleh aturan-aturan pemerintah mengenai keselamatan dan pencegahan bahaya baik pada unit yang dikelola maupun tenaga kerja pengelola. Untuk itu semua perlatan-peralatan (unit kerja harus dijamin kehandalaannya agar tidak menimbulkan bahaya baik bagi pekerja maupun lingkungan. Subjek penelitian dalam tugas akhir ini ialah pada pressure vessel yang dimiliki oleh Terminal LPG Semarang. Kemungkinan bahaya yang dapat menyebabkan kerusakan pada pressure vessel perlu dianalisis agar dapat meminimalkan resiko yang akan terjadi. Metode Risk Based Inspection (RBI diharapkan dapat meminimalkan resiko yang ada pada pressure vessel. Penilaian resiko dalam tugas akhir ini mengacu pada standar API RP 581. Untuk mengetahui besarnya resiko yang ada pada plant, maka terlebih dahulu harus dihitung besarnya probabilitas kegagalan dan konsekuensi apabila terjadi kegagalan. Langkah selanjutnya ialah membandingkan besarnya resiko yang didapat dengan target resiko yang dimiliki oleh perusahaan. Dari hasil perbandingan ini dapat diketahui tingkat resiko pressure vessel, sehingga dapat ditentukan jadwal inspeksi dan metode inspeksi yang tepat.

  2. Oregon's Gun Relief Program for Adjudicated Mentally Ill Persons: The Psychiatric Security Review Board.

    Science.gov (United States)

    Britton, Juliet; Bloom, Joseph D

    2015-06-01

    This article describes the State of Oregon's implementation of two programs designed to comply with federal gun laws regarding reporting individuals who have received mental health adjudications in criminal and civil courts. One mandate requires that states submit names of adjudicated individuals to the National Instant Criminal Background Check System (NICS) while the second requires that the state establish a qualifying gun restoration program for those disqualified from gun ownership. In 2009, Oregon's Legislature developed an administrative approach to gun restoration and assigned the responsibility for conducting these hearing to the Oregon Psychiatric Security Review Board (PSRB). The PSRB is a state administrative board that has existed since 1977 and has been primarily focused on the supervision and treatment of adult and juvenile insanity acquittees. The gun restoration program began in 2010, but to date has only received three completed petitions requesting restoration of firearm rights. The article concludes with a discussion that surmises why very few of the Oregonians who are listed in NICS have submitted petitions for relief. Copyright © 2015 John Wiley & Sons, Ltd.

  3. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    Energy Technology Data Exchange (ETDEWEB)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services.

  4. Safeguards and Security FY 1996 Program Plan: WBS 6.6

    International Nuclear Information System (INIS)

    Lee, F.D.

    1995-08-01

    The Safeguards and Security (SAS) Program is based upon integrity, competence and innovation in the protection of the public and Hanford resources through: (1) outstanding assistance, oversight, education, and counsel to their customers to ensure the protection of the public, site personnel, assets, and information; (2) value-added and cost-effective solutions to Hanford issues; and (3) risk management techniques to ensure effective asset protection, site accessibility, and the flexibility to adapt to changing customer needs. This plan is divided into two parts: overview and SAS WBS (work breakdown structure) dictionary sheets. The overview is divided into vision and mission, goals and objectives, assumptions and priorities, milestones, and a summary. The SAS WBS dictionary sheets are divided into department overhead, general and administrative, sitewide support, Hanford patrol, traffic safety, and locksmith services

  5. Approaches for building community participation: A qualitative case study of Canadian food security programs.

    Science.gov (United States)

    Hyett, Nerida; Kenny, Amanda; Dickson-Swift, Virginia

    2017-10-01

    There is increasing opportunity and support for occupational therapists to expand their scope of practice in community settings. However, evidence is needed to increase occupational therapists' knowledge, confidence, and capacity with building community participation and adopting community-centered practice roles. The purpose of this study is to improve occupational therapists' understanding of an approach to building community participation, through case study of a network of Canadian food security programs. Qualitative case study was utilized. Data were semistructured interviews, field observations, documents, and online social media. Thematic analysis was used to identify and describe four themes that relate to processes used to build community participation. The four themes were use of multiple methods, good leaders are fundamental, growing participation via social media, and leveraging outcomes. Occupational therapists can utilize an approach for building community participation that incorporates resource mobilization. Challenges of sustainability and social exclusion must be addressed.

  6. Analyzing the greenhouse gas impact potential of smallholder development actions across a global food security program

    Science.gov (United States)

    Grewer, Uwe; Nash, Julie; Gurwick, Noel; Bockel, Louis; Galford, Gillian; Richards, Meryl; Costa Junior, Ciniro; White, Julianna; Pirolli, Gillian; Wollenberg, Eva

    2018-04-01

    This article analyses the greenhouse gas (GHG) impact potential of improved management practices and technologies for smallholder agriculture promoted under a global food security development program. Under ‘business-as-usual’ development, global studies on the future of agriculture to 2050 project considerable increases in total food production and cultivated area. Conventional cropland intensification and conversion of natural vegetation typically result in increased GHG emissions and loss of carbon stocks. There is a strong need to understand the potential greenhouse gas impacts of agricultural development programs intended to achieve large-scale change, and to identify pathways of smallholder agricultural development that can achieve food security and agricultural production growth without drastic increases in GHG emissions. In an analysis of 134 crop and livestock production systems in 15 countries with reported impacts on 4.8 million ha, improved management practices and technologies by smallholder farmers significantly reduce GHG emission intensity of agricultural production, increase yields and reduce post-harvest losses, while either decreasing or only moderately increasing net GHG emissions per area. Investments in both production and post-harvest stages meaningfully reduced GHG emission intensity, contributing to low emission development. We present average impacts on net GHG emissions per hectare and GHG emission intensity, while not providing detailed statistics of GHG impacts at scale that are associated to additional uncertainties. While reported improvements in smallholder systems effectively reduce future GHG emissions compared to business-as-usual development, these contributions are insufficient to significantly reduce net GHG emission in agriculture beyond current levels, particularly if future agricultural production grows at projected rates.

  7. Developments in the Nuclear Safeguards and Security Engineering Degree Program at Tomsk Polytechnic University

    International Nuclear Information System (INIS)

    Boiko, Vladimir I.; Demyanyuk, Dmitry G.; Silaev, Maxim E.; Duncan, Cristen L.; Heinberg, Cynthia L.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.

    2009-01-01

    Over the last six years, Tomsk Polytechnic University (TPU) has developed a 5 1/2 year engineering degree program in the field of Material Protection Control and Accounting (MPC and A). In 2009 the first students graduated with this new degree. There were 25 job offers from nuclear fuel cycle enterprises of Russia and Kazakhstan for 17 graduates of the program. Due to the rather wide selection of workplaces, all graduates have obtained positions at nuclear enterprises. The program was developed within the Applied Physics and Engineering Department (APED). The laboratory and methodological base has been created taking into consideration the experience of the similar program at the Moscow Engineering Physics Institute (MEPhI). However, the TPU program has some distinguishing features such as the inclusion of special courses pertaining to fuel enrichment and reprocessing. During the last two years, three MPC and A laboratories have been established at APED. This was made possible due to several factors such as establishment of the State innovative educational program at TPU, assistance of the U.S. Department of Energy through Pacific Northwest National Laboratory and Los Alamos National Laboratory, and the financial support of the Swedish Radiation Safety Authority and some Russian private companies. All three of the MPC and A laboratories are part of the Innovative Educational Center 'Nuclear Technologies and Non-Proliferation,' which deals with many topics including research activities, development of new curricula for experts training and retraining, and training of master's students. In 2008, TPU developed a relationship with the International Atomic Energy Agency (IAEA), which was familiarized with APED's current resources and activities. The IAEA has shown interest in creation of a master's degree educational program in the field of nuclear security at TPU. A future objective is to acquaint nuclear fuel cycle enterprises with new APED capabilities and involve

  8. Revised VESCAL: Vessel calibration data analysis program. Improvement of a model for non-linear parts of annular and slab tanks

    International Nuclear Information System (INIS)

    Yanagisawa, Hiroshi

    1995-05-01

    For the purpose of the nuclear material accountancy and control for NUCEF: the Nuclear Fuel Cycle Safety Engineering Research Facility, the vessel calibration data analysis program: VESCAL is revised, and a new model for non-linear parts of annular and slab tanks is added to the program. The new model has three unknown parameters, and liquid level is expressed as a square root function with respect to liquid volume. Using the new model, an accurate calibration function on the level and volume data for non-linear parts of annular and slab tanks can be obtained with the smaller number of unknown parameters, compared with a polynomial function model. As a result of benchmark tests for this revision, it was proved that numerical results computed with VESCAL well agreed with those by a statistical analysis program package which is widely used. In addition, the new model would be useful for carrying out data analyses on the vessel calibration at the other bulk handling facilities as well as at NUCEF. This paper describes summary of the program, computational methods and results of benchmark tests concerning this revision. (author)

  9. USCG Vessel

    Data.gov (United States)

    Department of Homeland Security — The Marine Casualty and Pollution Data files provide details about marine casualty and pollution incidents investigated by Coast Guard Offices throughout the United...

  10. The vessel fluence; Fluence cuve

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This book presents the proceedings of the technical meeting on the reactors vessels fluence. They are grouped in eight sessions: the industrial context and the stakes of the vessels control; the organization and the methodology for the fluence computation; the concerned physical properties; the reference computation methods; the fluence monitoring in an industrial context; vessels monitoring under irradiation; others methods in the world; the research and development programs. (A.L.B.)

  11. 33 CFR 104.240 - Maritime Security (MARSEC) Level coordination and implementation.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Level..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.240 Maritime Security (MARSEC) Level coordination and implementation. (a) The vessel owner or...

  12. LANL Robotic Vessel Scanning

    Energy Technology Data Exchange (ETDEWEB)

    Webber, Nels W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-11-25

    Los Alamos National Laboratory in J-1 DARHT Operations Group uses 6ft spherical vessels to contain hazardous materials produced in a hydrodynamic experiment. These contaminated vessels must be analyzed by means of a worker entering the vessel to locate, measure, and document every penetration mark on the vessel. If the worker can be replaced by a highly automated robotic system with a high precision scanner, it will eliminate the risks to the worker and provide management with an accurate 3D model of the vessel presenting the existing damage with the flexibility to manipulate the model for better and more in-depth assessment.The project was successful in meeting the primary goal of installing an automated system which scanned a 6ft vessel with an elapsed time of 45 minutes. This robotic system reduces the total time for the original scope of work by 75 minutes and results in excellent data accumulation and transmission to the 3D model imaging program.

  13. Analysis and monitoring of energy security and prediction of indicator values using conventional non-linear mathematical programming

    Directory of Open Access Journals (Sweden)

    Elena Vital'evna Bykova

    2011-09-01

    Full Text Available This paper describes the concept of energy security and a system of indicators for its monitoring. The indicator system includes more than 40 parameters that reflect the structure and state of fuel and energy complex sectors (fuel, electricity and heat & power, as well as takes into account economic, environmental and social aspects. A brief description of the structure of the computer system to monitor and analyze energy security is given. The complex contains informational, analytical and calculation modules, provides applications for forecasting and modeling energy scenarios, modeling threats and determining levels of energy security. Its application to predict the values of the indicators and methods developed for it are described. This paper presents a method developed by conventional nonlinear mathematical programming needed to address several problems of energy and, in particular, the prediction problem of the security. An example of its use and implementation of this method in the application, "Prognosis", is also given.

  14. 33 CFR 157.450 - Maneuvering and vessel status information.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Interim Measures for Certain Tank Vessels Without Double Hulls Carrying Petroleum Oils...

  15. Connected Vehicle Pilot Deployment Program phase 1 : security management operating concept : New York City : final report.

    Science.gov (United States)

    2016-05-18

    This document describes the Security Management Operating Concept (SMOC) for the New York City Department of Transportation (NYCDOT) Connected Vehicle Pilot Deployment (CVPD) Project. This SMOC outlines the security mechanisms that will be used to pr...

  16. Experiences in control system design aided by interactive computer programs: temperature control of the laser isotope separation vessel

    International Nuclear Information System (INIS)

    Gavel, D.T.; Pittenger, L.C.; McDonald, J.S.; Cramer, P.G.; Herget, C.J.

    1985-01-01

    A robust control system has been designed to regulate temperature in a vacuum vessel. The thermodynamic process is modeled by a set of nonlinear, implicit differential equations. The control design and analysis task exercised many of the computer-aided control systems design software packages, including MATLAB, DELIGHT, and LSAP. The working environment is a VAX computer. Advantages and limitations of the software and environment, and the impact on final controller design is discussed

  17. Experiences in control system design aided by interactive computer programs: Temperature control of the laser isotope separation vessel

    Science.gov (United States)

    Gavel, D. T.; Pittenger, L. C.; McDonald, J. S.; Cramer, P. G.; Herget, C. J.

    A robust control system has been designed to regulate temperature in a vacuum vessel. The thermodynamic process is modeled by a set of nonlinear, implicit differential equations. The control design and analysis task exercised many of the computer-aided control systems design software packages, including MATLAB, DELIGHT, AND LSAP. The working environment is a VAX computer. Advantages and limitations of the software and environment, and the impact on final controller design is discussed.

  18. Energy Security and Restoration Exercise Program/Best Practices and Information Sharing

    Energy Technology Data Exchange (ETDEWEB)

    Barbara McCabe; John Kovach

    2009-03-30

    The first year of this cooperative agreement focused on the following elements: curriculum development and presentation, curriculum maintenance, enhancements, and effectiveness, and smart card initiative. During the second year of this grant, with redirection from DOE, the IUOE modified its mission statement under the cooperative agreement. It states: 'The mission of the IUOE is to provide expertise to provide best practices, information sharing, and develop scenarios and conduct exercises ranging in size and complexity from table top to national level to prepare all stakeholders to protect and restore energy infrastructure should an event, terrorist or natural, occur'. The Program developed a number of products under this Cooperative Agreement. These products include: FOSTER (Facility Operations Safety Training Event Response) Curriculum and Training Models, Alternative Energy Supply - Generators Training Module, Liquefied Natural Gas Training Module, Education Program - Distributed Generations, Compendium of Resources and References, Energy Security and Restoration Training Manual, Manual of Situations and Scenarios Developed for Emergency Exercises, Manual of Best Practices/Lessons Learned for Energy Load Management, Training Plan, Strategic Information and Exercise Plan, National Certification Plan Report, and a Smart Card Project Report.

  19. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  20. Program to develop acoustic emission-flaw relationship for inservice monitoring of nuclear pressure vessels. Annual report, July 1, 1976 - October 1, 1977

    Energy Technology Data Exchange (ETDEWEB)

    Hutton, P.H.; Kurtz, R.J.; Schwenk, E.B.; Pavloff, C.

    1978-06-01

    Laboratory mechanical tests were conducted to evaluate AE during uniaxial tensile, fracture and fatigue crack growth in A533B pressure vessel steel. The A533B steel included two heats of Class 1, one heat of Class 2 and a weldment made for the Heavy Section Steel Technology (HSST) Program. Specimen types included uniaxial tensile specimens, size 2 compact tension specimens for fatigue crack growth and fracture tests, and a single-edge notch specimen also for fatigue crack growth through material that was uniformly strained 3% prior to fatigue testing. In addition, AE monitoring was conducted on the HSST V-7B 6-inch thick pressure vessel test. AE data were partitioned into four ranges of signal amplitude and rise time. All the AE data were analyzed, with respect to mechanical behavior of A533B steel. Linear elastic fracture mechanics analysis methods were used to relate AE parameters to fracture and fatigue crack growth parameters. AE data from the V-7B vessel test were correlated with stress intensity factor and crack opening displacement. AE data from the fatigue crack growth tests were investigated using models based on fatigue crack growth rate, fatigue crack area and theoretical crack tip plastic zone size.

  1. Program to develop acoustic emission-flaw relationship for inservice monitoring of nuclear pressure vessels. Annual report, July 1, 1976--October 1, 1977

    International Nuclear Information System (INIS)

    Hutton, P.H.; Kurtz, R.J.; Schwenk, E.B.; Pavloff, C.

    1978-03-01

    Laboratory mechanical tests were conducted to evaluate AE during uniaxial tensile, fracture and fatigue crack growth in A533B pressure vessel steel. The A533B steel included two heats of Class 1, one heat of Class 2 and a weldment made for the Heavy Section Steel Technology (HSST) Program. Specimen types included uniaxial tensile specimens, size 2 compact tension specimens for fatigue crack growth and fracture tests, and a single-edge notch specimen also for fatigue crack growth through material that was uniformly strained 3% prior to fatigue testing. In addition, AE monitoring was conducted on the HSST V-7B 6-inch thick pressure vessel test. AE data were partitioned into four ranges of signal amplitude and rise time. All the AE data were analyzed, with respect to mechanical behavior of A533B steel. Linear elastic fracture mechanics analysis methods were used to relate AE parameters to fracture and fatigue crack growth parameters. AE data from the V-7B vessel test were correlated with stress intensity factor and crack opening displacement. AE data from the fatigue crack growth tests were investigated using models based on fatigue crack growth rate, fatigue crack area and theoretical crack tip plastic zone size

  2. An overview of experimental results obtained under the prestressed concrete nuclear pressure vessel development program at the Oak Ridge National Laboratory

    International Nuclear Information System (INIS)

    Naus, D.J.

    1979-01-01

    Under the Prestressed Concrete Nuclear Pressure Development Program at the Oak Ridge National Laboratory, various aspects of Prestressed Concrete Pressure Vessels (PCPVs) are investigated with respect to reliability, structural performance, constructability, and economy. These investigations are conducted under the High-Temperature Gas-Cooled Reactor (HTGR) Program and the Gas-Cooled Fast Reactor (GCFR) Program. The objectives are to: (1) provide technical support to ongoing PCPV design activities, (2) contribute to the overall technological data base, and (3) provide independent review and evaluations. Specific areas of interest at present include finite-element analysis development, materials and structural behaviour tests, instrumentation evaluations and development, and structural model tests. The following provides an overview of both the HTGR and GCFR PCPV activities and a summary of recent experimental results

  3. Financial Sector Assessment Program : Malaysia - IOSCO Objectives and Principles of Securities Regulation

    OpenAIRE

    World Bank; International Monetary Fund

    2013-01-01

    The Securities Commission Malaysia (SC), as the supervisor of the capital markets, has developed a robust supervisory framework that exhibits high levels of implementation of the International Organization of Securities Commissions Objectives and Principles of Securities Regulation (IOSCO Principles) in most areas. The SC's independence will be buttressed by some changes to the legal provi...

  4. Maritime Training Serbian Autonomous Vessel Protection Detachment

    Directory of Open Access Journals (Sweden)

    Šoškić Svetislav D.

    2014-06-01

    Full Text Available The crisis in Somalia has caused appearance of piracy at sea in the Gulf of Aden and the Western Indian Ocean. Somali pirates have become a threat to economic security of the world because almost 30 percent of world oil and 20 percent of global trade passes through the Gulf of Aden. Solving the problem of piracy in this part of the world have included international organizations, institutions, military alliances and the states, acting in accordance with international law and UN Security Council resolutions. The European Union will demonstrate the application of a comprehensive approach to solving the problem of piracy at sea and the crisis in Somalia conducting naval operation — EU NAVFOR Atalanta and operation EUTM under the Common Security and Defense Policy. The paper discusses approaches to solving the problem of piracy in the Gulf of Aden and the crisis in Somalia. Also, the paper points to the complexity of the crisis in Somalia and dilemmas correctness principles that are applied to solve the problem piracy at sea. One of goals is protections of vessels of the World Food Programme (WFP delivering food aid to displaced persons in Somalia. Republic of Serbia joined in this mission and trained and sent one a autonomous team in this military operation for protection WFP. This paper consist the problem of modern piracy, particularly in the area of the Horn of Africa became a real threat for the safety of maritime ships and educational process of Serbian Autonomous vessel protection detachment. Serbian Military Academy adopted and developed educational a training program against piracy applying all the provisions and recommendations of the IMO conventions and IMO model courses for Serbian Autonomous vessel protection detachment.

  5. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  6. Security Transition Program Office (STPO), technology transfer of the STPO process, tools, and techniques

    Energy Technology Data Exchange (ETDEWEB)

    Hauth, J.T.; Forslund, C.R.J.; Underwood, J.A.

    1994-09-01

    In 1990, with the transition from a defense mission to environmental restoration, the U.S. Department of Energy`s (DOE`s) Hanford Site began a significant effort to diagnose, redesign, and implement new safeguards and security (SAS) processes. In 1992 the Security Transition Program Office (STPO) was formed to address the sweeping changes that were being identified. Comprised of SAS and other contractor staff with extensive experience and supported by staff experienced in organizational analysis and work process redesign, STPO undertook a series of tasks designed to make fundamental changes to SAS processes throughout the Hanford Site. The goal of STPO is to align the SAS work and organization with the new Site mission. This report describes the key strategy, tools, methods, and techniques used by STPO to change SAS processes at Hanford. A particular focus of this review is transferring STPO`s experience to other DOE sites and federal agency efforts: that is, to extract, analyze, and provide a critical review of the approach, tools, and techniques used by STPO that will be useful to other DOE sites and national laboratories in transitioning from a defense production mode to environmental restoration and other missions. In particular, what lessons does STPO provide as a pilot study or model for implementing change in other transition activities throughout the DOE complex? More broadly, what theoretical and practical contributions do DOE transition efforts, such as STPO, provide to federal agency streamlining efforts and attempts to {open_quotes}reinvent{close_quotes} government enterprises in the public sector? The approach used by STPO should provide valuable information to those examining their own processes in light of new mission requirements.

  7. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    Science.gov (United States)

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  8. Family conflict, emotional security, and child development: translating research findings into a prevention program for community families.

    Science.gov (United States)

    Cummings, E Mark; Schatz, Julie N

    2012-03-01

    The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.

  9. 32 CFR 728.44 - Members of security assistance training programs, foreign military sales, and their ITO...

    Science.gov (United States)

    2010-07-01

    ..., foreign military sales, and their ITO authorized dependents. 728.44 Section 728.44 National Defense... § 728.44 Members of security assistance training programs, foreign military sales, and their ITO... patient is an ITO authorized dependent), grade or rate, country of origin, diagnosis, type of elective...

  10. 75 FR 56015 - Vessel Inspection Alternatives

    Science.gov (United States)

    2010-09-15

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 46 CFR Part 8 Vessel Inspection Alternatives CFR... Certificate; (ii) International Tonnage Certificate; (iii) Cargo Ship Safety Construction Certificate; (iv) Cargo Ship Safety Equipment Certificate; and (v) International Oil Pollution Prevention Certificate; and...

  11. Assessment of the Groundwater Protection Program Y-12 National Security Complex, Oak Ridge, Tennessee

    International Nuclear Information System (INIS)

    2005-01-01

    The following report contains an assessment of the Y-12 Groundwater Protection Program (GWPP) for the Y-12 National Security Complex at the Oak Ridge Reservation, Tennessee. The GWPP is administered by BWXT Y-12, L.L.C. for the purpose of groundwater surveillance monitoring. After over 20 years of extensive site characterization and delineation efforts, groundwater in the three hydrogeologic areas that comprise the Y-12 Complex requires a long-term monitoring network strategy that will efficiently satisfy surveillance monitoring objectives set forth in DOE Order 450.1. The GWPP assessment consisted of two phases, a qualitative review of the program and a quantitative evaluation of the groundwater monitoring network using the Monitoring and Remediation Optimization System (MAROS) software methodology. The specific objective of the qualitative section of the review of the GWPP was to evaluate the methods of data collection, management, and reporting and the function of the monitoring network for the Y-12 facility using guidance from regulatory and academic sources. The results of the qualitative review are used to suggest modifications to the overall program that would be consistent with achieving objectives for long-term groundwater monitoring. While cost minimization is a consideration in the development of the monitoring program, the primary goal is to provide a comprehensive strategy to provide quality data to support site decision making during facility operations, long-term resource restoration, and property redevelopment. The MAROS software is designed to recommend an improved groundwater monitoring network by applying statistical techniques to existing historic and current site analytical data. The MAROS methodology also considers hydrogeologic factors, regulatory framework, and the location of potential receptors. The software identifies trends and suggests components for an improved monitoring plan by analyzing individual monitoring wells in the current

  12. Development programs of cutting-edge technologies for measurement and detection of nuclear material for safeguards and security

    International Nuclear Information System (INIS)

    Seya, Michio; Wakabayashi, Shuji; Naoi, Yosuke; Ohkubo, Michiaki; Senzaki, Masao

    2011-01-01

    The Integrated Support Center for Nuclear Nonproliferation and Nuclear Security ('ISCN', hereafter) of Japan Atomic Energy Agency (JAEA) has development programs of cutting-edge technologies for measurement and detection of nuclear materials for nuclear safeguards and security, under the sponsorship of Japanese government (MEXT: Ministry of Education, Culture, Sports, Science and Technology). ISCN started development programs of the following technologies this year. (1) NRF (Nuclear Resonance Fluorescence) NDA technology using laser Compton scattering (LCS) gamma-rays, (2) Alternative to 3 He neutron detection technology using inorganic solid scintillator. ISCN is also going to conduct a demonstration test of a spent fuel Pu-NDA system that is to be developed by LANL (Los Alamos National Laboratory) using very sophisticated neutron measurement technologies, under JAEA/USDOE cooperation agreement. This presentation shows the above programs of ISCN. (author)

  13. Enhancing effectiveness of agriculture group in supporting government program to increase food security

    Science.gov (United States)

    Retnowati, Daru; Subarjo, A. H.

    2018-05-01

    Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.

  14. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  15. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  16. The information systems security officer's guide establishing and managing an information protection program

    CERN Document Server

    Kovacich, Gerald L

    2003-01-01

    Information systems security continues to grow and change based on new technology and Internet usage trends. In order to protect your organization's confidential information, you need information on the latest trends and practical advice from an authority you can trust. The new ISSO Guide is just what you need. Information Systems Security Officer's Guide, Second Edition, from Gerald Kovacich has been updated with the latest information and guidance for information security officers. It includes more information on global changes and threats, managing an international information secur

  17. Containment vessel

    International Nuclear Information System (INIS)

    Zbirohowski-Koscia, K.F.; Roberts, A.C.

    1980-01-01

    A concrete containment vessel for nuclear reactors is disclosed that is spherical and that has prestressing tendons disposed in first, second and third sets, the tendons of each set being all substantially concentric and centred around a respective one of the three orthogonal axes of the sphere; the tendons of the first set being anchored at each end at a first anchor rib running around a circumference of the vessel, the tendons of the second set being anchored at each end at a second anchor rib running around a circumference of the sphere and disposed at 90 0 to the first rib, and the tendons of the third set being anchored some to the first rib and the remainder to the second rib. (author)

  18. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    Science.gov (United States)

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  19. Minutes of the 13th light water reactor pressure vessel surveillance dosimetry improvement program (LWR-PV-SDIP) meeting

    International Nuclear Information System (INIS)

    1984-04-01

    Information is presented concerning ASTM LWR standards and program documentation; trend curves, PSF, and other test reactor metallurgical programs; PSF dosimetry and metallurgical capsule neutron and gamma environment characterization and metallurgical studies; PVS characterization program; other neutron fields; surveillance dosimetry measurement facility (SDMF) and perturbation studies; transport theory calculations; gamma field benchmarks and photo-reaction studies; and fission and non-fission sensor inventories and quality assurance

  20. From DDR to Security Promotion: Connecting national programs to community initiatives

    NARCIS (Netherlands)

    Verkoren, W.; Willems, R.C.; Kleingeld, J.; Rouw, H.

    2010-01-01

    Disarmament, demobilization and reintegration (DDR) is a set of activities that forms part of strategies for peacebuilding after civil war. DDR has become the standard way of addressing security threats in immediate post-conflict situations. However, DDR is designed to promote national security,

  1. 76 FR 31971 - New Agency Information Collection Activity Under OMB Review: Security Program for Hazardous...

    Science.gov (United States)

    2011-06-02

    ... Carrier Division will be producing a voluntary security-related training course for the Hazmat motor... voluntary security-related training course to the Hazardous Materials (Hazmat) motor carrier and shipper... using appropriate automated, electronic, mechanical, or other technological collection techniques or...

  2. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  3. Results in Developing an Engineering Degree Program in Safeguards and Security of Nuclear Materials at Moscow Engineering Physics Institute

    International Nuclear Information System (INIS)

    Kryuchkov, Eduard F.; Geraskin, Nikolay I.; Killinger, Mark H.; Goodey, Kent O.; Butler, Gilbert W.; Duncan, Cristen L.

    2007-01-01

    The world's first master's degree program in nuclear safeguards and security, established at Moscow Engineering Physics Institute (MEPhI), has now graduated nine classes of students. Most of the graduates have gone on to work at government agencies, research organizations, or obtain their PhD. In order to meet the demand for safeguards and security specialists at nuclear facilities, MEPhI established a 5-1/2 year engineering degree program that provides more hands-on training desired by facilities. In February 2004, the first students began their studies in the new discipline Nuclear Material Safeguards and Nonproliferation. This class, as well as other subsequent classes, included students who started the program in their third year of studies, as the first 2-1/2 years consists of general engineering curriculum. Fourteen students made up the first graduating class, receiving their engineering degrees in February 2007. The topics addressed in this paper include specific features of the program caused by peculiarities of Russian education legislation and government quality control of academic education. This paper summarizes the main joint actions undertaken by MEPhI and the US National Laboratories in conjunction with the U.S. Department of Energy, to develop the engineering degree program. Also discussed are the program's specific training requirements, student internships, and job placement. The paper concludes with recommendations from a recent international seminar on nonproliferation education and training

  4. The National Shipbuilding Reseaerch Program, Proceedings of the IREAPS Technical Symposium, Paper No. 8: Modern Ship Repair Technology Applied to Naval Vessels (The National Shipbuilding Research Program)

    Science.gov (United States)

    1982-09-01

    ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 20 19a. NAME OF RESPONSIBLE...progressed; and, on netowrks of a higher level. This feature enables the user to reschedule work as the situation changes. Moreover, impact of late

  5. Vacuum vessel for thermonuclear device

    International Nuclear Information System (INIS)

    Kikuchi, Mitsuru; Nagashima, Keisuke; Suzuki, Masaru; Onozuka, Masaki.

    1997-01-01

    A vacuum vessel main body and structural members at the inside and the outside of the vacuum vessel main body are constituted by structural materials activated by irradiation of neutrons from plasmas such as stainless steels. Shielding members comprising tungsten or molybdenum are disposed on the surface of the vacuum vessel main body and the structural members of the inside and the outside of the main body. The shielding members have a function also as first walls or a seat member for the first walls. Armor tiles may be disposed to the shielding members. The shielding members and the armor tiles are secured to a securing seat member disposed, for example, to an inner plate of the vacuum vessel main body by bolts. Since the shielding members are disposed, it is not necessary to constitute the vacuum vessel main body and the structural members at the inside and the outside thereof by using a low activation material which is less activated, such as a titanium alloy. (I.N.)

  6. Vacuum vessel for thermonuclear device

    Energy Technology Data Exchange (ETDEWEB)

    Kikuchi, Mitsuru; Nagashima, Keisuke [Japan Atomic Energy Research Inst., Tokyo (Japan); Suzuki, Masaru; Onozuka, Masaki

    1997-07-11

    A vacuum vessel main body and structural members at the inside and the outside of the vacuum vessel main body are constituted by structural materials activated by irradiation of neutrons from plasmas such as stainless steels. Shielding members comprising tungsten or molybdenum are disposed on the surface of the vacuum vessel main body and the structural members of the inside and the outside of the main body. The shielding members have a function also as first walls or a seat member for the first walls. Armor tiles may be disposed to the shielding members. The shielding members and the armor tiles are secured to a securing seat member disposed, for example, to an inner plate of the vacuum vessel main body by bolts. Since the shielding members are disposed, it is not necessary to constitute the vacuum vessel main body and the structural members at the inside and the outside thereof by using a low activation material which is less activated, such as a titanium alloy. (I.N.)

  7. Report: FISMA - Fiscal Year 2004 Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2004-S-00007, September 30, 2004. This report synopsizes the results of information technology security work the U.S. Environmental Protection Agency’s Office of Inspector General (OIG) performed during Fiscal Year (FY) 2004.

  8. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  9. Performance Testing of Homeland Security Technologies in U.S. EPA's Environmental Technology Verification (ETV) Program

    National Research Council Canada - National Science Library

    Kelly, Thomas J; Hofacre, Kent C; Derringer, Tricia L; Riggs, Karen B; Koglin, Eric N

    2004-01-01

    ... (reports and test plans available at www.epa.gov/etv). In the aftermath of the terrorist attacks of September 11, 2001, the ETV approach has also been employed in performance tests of technologies relevant to homeland security (HS...

  10. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Science.gov (United States)

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  11. The Port Security Grant Program: Good Enough, or Can it be Made Better

    Science.gov (United States)

    2016-06-01

    Statement of William O. Jenkins , Jr., Director Homeland Security and Justice, GAO 12-526T (Washington, DC, 2012) 4- 11, http://www.gao.gov/assets/590...127 de Rugy, “What Does Homeland Security Spending Buy?,” 13. 128 Yacov Haimes, Joost Santos, Kenneth Crowther, Matthew Henry ...Preparedness Grants and Assessing National Capabilities: Continuing Challenges Impede FEMA’s Progress, Statement of William O. Jenkins , Jr

  12. Y-12 National Security Complex Biological Monitoring And Abatement Program 2008 Calendar Year Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M. J.; Greeley Jr., M. S.; Mathews, T. J.; Morris, G. W.; Roy, W. K.; Ryon, M. G.; Smith, J. G.; Southworth, G. R.

    2009-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located off

  13. Package of programs for calculating accidents involving melting of the materials in a fast-reactor vessel

    International Nuclear Information System (INIS)

    Vlasichev, G.N.

    1994-01-01

    Methods for calculating one-dimensional nonstationary temperature distribution in a system of physically coupled materials are described. Six computer programs developed for calculating accident processes for fast reactor core melt are described in the article. The methods and computer programs take into account melting, solidification, and, in some cases, vaporization of materials. The programs perform calculations for heterogeneous systems consisting of materials with arbitrary but constant composition and heat transfer conditions at material boundaries. Additional modules provide calculations of specific conditions of heat transfer between materials, the change in these conditions and configuration of the materials as a result of coolant boiling, melting and movement of the fuel and structural materials, temperature dependences of thermophysical properties of the materials, and heat release in the fuel. 11 refs., 3 figs

  14. Y-12 Groundwater Protection Program CY 2009 Triennial Report Of The Monitoring Well Inspection And Maintenance Program, Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-06-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspection events conducted on active and inactive wells at Y-12 during calendar years (CY) 2007 through 2009; it documents well maintenance and plugging and abandonment activities completed since the last triennial inspection event (CY 2006); and provides summary tables of well inspection events, well maintenance events, and well plugging and abandonment events during the reference time period.

  15. Visual interface for the automation of the instrumented pendulum of Charpy tests used in the surveillance program of reactors vessel of nuclear power plants

    International Nuclear Information System (INIS)

    Rojas S, A.S.; Sainz M, E.; Ruiz E, J.A.

    2004-01-01

    Inside the Programs of Surveillance of the nuclear power stations periodic information is required on the state that keep the materials with those that builds the vessel of the reactor. This information is obtained through some samples or test tubes that are introduced inside the core of the reactor and it is observed if its physical characteristics remain after having been subjected to the radiation changes and temperature. The rehearsal with the instrumented Charpy pendulum offers information on the behavior of fracture dynamics of a material. In the National Institute of Nuclear Research (ININ) it has an instrumented Charpy pendulum. The operation of this instrument is manual, having inconveniences to carry out rehearsals with radioactive material, handling of high and low temperatures, to fulfill the normative ones for the realization of the rehearsals, etc. In this work the development of a computational program is presented (virtual instrument), for the automation of the instrumented pendulum. The system has modules like: Card of data acquisition, signal processing, positioning system, tempered system, pneumatic system, compute programs like it is the visual interface for the operation of the instrumented Charpy pendulum and the acquisition of impact signals. This system shows that given the characteristics of the nuclear industry with radioactive environments, the virtual instrumentation and the automation of processes can contribute to diminish the risks to the personnel occupationally exposed. (Author)

  16. Design of A Vibration and Stress Measurement System for an Advanced Power Reactor 1400 Reactor Vessel Internals Comprehensive Vibration Assessment Program

    International Nuclear Information System (INIS)

    Ko, Doyoung; Kim, Kyuhyung

    2013-01-01

    In accordance with the US Nuclear Regulatory Commission (US NRC), Regulatory Guide 1.20, the reactor vessel internals comprehensive vibration assessment program (RVI CVAP) has been developed for an Advanced Power Reactor 1400 (APR1400). The purpose of the RVI CVAP is to verify the structural integrity of the reactor internals to flow-induced loads prior to commercial operation. The APR1400 RVI CVAP consists of four programs (analysis, measurement, inspection, and assessment). Thoughtful preparation is essential to the measurement program, because data acquisition must be performed only once. The optimized design of a vibration and stress measurement system for the RVI CVAP is essential to verify the integrity of the APR1400 RVI. We successfully designed a vibration and stress measurement system for the APR1400 RVI CVAP based on the design materials, the hydraulic and structural analysis results, and performance tests of transducers in an extreme environment. The measurement system designed in this paper will be utilized for the APR1400 RVI CVAP as part of the first construction project in Korea

  17. DESIGN OF A VIBRATION AND STRESS MEASUREMENT SYSTEM FOR AN ADVANCED POWER REACTOR 1400 REACTOR VESSEL INTERNALS COMPREHENSIVE VIBRATION ASSESSMENT PROGRAM

    Directory of Open Access Journals (Sweden)

    DO-YOUNG KO

    2013-04-01

    Full Text Available In accordance with the US Nuclear Regulatory Commission (US NRC, Regulatory Guide 1.20, the reactor vessel internals comprehensive vibration assessment program (RVI CVAP has been developed for an Advanced Power Reactor 1400 (APR1400. The purpose of the RVI CVAP is to verify the structural integrity of the reactor internals to flow-induced loads prior to commercial operation. The APR1400 RVI CVAP consists of four programs (analysis, measurement, inspection, and assessment. Thoughtful preparation is essential to the measurement program, because data acquisition must be performed only once. The optimized design of a vibration and stress measurement system for the RVI CVAP is essential to verify the integrity of the APR1400 RVI. We successfully designed a vibration and stress measurement system for the APR1400 RVI CVAP based on the design materials, the hydraulic and structural analysis results, and performance tests of transducers in an extreme environment. The measurement system designed in this paper will be utilized for the APR1400 RVI CVAP as part of the first construction project in Korea.

  18. Nevada National Security Site 2014 Data Report: Groundwater Monitoring Program Area 5 Radioactive Waste Management Site

    Energy Technology Data Exchange (ETDEWEB)

    Hudson, David [National Security Technologies, LLC. (NSTec), Las Vegas, NV (United States)

    2015-02-01

    This report is a compilation of the groundwater sampling results from the Area 5 Radioactive Waste Management Site (RWMS) at the Nevada National Security Site, Nye County, Nevada. Groundwater samples from the aquifer immediately below the Area 5 RWMS have been collected and analyzed and static water levels have been measured in this aquifer since 1993. This report updates these data to include the 2014 results. Analysis results for leachate contaminants collected from the mixed-waste cell at the Area 5 RWMS (Cell 18) are also included. During 2014, groundwater samples were collected and static water levels were measured at three wells surrounding the Area 5 RWMS. Groundwater samples were collected at wells UE5PW-1, UE5PW-2, and UE5PW-3 on March 11 and August 12, 2014, and static water levels were measured at each of these wells on March 10, June 2, August 11, and October 14, 2014. Groundwater samples were analyzed for the following indicators of contamination: pH, specific conductance, total organic carbon, total organic halides, and tritium. General water chemistry (cations and anions) was also measured. Results from samples collected in 2014 are within the limits established by agreement with the Nevada Division of Environmental Protection for each analyte. The data from the shallow aquifer indicate that there has been no measurable impact to the uppermost aquifer from the Area 5 RWMS, and there were no significant changes in measured groundwater parameters compared to previous years. Leachate from above the primary liner of Cell 18 drains into a sump and is collected in a tank at the ground surface. Cell 18 began receiving waste in January 2011. Samples were collected from the tank when the leachate volume approached the 3,000-gallon tank capacity. Leachate samples have been collected 16 times since January 2011. During 2014, samples were collected on February 25, March 5, May 20, August 12, September 16, November 11, and December 16. Each leachate sample was

  19. SITREP: The NPS Maritime Defense and Security Research Program Newsletter ; v. 48 (July-August 2010)

    OpenAIRE

    2010-01-01

    This issue of The NPS Maritime Domain Protection Newsletter includes information on The Technology Cooperation Program (TTCP) Maritime (MAR), RAND Corporation Maritime Programs, Librarians Corner, and Future Events.

  20. Factors associated with household food security of participants of the MANA food supplement program in Colombia.

    Science.gov (United States)

    Hackett, Michelle; Melgar-Quiñonez, Hugo; Taylor, Christopher A; Alvarez Uribe, Martha Cecilia

    2010-03-01

    The objective of this study was to explore demographic and economic characteristics associated with household food security of 2,784 low-income households with pre-school aged children receiving food supplements from the Colombian Plan for Improving Food and Nutrition in Antioquia - MANA (Mejoramiento Alimentario y Nutricional de Antioquia) in the Department of Antioquia, Colombia. Included in the study was a 12-item household food security survey was collected from a cross-sectional, stratified random sample of MANA participants in which households were characterized as food secure, mildly food insecure, moderately food insecure, and severely food insecure. It was hypothesized that household food security status would be strongly associated with demographic characteristics, food expenditure variables, and food supplement consumption by children in MANA. Food insecure households were characterized by more members, older parents, and lower income (p < 0.0001). Rural residence and female head of households had higher rates of food insecurity (p < 0.01). Food insecure households had the lowest monthly expenditures food (p < 0.0001). Severely food insecure households saved the highest percentage of per capita food expenditure from consuming MANA supplements (p < 0.0001), similarly, MANA food supplement intakes were greatest in households reporting the most food insecurity (p < 0.001). The results of this study are important to describe characteristics of the population benefiting from the MANA nutrition intervention by their unique level of household food security status.

  1. Y-12 National Security Complex Biological Monitoring and Abatement Program 2007 Calendar Yeare Report

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, M.J.; Greeley, M. S. Jr.; Morris, G. W.; Roy, W. K.; Ryan, M. G.; Smith, J. G.; Southworth, G. R.

    2008-07-01

    The National Pollutant Discharge Elimination System (NPDES) permit issued for the Oak Ridge Y-12 National Security Complex (Y-12 Complex) which became effective May 1, 2006, continued a requirement for a Biological Monitoring and Abatement Program (BMAP). The BMAP was originally developed in 1985 to demonstrate that the effluent limitations established for the Y-12 Complex protected the classified uses of the receiving stream (East Fork Poplar Creek: EFPC), in particular, the growth and propagation of aquatic life (Loar et al. 1989). The objectives of the current BMAP are similar, specifically to assess stream ecological conditions relative to regulatory limits and criteria, to assess ecological impacts as well as recovery in response to Y-12 operations, and to investigate the causes of continuing impacts. The BMAP consists of three tasks that reflect complementary approaches to evaluating the effects of the Y-12 Complex discharges on the biotic integrity of EFPC. These tasks include: (1) bioaccumulation monitoring, (2) benthic macroinvertebrate community monitoring, and (3) fish community monitoring. As required by the NPDES permit, the BMAP benthic macroinvertebrate community monitoring task includes studies to annually evaluate the receiving stream's biological integrity in comparison to TN Water Quality Criteria. BMAP monitoring is currently being conducted at five primary EFPC sites, although sites may be excluded or added depending upon the specific objectives of the various tasks. Criteria used in selecting the sites include: (1) location of sampling sites used in other studies, (2) known or suspected sources of downstream impacts, (3) proximity to U.S. Department of Energy (DOE) Oak Ridge Reservation (ORR) boundaries, (4) appropriate habitat distribution, and (5) access. The primary sampling sites include upper EFPC at kilometers (EFKs) 24.4 and 23.4 [upstream and downstream of Lake Reality (LR) respectively]; EFK 18.7 (also EFK 18.2 and 19), located

  2. Evaluating Security Assistance Programs: Performance Evaluation and the Expanded International Military Education and Training (E-IMET) Program

    National Research Council Canada - National Science Library

    Calhoun, Todd

    1998-01-01

    In 1991 the International Military Education and Training (IMET) program was expanded to include training programs focusing on civilian control over the military, respect for human rights, and responsible defense resource management...

  3. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  4. End-to-End Verification of Information-Flow Security for C and Assembly Programs

    Science.gov (United States)

    2016-04-01

    seL4 security verification [18] avoids this issue in the same way. In that work, the authors frame their solution as a restriction that disallows...identical: (σ, σ′1) ∈ TM ∧ (σ, σ′2) ∈ TM =⇒ Ol(σ′1) = Ol(σ′2) The successful security verifications of both seL4 and mCertiKOS provide reasonable...evidence that this restriction on specifications is not a major hindrance for usability. Unlike the seL4 verification, however, our framework runs into a

  5. BWRVIP-140NP: BWR Vessel and Internals Project Fracture Toughness and Crack Growth Program on Irradiated Austenitic Stainless Steel

    International Nuclear Information System (INIS)

    Gilman, J.

    2005-01-01

    To prepare for this project, EPRI and BWRVIP conducted a workshop at Ponte Vedra Beach, Florida during February 19-21, 2003 (EPRI report 1007822). Attendees were invited to exchange relevant information on the effects of irradiation on austenitic materials in light water reactors and to produce recommendations for further work. EPRI reviewed the data, recommendations, and conclusions derived from the workshop and developed prioritized test matrices defining new data needs. Proposals were solicited, and selected proposals are the basis for the program described in this report. Results The planned test matrix for fracture toughness testing includes 21 tests on 5 materials

  6. Integrated Food and Nutrition Security Programming to Address Undernutrition : The Plan Approach

    NARCIS (Netherlands)

    Boer, de F.A.; Verdonk, I.

    2012-01-01

    From a technical point of view, it is widely recognised that an integrated approach to food and nutrition security is an effective way to promote child nutritional well-being. In this desk review, based on project documents of the countries which took part in the PLAN NL supported Food and Nutrition

  7. The Social Security Program and the Private Sector Alternative: Lessons from History.

    Science.gov (United States)

    Quadagno, Jill

    1987-01-01

    Used historical evidence to analyze how private sector benefits worked in the past in light of the debate surrounding the Social Security benefits and the federal deficit. Among conclusions reached are that the private sector failed to provide adequate protection for older citizens, and that benefits were inequitably distributed on basis of gender…

  8. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    Science.gov (United States)

    Boutnaru, Shlomi; Hershkovitz, Arnon

    2015-01-01

    In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…

  9. Apparatus for carrying out ultrasonic inspection of pressure vessels

    International Nuclear Information System (INIS)

    Dent, K.H.; Greenhalgh, F.G.

    1975-01-01

    An apparatus is described for moving an ultrasonic scanning mechanism over the interior surface of a pressure vessel and comprising a mast for supporting the scanning mechanism inside the vessel and a carriage for traversing the mast within the vessel, the mast being pivotably secured to the carriage so that when the ultrasonic scanning mechanism contacts the interior surface of the pressure vessel the mast is caused to pivot. (auth)

  10. Y-12 Groundwater Protection Program CY2012 Triennial Report Of The Monitoring Well Inspection And Maintenance Program Y-12 National Security Complex, Oak Ridge, Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    None

    2013-09-01

    This document is the triennial report for the Well Inspection and Maintenance Program of the Y- 12 Groundwater Protection Program (GWPP), at the U.S. Department of Energy (DOE) Y-12 National Security Complex (Y-12). This report formally documents well inspections completed by the GWPP on active and inactive wells at Y-12 during calendar years (CY) 2010 through 2012. In addition, this report also documents well inspections performed under the Y-12 Water Resources Restoration Program, which is administered by URS|CH2M Oak Ridge (UCOR). This report documents well maintenance activities completed since the last triennial inspection event (CY 2009); and provides summary tables of well inspections and well maintenance activities during the reference time period.

  11. Vacuum vessel for plasma devices

    International Nuclear Information System (INIS)

    Yamada, Masao; Taguchi, Masami.

    1975-01-01

    Object: To permit effective utility of the space in the inner and outer sides of the container wall and also permit repeated assembly for use. Structure: Vacuum vessel wall sections are sealed together by means of welding bellows, and also flange portions formed at the end of the wall sections are coupled together by bolts and are sealed together with a seal ring and a seal cap secured by welding. (Nakamura, S.)

  12. PWR vessel flaw distribution development

    International Nuclear Information System (INIS)

    Rosinski, S.T.; Kennedy, E.L.; Foulds, J.R.; Kinsman, K.M.

    1990-01-01

    This paper reports on PWR pressure vessels which operate under NRC rules and regulatory guides intended to prevent failure of the vessels. Plants failing to meet the operating criteria specified under these rules and regulations are required to analytically demonstrate fitness for service in order to continue operation. The initial flaw size or distribution of initial vessel flaws is a key input to the required vessel integrity analyses. However, the flaw distribution assumed in the development of the NRC Regulations and recommended for the plant specific analyses is potentially over-conservative. This is because the distribution is based on the limited amount of vessel inspection data available at the time the criteria were being developed and does not take full advantage of the more recent and reliable domestic vessel inspection results. The U.S. Department of Energy is funding an effort through Sandia National Laboratories to investigate the possibility of developing a new flaw distribution based on the increased amount and improved reliability of domestic vessel inspection data. Results of Phase I of the program indicate that state-of-the-art NDE systems' capabilities are sufficient for development of a new flaw distribution that could ultimately provide life extension benefits over the presently required operating practice

  13. Building Economic Security Today: making the health-wealth connection in Contra Costa county's maternal and child health programs.

    Science.gov (United States)

    Parthasarathy, Padmini; Dailey, Dawn E; Young, Maria-Elena D; Lam, Carrie; Pies, Cheri

    2014-02-01

    In recent years, maternal and child health professionals have been seeking approaches to integrating the Life Course Perspective and social determinants of health into their work. In this article, we describe how community input, staff feedback, and evidence from the field that the connection between wealth and health should be addressed compelled the Contra Costa Family, Maternal and Child Health (FMCH) Programs Life Course Initiative to launch Building Economic Security Today (BEST). BEST utilizes innovative strategies to reduce inequities in health outcomes for low-income Contra Costa families by improving their financial security and stability. FMCH Programs' Women, Infants, and Children Program (WIC) conducted BEST financial education classes, and its Medically Vulnerable Infant Program (MVIP) instituted BEST financial assessments during public health nurse home visits. Educational and referral resources were also developed and distributed to all clients. The classes at WIC increased clients' awareness of financial issues and confidence that they could improve their financial situations. WIC clients and staff also gained knowledge about financial resources in the community. MVIP's financial assessments offered clients a new and needed perspective on their financial situations, as well as support around the financial and psychological stresses of caring for a child with special health care needs. BEST offered FMCH Programs staff opportunities to engage in non-traditional, cross-sector partnerships, and gain new knowledge and skills to address a pressing social determinant of health. We learned the value of flexible timelines, maintaining a long view for creating change, and challenging the traditional paradigm of maternal and child health.

  14. Vascular Function Is Improved After an Environmental Enrichment Program: The Train the Brain-Mind the Vessel Study.

    Science.gov (United States)

    Bruno, Rosa Maria; Stea, Francesco; Sicari, Rosa; Ghiadoni, Lorenzo; Taddei, Stefano; Ungar, Andrea; Bonuccelli, Ubaldo; Tognoni, Gloria; Cintoli, Simona; Del Turco, Serena; Sbrana, Silverio; Gargani, Luna; D'Angelo, Gennaro; Pratali, Lorenza; Berardi, Nicoletta; Maffei, Lamberto; Picano, Eugenio

    2018-06-01

    Environmental enrichment may slow cognitive decay possibly acting through an improvement in vascular function. Aim of the study was to assess the effects of a 7-month cognitive, social, and physical training program on cognitive and vascular function in patients with mild cognitive impairment. In a single-center, randomized, parallel-group study, 113 patients (age, 65-89 years) were randomized to multidomain training (n=55) or usual care (n=58). All participants underwent neuropsychological tests and vascular evaluation, including brachial artery flow-mediated dilation, carotid-femoral pulse wave velocity, carotid distensibility, and assessment of circulating hematopoietic CD34+ and endothelial progenitor cells. At study entry, an age-matched control group (n=45) was also studied. Compared with controls, patients had at study entry a reduced flow-mediated dilation (2.97±2.14% versus 3.73±2.06%; P =0.03) and hyperemic stimulus (shear rate area under the curve, 19.1±15.7 versus 25.7±15.1×10 -3 ; P =0.009); only the latter remained significant after adjustment for confounders ( P =0.03). Training improved Alzheimer disease assessment scale cognitive (training, 14.0±4.8 to 13.1±5.5; nontraining, 12.1±3.9 to 13.2±4.8; P for interaction visit×training=0.02), flow-mediated dilation (2.82±2.19% to 3.40±1.81%, 3.05±2.08% to 2.24±1.59%; P =0.006; P =0.023 after adjustment for diameter and shear rate area under the curve), and circulating hematopoietic CD34 + cells and prevented the decline in carotid distensibility (18.4±5.3 to 20.0±6.6, 23.9±11.0 to 19.5±7.1 Pa -1 ; P =0.005). The only clinical predictor of improvement of cognitive function after training was established hypertension. There was no correlation between changes in measures of cognitive and vascular function. In conclusion, a multidomain training program slows cognitive decline, especially in hypertensive individuals. This effect is accompanied by improved systemic endothelial function

  15. Vessel Operator System

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Operator cards are required for any operator of a charter/party boat and or a commercial vessel (including carrier and processor vessels) issued a vessel permit from...

  16. Non-proliferation, safeguards, and security for the fissile materials disposition program immobilization alternatives

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, R.A.; Jaeger, C.D.; Tolk, K.M. [Sandia National Labs., Albuquerque, NM (United States); Moore, L.R. [Lawrence Livermore National Lab., CA (United States)

    1996-05-01

    The Department of Energy is analyzing long-term storage and disposition alternatives for surplus weapons-usable fissile materials. A number of different disposition alternatives are being considered. These include facilities for storage, conversion and stabilization of fissile materials, immobilization in glass or ceramic material, fabrication of fissile material into mixed oxide (MOX) fuel for reactors, use of reactor based technologies to convert material into spent fuel, and disposal of fissile material using geologic alternatives. This paper will focus on how the objectives of reducing security and proliferation risks are being considered, and the possible facility impacts. Some of the areas discussed in this paper include: (1) domestic and international safeguards requirements, (2) non-proliferation criteria and measures, (3) the threats, and (4) potential proliferation, safeguards, and security issues and impacts on the facilities. Issues applicable to all of the possible disposition alternatives will be discussed in this paper. However, particular attention is given to the plutonium immobilization alternatives.

  17. Safeguarding critical e-documents implementing a program for securing confidential information assets

    CERN Document Server

    Smallwood, Robert F

    2012-01-01

    Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business records Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.Provides practical, step-by-step guidance o

  18. Maritime Defense and Security Research Program: Final Report, 2004-2011

    Science.gov (United States)

    2011-11-01

    Security: airports, military bases, heads of state, Super Bowl Critical Project Management Most recently, CID completed an analysis of the Hawaiian...to link the results, i.e. discovered keywords, back to the original documents for validation. Also the big picture needs to be updated and enhanced...and Network Layers using OPNET,‖ Proc. TTCP TP-9 ASW Systems & Technologies Panel Annual Meeting, Dartmouth, Nova Scotia, Canada, September 21-25

  19. A Policy and Program for Invigorating Science and Technology for National Security

    Science.gov (United States)

    2014-04-01

    security S&T, and facilitate commercialisation of research outcomes for national benefit. The policy will be delivered through a coherent and...our economy and higher living and education standards1,2. Questions for discussion: Q2.1 Are there other imperatives or drivers that justify the...organisations can drive the uptake of new technology and knowledge. Second, private sector organisations are essential to the commercialisation of

  20. What is Security? A perspective on achieving security

    Energy Technology Data Exchange (ETDEWEB)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  1. Determination of the Effectiveness of Information Security and Audit Accounting IT Informational Program

    Directory of Open Access Journals (Sweden)

    Riana Iren RADU

    2014-11-01

    Full Text Available In the current society, there are many options regarding the use of computer programs for the processing of accounting information. In this paper I propose to develop the method of approach, in terms of technical IT audit, for a program for the management of accounting information, i.e. an integrated ERP-CRM program, used by the majority of Romanian business.

  2. Instrumentation of a Charpy-pendulum. Additional data obtained from it and its application to nuclear reactor pressure vessels surveillance programs

    International Nuclear Information System (INIS)

    Chomik, Enrique P.; Dhers, Horacio; Iorio, Antonio F.; Ciriani, Dario F.

    1999-01-01

    Charpy test gives information about a material dynamic fracture behavior. In a plain Charpy test, this information is the absorbed energy during fracture of the specimen, lateral deformation and the percentage of ductile fracture of the specimen. These parameters can then be used for the determination of the material response to a dynamic applied load, and are used at present to determine the brittle-ductile transition temperature of a material. However, there is a lot of additional information that can be obtained from a Charpy test, which is vital for the case of surveillance programs of nuclear power plants, where it is necessary to get the most available information from the specimens to be tested, because each one of them was irradiated for many years under temperature and neutronic flux conditions similar to that of the internal surface of the reactor pressure vessel, which converts these specimens in unique and very expensive ones. This additional information can be obtained from the curve that determines the evolution of the applied force to the specimen throughout the time involved in its fracture. It was possible to instrument a Charpy pendulum at a fraction of the cost necessary to buy an instrumentation package like the ones available in the market, and since the instrumentation equipment obtained is easy to transport. It has the additional advantage that can be used to instrument any other pendulum replacing only the hammer of the pendulum with a instrumented one for that pendulum. (author)

  3. Integrating the Full Range of Security Cooperation Programs into Air Force Planning: An Analytic Primer

    Science.gov (United States)

    2011-01-01

    Exchange Program ( IEP ) Authority 10 U.S.C. §2358, “Research and development projects” Processes and agreements IEP agreements with the...2015.4, “Defense Research, Development, Test and Evaluation (RDT&E) Information Exchange Program ( IEP )”; DoDD 5134.1, “Under Secretary of Defense for

  4. Development of containers sealing system like part of surveillance program of the vessel in nuclear power plants; Desarrollo del sistema de sellado de contenedores como parte del programa de vigilancia de la vasija en nucleoelectricas

    Energy Technology Data Exchange (ETDEWEB)

    Romero C, J.; Hernandez C, R.; Fernandez T, F.; Rocamontes A, M.; Perez R, N. [ININ, Carretera Mexico-Toluca s/n, 52750 Ocoyoacac, Estado de Mexico (Mexico)], e-mail: jesus.romero@inin.gob.mx

    2009-10-15

    The owners of nuclear power plants should be demonstrate that the embrittlement effects by neutronic radiation do not commit the structural integrity from the pressure vessel of nuclear reactors, during conditions of routine operation and below postulate accident. For this reason, there are surveillance programs of vessels of nuclear power plants, in which are present surveillance capsules. A surveillance capsule is compound by the support, six containers for test tubes and dosimeters. The containers for test tubes are of two types: rectangular container for test tubes, Charpy V and Cylindrical Container for tension test tubes. These test tubes are subject to a same or bigger neutronic flow to that of vessel, being representative of vessel mechanical conditions. The test tubes are rehearsed to watch over the increase of embrittlement that presents the vessel. This work describes the development of welding system to seal the containers for test tubes, these should be filled with helium of ultra high purity, to a pressure of an atmosphere. In this system the welding process Gas Tungsten Arc Welding is used, a hermetic camera that allows to place the containers with three grades of freedom, a vacuum subsystem and pressure, high technology equipment's like: power source with integrated computer, arc starter of high frequency, helium flow controller, among others. Finally, the advances in the inspection system for the qualification of sealing system are mentioned, system that should measure the internal pressure of containers and the helium purity inside these. (Author)

  5. Metallurgy of steels for PWR pressure vessels

    International Nuclear Information System (INIS)

    Kepka, M.; Mocek, J.; Barackova, L.

    1980-01-01

    A survey and the chemical compositions are presented of reactor pressure vessel steels. The metallurgy is described of steel making for pressure vessels in Japan and the USSR. Both acidic and alkaline open-hearth steel is used for the manufacture of ingots. The leading world manufacturers of forging ingots for pressure vessels, however, exclusively use electric steel. Vacuum casting techniques are exclusively used. Experience is shown gained with the introduction of the manufacture of forging ingots for pressure vessels at SKODA, Plzen. The metallurgical procedure was tested utilizing alkaline open hearths, electric arc furnaces and facilities for vacuum casting of steel. Pure charge raw materials should be used for securing high steel purity. Prior to forging pressure vessel rings, not only should sufficiently big bottoms and heads be removed but also the ingot middle part should be scrapped showing higher contents of impurities and nonhomogeneous structure. (B.S.)

  6. Metallurgy of steels for PWR pressure vessels

    Energy Technology Data Exchange (ETDEWEB)

    Kepka, M; Mocek, J; Barackova, L [Skoda, Plzen (Czechoslovakia)

    1980-09-01

    A survey and the chemical compositions are presented of reactor pressure vessel steels. The metallurgy is described of steel making for pressure vessels in Japan and the USSR. Both acidic and alkaline open-hearth steel is used for the manufacture of ingots. The leading world manufacturers of forging ingots for pressure vessels, however, exclusively use electric steel. Vacuum casting techniques are exclusively used. Experience is shown gained with the introduction of the manufacture of forging ingots for pressure vessels at SKODA, Plzen. The metallurgical procedure was tested utilizing alkaline open hearths, electric arc furnaces and facilities for vacuum casting of steel. Pure charge raw materials should be used for securing high steel purity. Prior to forging pressure vessel rings, not only should sufficiently big bottoms and heads be removed but also the ingot middle part should be scrapped showing higher contents of impurities and nonhomogeneous structure.

  7. The implementation of nuclear security program and the improvement of physical protection in Indonesia: progress and challenges

    International Nuclear Information System (INIS)

    Khairul

    2009-01-01

    Full text: Non Proliferation of Nuclear Weapon Treaty (NPT), and the comprehensive safeguards agreements regime on IAEA model INFCIRC/153 Corr., nuclear safeguards systems have been operated for over three decades. Indonesia ratified the NPT agreement by Act No. 8 Year 1979. The government of the Republic of Indonesia is committed to general contribution in achieving a condition of safe, secure and peace the world in relation of nuclear energy utilization and to continue its strong support for the principles of the treaty. At that time Indonesian nuclear program was not as big as present programs. By time changes, the utilization of nuclear energy for peaceful purposes was significantly increasing based on the world's nuclear research and technology development. Nowadays, Indonesia has three research reactors and other nuclear installations for research activities. The first nuclear power plant is planned will operating on year 2016. National Nuclear Energy Agency (BATAN) as promoting body in Indonesia has several reactor research centers. They are located at different province such as Bandung nuclear research center, Yogyakarta nuclear research center and Serpong nuclear research center. As the research and development institution belongs to government BATAN has also develop research by using radioactive substances for peaceful purpose. At three reactor research center are used nuclear materials with different nuclear category. The biggest research reactor in Indonesia is located in national center for science and technology development or called PUSPIPTEK, Serpong district, Province of Banten. In Serpong nuclear research center comprise several nuclear installation such as research reactor G.A. Siwabessy (30 Mw thermal), fuel element production installation, experimental fuel element installation, radio metallurgy installation, radioisotopes installation, radioactive waste installation. The Serpong whole area is wide approximately 24 ha and including supporting

  8. 78 FR 40651 - Regulated Navigation Area; Special Buzzards Bay Vessel Regulation, Buzzards Bay, MA

    Science.gov (United States)

    2013-07-08

    ... Carrier Program RNA Regulated Navigation Area RA Technical Risk Assessment VMRS Vessel Movement Reporting... avoid the fragmentation of regulatory regimes as a vessel transits across State [[Page 40652

  9. Development of a program for calculation of second dose and securities in brachytherapy high dose rate

    International Nuclear Information System (INIS)

    Esteve Sanchez, S.; Martinez Albaladejo, M.; Garcia Fuentes, J. D.; Bejar Navarro, M. J.; Capuz Suarez, B.; Moris de Pablos, R.; Colmenares Fernandez, R.

    2015-01-01

    We assessed the reliability of the program with 80 patients in the usual points of prescription of each pathology. The average error of the calculation points is less than 0.3% in 95% of cases, finding the major differences in the axes of the applicators (maximum error -0.798%). The program has proved effective previously testing him with erroneous dosimetry. Thanks to the implementation of this program is achieved by the calculation of the dose and part of the process of quality assurance program in a few minutes, highlighting the case of HDR prostate due to having a limited time. Having separate data sheet allows each institution to its protocols modify parameters. (Author)

  10. Connected vehicle pilot deployment program phase 1, security management operational concept : ICF/Wyoming.

    Science.gov (United States)

    2016-03-14

    The Wyoming Department of Transportations (WYDOT) Connected Vehicle (CV) Pilot Deployment Program is intended to develop a suite of applications that utilize vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication technology to ...

  11. Connected vehicle pilot deployment program phase I : security management operational concept, Tampa Hillsborough Expressway Authority (THEA).

    Science.gov (United States)

    2016-05-01

    The Tampa Hillsborough Expressway Authority (THEA) Connected Vehicle (CV) Pilot Deployment Program is intended to develop a suite of applications that utilize vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication technology to re...

  12. 33 CFR 157.420 - Vessel specific watch policy and procedures.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) POLLUTION RULES FOR THE PROTECTION OF THE MARINE ENVIRONMENT RELATING TO TANK VESSELS CARRYING OIL IN BULK Interim Measures for Certain Tank Vessels Without Double Hulls Carrying Petroleum Oils...

  13. Reactor vessel head permanent shield

    International Nuclear Information System (INIS)

    Hankinson, M.F.; Leduc, R.J.; Richard, J.W.; Malandra, L.J.

    1989-01-01

    A nuclear reactor is described comprising: a nuclear reactor pressure vessel closure head; control rod drive mechanisms (CRDMs) disposed within the closure head so as to project vertically above the closure head; cooling air baffle means surrounding the control rod drive mechanisms for defining cooling air paths relative to the control rod drive mechanisms; means defined within the periphery of the closure head for accommodating fastening means for securing the closure head to its associated pressure vessel; lifting lugs fixedly secured to the closure head for facilitating lifting and lowering movements of the closure head relative to the pressure vessel; lift rods respectively operatively associated with the plurality of lifting lugs for transmitting load forces, developed during the lifting and lowering movements of the closure head, to the lifting lugs; upstanding radiation shield means interposed between the cooling air baffle means and the periphery of the enclosure head of shielding maintenance personnel operatively working upon the closure head fastening means from the effects of radiation which may emanate from the control rod drive mechanisms and the cooling air baffle means; and connecting systems respectively associated with each one of the lifting lugs and each one of the lifting rods for connecting each one of the lifting rods to a respective one of each one of the lifting lugs, and for simultaneously connecting a lower end portion of the upstanding radiation shield means to each one of the respective lifting lugs

  14. Oceanographic and meteorological data collected on expeditions of vessels in the academic fleet since 1994, submitted by the Rolling Deck to Repository (R2R) program

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This collection includes oceanographic and meteorological data collected during expeditions of vessels in the academic fleet. The data have been managed using the...

  15. Temperature profile data from XBT casts by participating vessels in NOAA's Volunteer Observing Ships Program, August - December 2001 (NODC Accession 0000635)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profiles were collected from XBT casts from the ENTERPRISE and other vessels from a world-wide distribution from 01 August 2001 to 03 December 2001. Data...

  16. Temperature profile data from XBT casts from cooperating vessels in support of the NOAA volunteer observing program, 2000-08 to 2001-07 (NODC Accession 0000528)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Temperature profiles were collected from XBT casts from NOAA Ship MILLER FREEMAN and other vessels from a world-wide distribution from 6 August 2000 to 21 July 2001....

  17. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  18. Irradiation embrittlement of reactor vessel steels

    International Nuclear Information System (INIS)

    Bros, J.

    2000-01-01

    From the historical decision of closing the Yankee Rowe NPP because of the uncertainties on the level of reactor pressure vessel neutron embrittlement, this paper reviews the technical-scientist bases of the degradation phenomena, and refers to the evolution of reactor pressure vessel radiation surveillance programs. (Author)

  19. Funding Homeland Security Programs at the State Level: A Multiple Policy Analysis

    Science.gov (United States)

    2014-12-01

    OPTIONS .....................................................................55 A. FRANCHISE FEE...that another payment for services program based on utilities usage, the franchise fee, was an illegal tax as it was applied. This action resulted in...and largest consumer of anhydrous ammonia. Sectors tied to national interest include: (1) food and agricultural with both production and animal disease

  20. 75 FR 4911 - Food Stamp Program: Eligibility and Certification Provisions of the Farm Security and Rural...

    Science.gov (United States)

    2010-01-29

    ... the State's Temporary Assistance for Needy Families (TANF) cash assistance or Medicaid programs... is adjusted annually for cost-of-living increases; allow States to simplify the Standard Utility Allowance (SUA) if the State elects to use the SUA rather than actual utility costs for all households...

  1. Stacking The Deck - Can We Better Develop Future Homeland Security Leaders With Formal Mentoring Programs?

    Science.gov (United States)

    2014-09-01

    integrity, trustworthy , strong work ethic, critical thinker, etc.), and a willing program participant with high expectations.73 Desired...interpersonal skills  Trustworthy , honest, and flexible  “A forward, global thinker who is available and has the Department’s and the mentee’s best...Employees . Mentoring Employees . Celebrating Accomplishments Explain the importance of good communication skills . Communications iviodei

  2. Cyber Forensics and Security as an ABET-CAC Accreditable Program

    Science.gov (United States)

    Wood, David F.; Kohun, Frederick G.; Ali, Azad; Paullet, Karen; Davis, Gary A.

    2010-01-01

    This paper frames the recent ABET accreditation model with respect to the balance between IS programs and innovation. With the current relaxation of the content of the information systems requirement by ABET, it is possible to include innovation into the accreditation umbrella. To this extent this paper provides a curricular model that provides…

  3. Designing time-of-use program based on stochastic security constrained unit commitment considering reliability index

    International Nuclear Information System (INIS)

    Nikzad, Mehdi; Mozafari, Babak; Bashirvand, Mahdi; Solaymani, Soodabeh; Ranjbar, Ali Mohamad

    2012-01-01

    Recently in electricity markets, a massive focus has been made on setting up opportunities for participating demand side. Such opportunities, also known as demand response (DR) options, are triggered by either a grid reliability problem or high electricity prices. Two important challenges that market operators are facing are appropriate designing and reasonable pricing of DR options. In this paper, time-of-use program (TOU) as a prevalent time-varying program is modeled linearly based on own and cross elasticity definition. In order to decide on TOU rates, a stochastic model is proposed in which the optimum TOU rates are determined based on grid reliability index set by the operator. Expected Load Not Supplied (ELNS) is used to evaluate reliability of the power system in each hour. The proposed stochastic model is formulated as a two-stage stochastic mixed-integer linear programming (SMILP) problem and solved using CPLEX solver. The validity of the method is tested over the IEEE 24-bus test system. In this regard, the impact of the proposed pricing method on system load profile; operational costs and required capacity of up- and down-spinning reserve as well as improvement of load factor is demonstrated. Also the sensitivity of the results to elasticity coefficients is investigated. -- Highlights: ► Time-of-use demand response program is linearly modeled. ► A stochastic model is proposed to determine the optimum TOU rates based on ELNS index set by the operator. ► The model is formulated as a short-term two-stage stochastic mixed-integer linear programming problem.

  4. Center for computer security: Computer Security Group conference. Summary

    Energy Technology Data Exchange (ETDEWEB)

    None

    1982-06-01

    Topics covered include: computer security management; detection and prevention of computer misuse; certification and accreditation; protection of computer security, perspective from a program office; risk analysis; secure accreditation systems; data base security; implementing R and D; key notarization system; DOD computer security center; the Sandia experience; inspector general's report; and backup and contingency planning. (GHT)

  5. Stress analysis of pressure vessels

    International Nuclear Information System (INIS)

    Kim, B.K.; Song, D.H.; Son, K.H.; Kim, K.S.; Park, K.B.; Song, H.K.; So, J.Y.

    1979-01-01

    This interim report contains the results of the effort to establish the stress report preparation capability under the research project ''Stress analysis of pressure vessels.'' 1978 was the first year in this effort to lay the foundation through the acquisition of SAP V structural analysis code and a graphic terminal system for improved efficiency of using such code. Software programming work was developed in pre- and post processing, such as graphic presentation of input FEM mesh geometry and output deformation or mode shope patterns, which was proven to be useful when using the FEM computer code. Also, a scheme to apply fracture mechanics concept was developed in fatigue analysis of pressure vessels. (author)

  6. Multiple shell pressure vessel

    International Nuclear Information System (INIS)

    Wedellsborg, B.W.

    1988-01-01

    A method is described of fabricating a pressure vessel comprising the steps of: attaching a first inner pressure vessel having means defining inlet and outlet openings to a top flange, placing a second inner pressure vessel, having means defining inlet and outlet opening, concentric with and spaced about the first inner pressure vessel and attaching the second inner pressure vessel to the top flange, placing an outer pressure vessel, having inlet and outlet openings, concentric with and spaced apart about the second inner pressure vessel and attaching the outer pressure vessel to the top flange, attaching a generally cylindrical inner inlet conduit and a generally cylindrical inner outlet conduit respectively to the inlet and outlet openings in the first inner pressure vessel, attaching a generally cylindrical outer inlet conduit and a generally cylindrical outer outlet conduit respectively to the inlet and outlet opening in the second inner pressure vessel, heating the assembled pressure vessel to a temperature above the melting point of a material selected from the group, lead, tin, antimony, bismuth, potassium, sodium, boron and mixtures thereof, filling the space between the first inner pressure vessel and the second inner pressure vessel with material selected from the group, filling the space between the second inner pressure vessel and the outer pressure vessel with material selected from the group, and pressurizing the material filling the spaces between the pressure vessels to a predetermined pressure, the step comprising: pressurizing the spaces to a pressure whereby the wall of the first inner pressure vessel is maintained in compression during steady state operation of the pressure vessel

  7. Nuclear proliferation and Latin American security : is the "Bomb" program dead in Brazil?

    OpenAIRE

    DeJesus, Eduardo De Jesus

    1994-01-01

    This thesis addresses the possibility of a Brazilian "hidden agenda" in order to support one of the most advanced nuclear research and nuclear power programs in Latin America. From the early 1970s to the late 1980s Brazilian military leaders pursued the development of nuclear weapons. With the emergence of democratic regimes during the 1980s, these covert projects were halted or terminated. The civilian administration in Brazil is now supporting an ambiguous and uncompromising position by ...

  8. NCRP Program Area Committee 3: Nuclear and Radiological Security and Safety.

    Science.gov (United States)

    Taylor, Tammy P; Buddemeier, Brooke

    2016-02-01

    Program Area Committee (PAC) 3 provides guidance and recommendations for response to nuclear and radiological incidents of both an accidental and deliberate nature. Leadership of PAC 3 was transitioned in March 2015, and the newly composed PAC has been working to delineate and then prioritize the landscape of possible activities for PAC 3. The major activity of PAC 3 during the past year was the establishment of Scientific Committee 3-1 to begin producing a report on Guidance for Emergency Responder Dosimetry.

  9. The National Guard State Partnership Program and Regional Security in the Western Balkans

    Science.gov (United States)

    2014-12-12

    educational system as well as youth movements are separated by ethnicity, which in turn leaves the young people susceptible to indoctrination and political...of the state to respond in natural emergencies.80 A testament of the effectiveness of the program is also its expansion from strictly mil-mil... testament of the friendship, we have deployed together to Afghanistan and continue to look for future military collaborations. Deployments are the

  10. The use of Photovoice to document and characterize the food security of users of community food programs in Iqaluit, Nunavut.

    Science.gov (United States)

    Lardeau, M-P; Healey, G; Ford, J

    2011-01-01

    Food insecurity is a chronic problem affecting Inuit communities. The most comprehensive assessment of Inuit food security to-date, the Inuit Health Survey, reported that 70% of Inuit pre-school children lived in 'food insecure' households. Food banks and soup kitchens are relatively new in the Arctic but the number of users is increasing. Little is known about the experience and determinants of food insecurity among food program users who are often among the most marginalized (socially and economically) in communities. The use of participatory research methods when working in the north of Canada can promote meaningful knowledge exchange with community members and this approach was used in the present 'Photovoice' research. Photovoice uses photography to develop a baseline understanding of an issue, in this case the experience and determinants of food insecurity among users of community food programs in Iqaluit, Nunavut. The target population includes those who face significant social and economic marginalization, an often neglected group in Arctic food systems research. Eight regular users of food programs were recruited and engaged in a Photovoice research project to document factors determining their daily food consumption. The research method was introduced in workshops and discussion included the ethical concerns related to photography and how to take pictures. Participants were supplied with digital cameras, and asked to answer the following question using photography: 'What aspects of your everyday life affect what you eat and how much you have to eat?'. In the final workshop, photographs were discussed among the group and participants identified key themes in the photographs, offering an understanding of food insecurity from their perspectives. The group then discussed what should be done with the knowledge gained. Factors improving food security were the customary systems for sharing 'country food', and the presence of social support networks in the

  11. 33 CFR 135.401 - Access to vessel, Certificates of Financial Responsibility.

    Science.gov (United States)

    2010-07-01

    ... HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Access, Denial, and Detention § 135.401 Access to vessel, Certificates of...

  12. Littoral Combat Vessels: Analysis and Comparison of Designs

    National Research Council Canada - National Science Library

    Christiansen, Bryan J

    2008-01-01

    .... The candidates are a Littoral Combat Ship with a surface warfare module, a National Security Cutter augmented with offensive and defensive weaponry, a "Sea Lance" inshore combat vessel, and a Combat...

  13. Paddy farmer households’ participation and food security level in special effort program in Seputih Raman sub-district of Central Lampung Regency

    Science.gov (United States)

    Rangga, K. K.; Syarief, Y. A.

    2018-03-01

    The objectives of this study are to study the participation of paddy farmers in the Special Effort program to increase paddy production, to study the level of household food security of paddy farmers, and to analyze the correlation between farmer participation and food security level of paddy farmers. The location was chosen purposively in Seputih Raman sub-district. The data were collected from December 2016 to February 2017. The population of this study was paddy farmers who participating in Special Effort program. The hypothesis was tested by using Spearman’s Rank correlation test. Farmer household’s food security was measured objectively based on the share of household’s food expenditure and subjectively based on the opinion, views, and attitudes or farmers’ opinions on food availability, food distribution, and household food consumption. This research showed that farmers’ participation in Special Effort program in Seputih Raman Sub Ditrict, Central Lampung Regency belonged to medium classification, household food security either objectively or subjectively was in food resistant condition of medium classification, and there was significant correlation between farmers’ participation and food security level of paddy farmer household.

  14. 78 FR 63235 - Tank Vessel Oil Transfers

    Science.gov (United States)

    2013-10-23

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2013-0522] Tank Vessel Oil Transfers... that it is considering new measures to reduce the risks of oil spills in oil transfer operations from...), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200 New Jersey Avenue...

  15. HTGR Base Technology Program. Task 2: concrete properties in nuclear environment. A review of concrete material systems for application to prestressed concrete pressure vessels

    International Nuclear Information System (INIS)

    Naus, D.J.

    1981-05-01

    Prestressed concrete pressure vessels (PCPVs) are designed to serve as primary pressure containment structures. The safety of these structures depends on a correct assessment of the loadings and proper design of the vessels to accept these loadings. Proper vessel design requires a knowledge of the component (material) properties. Because concrete is one of the primary constituents of PCPVs, knowledge of its behavior is required to produce optimum PCPV designs. Concrete material systems are reviewed with respect to constituents, mix design, placing, curing, and strength evaluations, and typical concrete property data are presented. Effects of extreme loadings (elevated temperature, multiaxial, irradiation) on concrete behavior are described. Finally, specialty concrete material systems (high strength, fibrous, polymer, lightweight, refractory) are reviewed. 235 references

  16. Probabilistic retinal vessel segmentation

    Science.gov (United States)

    Wu, Chang-Hua; Agam, Gady

    2007-03-01

    Optic fundus assessment is widely used for diagnosing vascular and non-vascular pathology. Inspection of the retinal vasculature may reveal hypertension, diabetes, arteriosclerosis, cardiovascular disease and stroke. Due to various imaging conditions retinal images may be degraded. Consequently, the enhancement of such images and vessels in them is an important task with direct clinical applications. We propose a novel technique for vessel enhancement in retinal images that is capable of enhancing vessel junctions in addition to linear vessel segments. This is an extension of vessel filters we have previously developed for vessel enhancement in thoracic CT scans. The proposed approach is based on probabilistic models which can discern vessels and junctions. Evaluation shows the proposed filter is better than several known techniques and is comparable to the state of the art when evaluated on a standard dataset. A ridge-based vessel tracking process is applied on the enhanced image to demonstrate the effectiveness of the enhancement filter.

  17. 46 CFR 185.340 - Vessels carrying vehicles.

    Science.gov (United States)

    2010-10-01

    ... and away from the vehicles freely in the event of fire or other disaster. The decks, where necessary... motors turned off and their emergency brakes set when the vessel is underway, and that the motors are not... vehicles or next to a loading ramp must have its wheels securely blocked, while the vessel is being...

  18. 46 CFR 122.340 - Vessels carrying vehicles.

    Science.gov (United States)

    2010-10-01

    ... vehicles freely in the event of fire or other disaster. The decks, where necessary, must be distinctly... their emergency brakes set when the vessel is underway, and that the motors are not started until the... loading ramp must have its wheels securely blocked, while the vessel is being navigated. (c) The master...

  19. 19 CFR 162.3 - Boarding and search of vessels.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Boarding and search of vessels. 162.3 Section 162.3 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF... Boarding and search of vessels. (a) General authority. A Customs officer, for the purpose of examining the...

  20. Improvement to reactor vessel

    International Nuclear Information System (INIS)

    1974-01-01

    The vessel described includes a prestressed concrete vessel containing a chamber and a removable cover closing this chamber. The cover is in concrete and is kept in its closed position by main and auxiliary retainers, comprising fittings integral with the concrete of the vessel. The auxiliary retainers pass through the concrete of the cover. This improvement may be applied to BWR, PWR and LMFBR type reactor vessel [fr

  1. Forecasting of the radioactive material transport demand for the Brazilian Nuclear Program and the security aspects

    International Nuclear Information System (INIS)

    Meldonian, Nelson Leon

    1979-01-01

    In the nuclear fuel cycle, a lot of radioactive materials are produced. These radioactive materials must be transported in order to promote the integration of the fuel cycle units. Considerations about the transport characteristics of radioactive material were made for each section of the fuel cycle. These considerations were based on the experience of several countries and in accordance with the International Atomic Energy Agency regulations. A prediction of transport demands for the Brazilian Nuclear Program until year 2.010 was made. The prediction refers mainly to the quantity of radioactive material produced in each section of the cycle the quantity of vehicles needed for the transport of these materials. Several safety aspects were considered specially, the accidents predictions for years 2.000 and 2.010. The accident probability in Brazilian railroads and highways was compared with that of the USA. (author)

  2. SNAP-Ed (Supplemental Nutrition Assistance Program-Education) Increases Long-Term Food Security among Indiana Households with Children in a Randomized Controlled Study.

    Science.gov (United States)

    Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A

    2016-11-01

    Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.

  3. ALICE HMPID Radiator Vessel

    CERN Document Server

    2003-01-01

    View of the radiator vessels of the ALICE/HMPID mounted on the support frame. Each HMPID module is equipped with 3 indipendent radiator vessels made out of neoceram and fused silica (quartz) windows glued together. The spacers inside the vessel are needed to stand the hydrostatic pressure. http://alice-hmpid.web.cern.ch/alice-hmpid

  4. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  5. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  6. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  7. Execution of a participatory supportive return to work program within the Dutch social security sector: a qualitative evaluation of stakeholders' perceptions.

    Science.gov (United States)

    Lammerts, Lieke; Schaafsma, Frederieke G; van Mechelen, Willem; Anema, Johannes R

    2016-04-14

    A process evaluation of a participatory supportive return to work program, aimed at workers without a (permanent) employment contract who are sick-listed due to a common mental disorder, revealed that this program was executed less successfully than similar programs evaluated in earlier studies. The program consisted of a participatory approach, integrated care and direct placement in competitive employment. Aim of this study was to get a better understanding of the execution of the program by evaluating stakeholders' perceptions. In the absence of an employer, the program was applied by the Dutch Social Security Agency, in collaboration with vocational rehabilitation agencies. Together with the sick-listed workers, these were the main stakeholders. Our research questions involved stakeholders' perceptions of the function(s) of the program, and their perceptions of barriers and facilitators for a successful execution of the program within the Dutch social security sector. Semi-structured interviews were held with five sick-listed workers, eight professionals of the Social Security Agency, and two case managers of vocational rehabilitation agencies. Interview topics were related to experiences with different components of the program. Selection of respondents was based on purposive sampling and continued until data saturation was reached. Content analysis was applied to identify patterns in the data. Two researchers developed a coding system, based on predefined topics and themes emerging from the data. Although perceived functions of some components of the program were as intended, all stakeholders stressed that the program often had not resulted in return to work. Perceived barriers for a successful execution were related to a poor collaboration between the Dutch Social Security Agency, vocational rehabilitation agencies and healthcare providers, the type of experienced (health) problems, time constraints, and limited job opportunities. For future implementation

  8. Containment vessel stability analysis

    International Nuclear Information System (INIS)

    Harstead, G.A.; Morris, N.F.; Unsal, A.I.

    1983-01-01

    The stability analysis for a steel containment shell is presented herein. The containment is a freestanding shell consisting of a vertical cylinder with a hemispherical dome. It is stiffened by large ring stiffeners and relatively small longitudinal stiffeners. The containment vessel is subjected to both static and dynamic loads which can cause buckling. These loads must be combined prior to their use in a stability analysis. The buckling loads were computed with the aid of the ASME Code case N-284 used in conjunction with general purpose computer codes and in-house programs. The equations contained in the Code case were used to compute the knockdown factors due to shell imperfections. After these knockdown factors were applied to the critical stress states determined by freezing the maximum dynamic stresses and combining them with other static stresses, a linear bifurcation analysis was carried out with the aid of the BOSOR4 program. Since the containment shell contained large penetrations, the Code case had to be supplemented by a local buckling analysis of the shell area surrounding the largest penetration. This analysis was carried out with the aid of the NASTRAN program. Although the factor of safety against buckling obtained in this analysis was satisfactory, it is claimed that the use of the Code case knockdown factors are unduly conservative when applied to the analysis of buckling around penetrations. (orig.)

  9. Security Injections 2.0: Increasing Engagement and Faculty Adoption Using Enhanced Secure Coding Modules for Lower-Level Programming Courses

    OpenAIRE

    Raina , Sagar; Taylor , Blair; Kaza , Siddharth

    2015-01-01

    Part 2: Software Security Education; International audience; Learning interventions based on modules are common in computer science education. Traditional learning modules that present a large amount of content in a linear format can lead to students skimming and skipping content resulting in lower student engagement and effectiveness. In this paper, we present theoretical support for increasing engagement and effectiveness of learning modules, describe a system that implements these principl...

  10. On the Adequacy of API 521 Relief-Valve Sizing Method for Gas-Filled Pressure Vessels Exposed to Fire

    DEFF Research Database (Denmark)

    Andreasen, Anders; Nieto, Marcos Zan; Borroni, Filippo

    2018-01-01

    sense of security. Often the vessel wall will be weakened by high temperatures, before the PRV relieving pressure is reached. In this article, a multiparameter study has been performed taking into consideration various vessel sizes, design pressures (implicitly vessel wall thickness), vessel operating...

  11. Food for Work Program and its Implications on Food Security: A Critical Review with a Practical Example from the Amhara Region, Ethiopia

    Directory of Open Access Journals (Sweden)

    Ashenafi Gedamu

    2006-10-01

    Full Text Available A systematic evaluation of food-for-work (FFW programs in Ethiopia is seriously lacking. Most of the few available reports indicate that these programs have reached very few achievements in terms of food security and reduction of poverty at large. As expressed by Holden et al. (2005, FFW programs are commonly aimed to produce or maintain potentially valuable public goods necessary to stimulate productivity and thus income growth. Natural resources management, like rural road construction, erosion control and afforestation of degraded lands can be mentioned as valuable measures which could stimulate productivity and agricultural growth. The poverty reduction and food security impact of food or cash for work activities are larger if they offer not only seasonal job opportunities to the rural community but also long term employment possibilities. This is more likely if the projects are regionally dispersed and combined with basic education. In the Ethiopian context, it was always questionable if the continuous boom in food aid (regardless of cash or food for work purposes was the solution for the long standing food insecurity and poverty crises in the country. The study discusses the efficiency of FFW programs that aimed to reduce rural poverty and ensure food security on the one hand, and the impact of the food aid on resource and time allocation of the participating households for own food production on the other. The study is based on a field research conducted at a FFW program project, in the Amhara region, Ethiopia run by the German Agency for Technical Cooperation (GTZ with the view of improving food security in the Amhara region, Ethiopia. A household theoretical model is used to analyze the sample data, whether FFW program may indeed reduce household food insecurity and/or has some crowding-out effects on labour allocation of participating households for own field production.

  12. Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union.

    Science.gov (United States)

    Bartholomew, James C; Pearson, Andrew D; Stenseth, Nils Chr; LeDuc, James W; Hirschberg, David L; Colwell, Rita R

    2015-01-01

    Addressing the threat of infectious diseases, whether natural, the results of a laboratory accident, or a deliberate act of bioterrorism, requires no corner of the world be ignored. The mobility of infectious agents and their rapid adaptability, whether to climate change or socioeconomic drivers or both, demand the science employed to understand these processes be advanced and tailored to a country or a region, but with a global vision. In many parts of the world, largely because of economic struggles, scientific capacity has not kept pace with the need to accomplish this goal and has left these regions and hence the world vulnerable to infectious disease outbreaks. To build scientific capability in a developing region requires cooperation and participation of experienced international scientists who understand the issues and are committed to educate the next generations of young investigators in the region. These efforts need to be coupled with the understanding and resolve of local governments and international agencies to promote an aggressive science agenda. International collaborative scientific investigation of infectious diseases not only adds significantly to scientific knowledge, but it promotes health security, international trust, and long-term economic benefit to the region involved. This premise is based on the observation that the most powerful human inspiration is that which brings peoples together to work on and solve important global challenges. The republics of the former Soviet Union provide a valuable case study for the need to rebuild scientific capacity as they are located at the crossroads where many of the world's great epidemics began. The scientific infrastructure and disease surveillance capabilities of the region suffered significant decline after the breakup of the Soviet Union. The U.S. Cooperative Threat Reduction (CTR) Program, a part of the U.S. Department of Defense, together with partner countries, have worked diligently to

  13. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  14. Fast Generation of Container Vessel Stowage Plans:Using mixed integer programming for optimal master planning and constraint based local search for slot planning

    OpenAIRE

    Pacino, Dario

    2012-01-01

    Containerization has changed the way the world perceives shipping. It is now possible to establish complex international supply chains that have minimized shipping costs. Over the past two decades, the demand for cost efficient containerized transportation has seen a continuous increase. In order to answer to this demand, shipping companies have deployed bigger container vessels, that nowadays can transport up to 18,000 containers and are wider than the extended Panama Canal. Like busses, con...

  15. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  16. Pressure vessel design manual

    CERN Document Server

    Moss, Dennis R

    2013-01-01

    Pressure vessels are closed containers designed to hold gases or liquids at a pressure substantially different from the ambient pressure. They have a variety of applications in industry, including in oil refineries, nuclear reactors, vehicle airbrake reservoirs, and more. The pressure differential with such vessels is dangerous, and due to the risk of accident and fatality around their use, the design, manufacture, operation and inspection of pressure vessels is regulated by engineering authorities and guided by legal codes and standards. Pressure Vessel Design Manual is a solutions-focused guide to the many problems and technical challenges involved in the design of pressure vessels to match stringent standards and codes. It brings together otherwise scattered information and explanations into one easy-to-use resource to minimize research and take readers from problem to solution in the most direct manner possible. * Covers almost all problems that a working pressure vessel designer can expect to face, with ...

  17. Tumor Blood Vessel Dynamics

    Science.gov (United States)

    Munn, Lance

    2009-11-01

    ``Normalization'' of tumor blood vessels has shown promise to improve the efficacy of chemotherapeutics. In theory, anti-angiogenic drugs targeting endothelial VEGF signaling can improve vessel network structure and function, enhancing the transport of subsequent cytotoxic drugs to cancer cells. In practice, the effects are unpredictable, with varying levels of success. The predominant effects of anti-VEGF therapies are decreased vessel leakiness (hydraulic conductivity), decreased vessel diameters and pruning of the immature vessel network. It is thought that each of these can influence perfusion of the vessel network, inducing flow in regions that were previously sluggish or stagnant. Unfortunately, when anti-VEGF therapies affect vessel structure and function, the changes are dynamic and overlapping in time, and it has been difficult to identify a consistent and predictable normalization ``window'' during which perfusion and subsequent drug delivery is optimal. This is largely due to the non-linearity in the system, and the inability to distinguish the effects of decreased vessel leakiness from those due to network structural changes in clinical trials or animal studies. We have developed a mathematical model to calculate blood flow in complex tumor networks imaged by two-photon microscopy. The model incorporates the necessary and sufficient components for addressing the problem of normalization of tumor vasculature: i) lattice-Boltzmann calculations of the full flow field within the vasculature and within the tissue, ii) diffusion and convection of soluble species such as oxygen or drugs within vessels and the tissue domain, iii) distinct and spatially-resolved vessel hydraulic conductivities and permeabilities for each species, iv) erythrocyte particles advecting in the flow and delivering oxygen with real oxygen release kinetics, v) shear stress-mediated vascular remodeling. This model, guided by multi-parameter intravital imaging of tumor vessel structure

  18. 24 CFR 5.661 - Section 8 project-based assistance programs: Approval for police or other security personnel to...

    Science.gov (United States)

    2010-04-01

    ... personnel who will reside in the project, and the period of residence by such personnel. How owner proposes... purpose, “owner” includes a principal or other interested party. (iv) How residence by security personnel in a project unit will increase security for Section 8 assisted families residing in the project. (v...

  19. 33 CFR 105.210 - Facility personnel with security duties.

    Science.gov (United States)

    2010-07-01

    ... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and... effects, baggage, cargo, and vessel stores; and (m) The meaning and the consequential requirements of the...

  20. Maury Journals - German Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — German vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  1. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  2. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  3. Nigeria; Publication of Financial Sector Assessment Program Documentation––Detailed Assessment of Implementation of IOSCO Objectives and Principles of Securities Regulation

    OpenAIRE

    International Monetary Fund

    2013-01-01

    An assessment of the level of implementation of the International Organization of Securities Commissions (IOSCO) Principles in Nigeria was conducted as part of the International Monetary Fund (IMF)-World Bank Financial Sector Assessment Program (FSAP). The ongoing global financial crisis has reinforced the need for assessors to make a judgment about supervisory practices and to determine whether they are sufficiently effective. The assessment methodology provides a set of assessment criteria ...

  4. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  5. Barriers and Potential Improvements for Needle and Syringe Exchange Programs (NSPs in China: A Qualitative Study from Perspectives of Both Health and Public Security Sectors.

    Directory of Open Access Journals (Sweden)

    Fung Kuen Koo

    Full Text Available This study explores the acceptability, the barriers to the implementation of needle and syringe exchange programs (NSPs and the potential improvement strategies in China from the perspectives of governmental health and public security officials. Purposive sampling was used for recruitment of participants who had been involved in NSPs implementation. Semi-Structured individual interviews were conducted in Mandarin to address three aspects of NSPs: (1 participants' attitudes towards NSPs, (2 participants' opinions on the effectiveness and barriers of NSPs, and (3 suggestions for improving the program. Content analysis was used to analyse the translated interview data. A total of 68 participants from 12 Hunan counties were interviewed (34 from each of the Bureau of Health and the Narcotic Division. Both groups recognised the importance and effectiveness of NSPs in HIV prevention, but public security officials regarded NSPs as a temporary intervention in place of punitive measures. Most health officials (32/34 regarded the main barriers to its implementation as administrative and structural, whereas participants from Narcotics Division (n=24 questioned the legitimacy of NSPs and concerned about the poor management of drug users' risk behaviours. Close cooperation between the health and public security sectors, engagement of the drug user community and an enabling policy environment were reportedly to be critical for potential improvements of NSPs in China. Misconceptions about NSPs encourage drug users' addictive behaviour, and an unclear leadership and insufficient support de-motivate the participants from the Bureau of Health and the Narcotics Division to actively support the program implementation.

  6. Reactor vessel sealing plug

    International Nuclear Information System (INIS)

    Dooley, R.A.

    1986-01-01

    This invention relates to an apparatus and method for sealing the cold leg nozzles of a nuclear reactor pressure vessel from a remote location during maintenance and inspection of associated steam generators and pumps while the pressure vessel and refueling canal are filled with water. The apparatus includes a sealing plug for mechanically sealing the cold leg nozzle from the inside of a reactor pressure vessel. The sealing plugs include a primary and a secondary O-ring. An installation tool is suspended within the reactor vessel and carries the sealing plug. The tool telescopes to insert the sealing plug within the cold leg nozzle, and to subsequently remove the plug. Hydraulic means are used to activate the sealing plug, and support means serve to suspend the installation tool within the reactor vessel during installation and removal of the sealing plug

  7. Containment vessel drain system

    Science.gov (United States)

    Harris, Scott G.

    2018-01-30

    A system for draining a containment vessel may include a drain inlet located in a lower portion of the containment vessel. The containment vessel may be at least partially filled with a liquid, and the drain inlet may be located below a surface of the liquid. The system may further comprise an inlet located in an upper portion of the containment vessel. The inlet may be configured to insert pressurized gas into the containment vessel to form a pressurized region above the surface of the liquid, and the pressurized region may operate to apply a surface pressure that forces the liquid into the drain inlet. Additionally, a fluid separation device may be operatively connected to the drain inlet. The fluid separation device may be configured to separate the liquid from the pressurized gas that enters the drain inlet after the surface of the liquid falls below the drain inlet.

  8. Flaw preparations for HSST program vessel fracture mechanics testing: mechanical-cyclic pumping and electron-beam weld-hydrogen-charge cracking schemes

    International Nuclear Information System (INIS)

    Holz, P.P.

    1980-06-01

    The purpose of the document is to present schemes for flaw preparations in heavy section steel. The ability of investigators to grow representative sharp cracks of known size, location, and orientation is basic to representative field testing to determine data for potential flaw propagation, fracture behavior, and margin against fracture for high-pressure-, high-temperature-service steel vessels subjected to increasing pressurization and/or thermal shock. Gaging for analytical stress and strain procedures and ultrasonic and acoustic emission instrumentation can then be applied to monitor the vessel during testing and to study crack growth. This report presents flaw preparations for HSST fracture mechanics testing. Cracks were grown by two techniques: (1) a mechanical method wherein a premachined notch was sharpened by pressurization and (2) a method combining electron-beam welds and hydrogen charging to crack the chill zone of a rapidly placed autogenous weld. The mechanical method produces a naturally occurring growth shape controlled primarily by the shape of the machined notch; the welding-electrochemical method produces flaws of uniform depth from the surface of a wall or machined notch. Theories, details, discussions, and procedures are covered for both of the flaw-growing schemes

  9. Radiation embrittlement of PWR vessel supports

    International Nuclear Information System (INIS)

    Cheverton, R.D.; Robinson, G.C.; Pennell, W.E.; Nanstad, R.K.

    1989-01-01

    Several studies pertaining to radiation damage of PWR vessel supports were conducted between 1978 and 1987. During this period, apparently there was no reason to believe that low-temperature (<100 degree C) MTR embrittlement data were not appropriate for evaluating embrittlement of PWR vessel supports. However, late in 1986, data from the High Flux Isotope Reactor (HFIR) vessel surveillance program indicated that the embrittlement rates of the several HFIR vessel materials (A212-B, A350-LF3, A105-II) were substantially greater than anticipated on the basis of MTR data. Further evaluation of the HFIR data suggested that a fluence-rate effect was responsible for the apparent discrepancy, and shortly thereafter it became apparent that this rate effect was applicable to the evaluation of LWR vessel supports. As a result, the Nuclear Regulatory Commission (NRC) requested that the Oak Ridge National Laboratory (ORNL) evaluate the impact of the apparent embrittlement rate effect on the integrity of light-water-reactor (LWR) vessel supports. The purpose of the study was to provide an indication of whether the integrity of reactor vessel supports is likely to be challenged by radiation-induced embrittlement. The scope of the evaluation included correlation of the HFIR data for application to the evaluation of LWR vessel supports; a survey and cursory evaluation of all US LWR vessel support designs, selection of two plants for specific-plant evaluation, and a specific-plant evaluation of both plants to determine critical flaw sizes for their vessel supports. 19 refs., 8 figs., 2 tabs

  10. What can Iran gain by having a nuclear weapons program that threatens to destabilize security in the Middle East?

    DEFF Research Database (Denmark)

    Nielsen, Thomas Galasz

    and a lot of neigh- bouring countries fear such a development for security reasons. But why is Iran following a nuclear path that may further destabilise the fragile security situation in the Middle East? It is to do with Iran’s own perception of security risks, its desire for greatness in the region......- bination with its important strategic location by the Strait of Hormuz, and supports various political groupings in and around Syria and Iraq to attract the attention of the United States of American in an attempt to become recognised as the most important player in the Middle East. Should Iran succeed...... in its brinkmanship and the outcome could be the lifting of the UN sanctions, international recognition, improved security, and even a possible end to internal political power struggles due to likely economic reforms post-sanctions. Much is at stake for Iran, but, if it succeeds, it could shift...

  11. Armed guards on vessels : insurance and liability

    Directory of Open Access Journals (Sweden)

    Mišo Mudrić

    2011-12-01

    Full Text Available The Paper examines the insurance and liability issues resulting from the use of armed guards on board vessels. The study begins with an overview of the available data on key economic fi gures representing the projected overall annual costs of modern piracy. The focus is then shifted to the issue of public versus private security, where possible dangers of private-based security options are discussed in general. After explaining why the Somalia region deserves a closer attention when compared to other pirate-infested waters, a brief summary of the international effort to combat piracy threat is presented, followed by a structured overview of the use of private maritime security options in the maritime sector in general. One security option is the use of armed guards on board vessels. This option is explored both from the political (the acceptance by stakeholders and legal standpoint (legal issues arising from the use of armed guards. An important remedy for the shipping companies/ operators threatened by the piracy hazard is the existence of affordable and effective (specialized marine insurance. A study of available piracy insurance policies is presented, followed by an analysis of case law and other legal issues arising from piracy attacks, which could prove important when considering the legal implications of armed guards employment. Finally, a simplifi ed economic analysis of available security options is presented, followed by the final assessment of benefi ts derived from the use of armed guards.

  12. Vacuum vessel for a nuclear fusion device

    International Nuclear Information System (INIS)

    Watanabe, Takashi; Sato, Hiroshi; Owada, Koro.

    1976-01-01

    Object: To provide a reinforcing member on a bellows portion to reduce a stress at the bellows portion thereby increasing the strength of a vessel. Structure: A vacuum vessel for a nuclear fusion device has a bellows portion and a wall thick portion. A support extended toward the bellows portion is secured inside of a toroidal section in order to reduce the stress at the bellows portion. An insulator is interposed between the support and the bellows portion and is retained on the support by a bolt. Since the stress may be reduced by the support, the wall thick of the bellows portion may be decreased to sufficiently secure the low electric resistance value. (Yoshihara, H.)

  13. 47 CFR 80.277 - Ship Security Alert System (SSAS).

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Ship Security Alert System (SSAS). 80.277... Security Alert System (SSAS). (a) Vessels equipped with a Ship Security Alert System pursuant to the Safety..., “RTCM Standard 11020.0—Ship Security Alert Systems (SSAS) using the Cospas-Sarsat System,” Version 1.0...

  14. The Impact of a Home-Delivered Meal Program on Nutritional Risk, Dietary Intake, Food Security, Loneliness, and Social Well-Being.

    Science.gov (United States)

    Wright, Lauri; Vance, Lauren; Sudduth, Christina; Epps, James B

    2015-01-01

    Maintaining independence and continuing to live at home is one solution to manage the rising health care costs of aging populations in the United States; furthermore, seniors are at risk of malnutrition and food insecurity. Home-delivered meal programs are a tool to address food, nutrition, and well-being concerns of this population. Few studies have identified outcomes from these programs; this pilot study reviews the nutritional status, dietary intake, well-being, loneliness, and food security levels of seniors participating in a Meals on Wheels delivery service. Clients, new to the meal program, participated in pre- and postphone interviews, and 51 seniors completed the study. The survey was composed of five scales or questionnaires, and statistical analyses were conducted using SPSS. Improvements across all five measures were statistically significant after participating two months in the home-delivered meal program. Implications for further research, practice, and the Older Americans Act are discussed.

  15. New directions for African security

    NARCIS (Netherlands)

    Haastrup, Toni; Dijkstra, Hylke

    2017-01-01

    African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the

  16. National Strategy to Secure Cyberspace

    National Research Council Canada - National Science Library

    Schwalm, Keith T

    2006-01-01

    ... of a national strategy for securing cyberspace. The approach explored the development of cyber technology strategies and programs related to the mission and roles of Homeland Security Advanced Research Projects Agency...

  17. NCSX Vacuum Vessel Fabrication

    International Nuclear Information System (INIS)

    Viola ME; Brown T; Heitzenroeder P; Malinowski F; Reiersen W; Sutton L; Goranson P; Nelson B; Cole M; Manuel M; McCorkle D.

    2005-01-01

    The National Compact Stellarator Experiment (NCSX) is being constructed at the Princeton Plasma Physics Laboratory (PPPL) in conjunction with the Oak Ridge National Laboratory (ORNL). The goal of this experiment is to develop a device which has the steady state properties of a traditional stellarator along with the high performance characteristics of a tokamak. A key element of this device is its highly shaped Inconel 625 vacuum vessel. This paper describes the manufacturing of the vessel. The vessel is being fabricated by Major Tool and Machine, Inc. (MTM) in three identical 120 o vessel segments, corresponding to the three NCSX field periods, in order to accommodate assembly of the device. The port extensions are welded on, leak checked, cut off within 1-inch of the vessel surface at MTM and then reattached at PPPL, to accommodate assembly of the close-fitting modular coils that surround the vessel. The 120 o vessel segments are formed by welding two 60 o segments together. Each 60 o segment is fabricated by welding ten press-formed panels together over a collapsible welding fixture which is needed to precisely position the panels. The vessel is joined at assembly by welding via custom machined 8-inch (20.3 cm) wide spacer ''spool pieces''. The vessel must have a total leak rate less than 5 X 10 -6 t-l/s, magnetic permeability less than 1.02(micro), and its contours must be within 0.188-inch (4.76 mm). It is scheduled for completion in January 2006

  18. 75 FR 8489 - Security Zone; Freeport Channel Entrance, Freeport, TX

    Science.gov (United States)

    2010-02-25

    ... environmental risk to health or risk to safety that may disproportionately affect children. Indian Tribal... Captain of the Port, Houston-Galveston deems enhanced security measures necessary on a case-by-case basis... vessels. The moving security zone may commence at any point after certain vessels bound for the Port of...

  19. Radioactive waste processing vessel

    International Nuclear Information System (INIS)

    Hayashi, Masaru; Suzuki, Osamu; Ishizaki, Kanjiro.

    1987-01-01

    Purpose: To obtain a vessel of a reduced weight and with no external leaching of radioactive materials. Constitution: The vessel main body is constituted, for example, with light weight concretes or foamed concretes, particularly, foamed concretes containing fine closed bubbles in the inside. Then, layers having dense texture made of synthetic resin such as polystylene, vinylchloride resin, etc. or metal plate such as stainless plate are integrally disposed to the inner surface of the vessel main body. The cover member also has the same structure. (Sekiya, K.)

  20. Tempest in a vessel

    International Nuclear Information System (INIS)

    Barre, Bertrand

    2015-01-01

    As the ASN made some statements about anomalies of carbon content in the EPR vessel bottom and top, the author recalls and comments some technical issues to better understand the information published on this topic. He notably addresses the role of the vessel, briefly indicates its operating conditions, shape and structure, and mechanical components for the top, its material and mechanical properties, and test samples used to assess mechanical properties. He also comments the phenomenon of radio-induced embrittlement, the vessel manufacturing process, and evokes the applicable regulations. He quotes and comments statements made by the ASN and Areva which evoke further assessments of the concerned components

  1. 6 CFR 7.10 - Authority of the Chief Security Officer, Office of Security.

    Science.gov (United States)

    2010-01-01

    ...) Direct and administer DHS implementation and compliance with the National Industrial Security Program in... 6 Domestic Security 1 2010-01-01 2010-01-01 false Authority of the Chief Security Officer, Office of Security. 7.10 Section 7.10 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  2. Auditing Organizational Security

    Science.gov (United States)

    2017-01-01

    Organi- zation for Standardiza- tion ( ISO ): ISO 27000 : Information Systems Se- curity Management. A robust program of internal auditing of a...improvement is the basis and underpinning of the ISO . All processes must be considered ongoing and never at an “end state.” Top management develops a...security management system, including security policies and security objectives, plus threats and risks. Orga- nizations already working with ISO 9000

  3. 21st Century Security Manager

    Directory of Open Access Journals (Sweden)

    Stelian ARION

    2010-11-01

    Full Text Available We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security risk management and resilience. 21st Century security manager need to deal with several areas of konwledge in order to succesfully manage security risks. The document presents the advantages, disadvantages and challenges for security managers thah have government backgroud, or IT security backgroud, or are promoted from organization’s inside leaders. There are six different areas of knowledge that successful security programs of the future must incorporate, either in the knowledge base of their leaders or in the collective knowledge of the leading staff. They are government elements, security organization, emerging issue awareness, IT security, business elements and executive leadership.

  4. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  5. Sealing analysis for nuclear vessels of PWR

    International Nuclear Information System (INIS)

    Qu Jiadi; Dou Yikang

    1988-01-01

    The fundamental equations of sealing analysis for vessels are given and a computer program named SMEC, which considers the change of stud loading, the elastic contact between flange mating surfaces and the transient thermal effects, is developed accordingly. The SMEC is verified by several test. On the basis of analysis, a new concept of classifying vessels into three types according to increasing or decreasing of bolt loading with increasing pressure is suggested. Type-A vessel is that in which the bolt loading increases monotonically with increasing pressure, while in type-B, the bolt loading decreases monotonically, and in type-C, the bolt loading changes nonmonotonically. It is important for vessel design to distinguish the types through analysis. The sealing mechanism is also discussed

  6. Some aspects of reactor pressure vessel integrity

    International Nuclear Information System (INIS)

    Korosec, D.; Vojvodic, G.J.

    1996-01-01

    Reactor pressure vessel of the pressurized water reactor nuclear power plant is the subject of extreme interest due to the fact that presents the pressure boundary of the reactor coolant system, which is under extreme thermal, mechanical and irradiation effects. Reactor pressure vessel by itself prevents the release of fission products to the environment. Design, construction and in-service inspection of such component is governed by strict ASME rules and other forms of administrative control. The reactor pressure vessel in nuclear power plant Kriko is designed and constructed in accordance with related ASME rules. The in-service inspection program includes all requests presented in ASME Code section XI. In the present article all major requests for the periodic inspections of reactor pressure vessel and fracture mechanics analysis are discussed. Detailed and strict fulfillment of all prescribed provisions guarantee the appropriate level of nuclear safety. (author)

  7. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  8. Reactor vessel supported by flexure member

    International Nuclear Information System (INIS)

    Crawford, J.D.; Pankow, B.

    1977-01-01

    According to the present invention there is provided an improved arrangement for supporting a reactor vessel within a containment structure against static and dynamic vertical loadings capable of being imposed as a result of a serious accident as well as during periods of normal plant operation. The support arrangement of the invention is, at the same time, capable of accommodating radial displacements that normally occur between the reactor vessel and the containment structure due to operational transients. The arrangement comprises a plurality of vertical columns connected between the reactor vessel and a support base within the containment structure. The columns are designed to accommodate relative displacements between the vessel and the containment structure by flexing. This eliminates the need for relative sliding movements and thus enables the columns to be securely fixed to the vessel. This elimination of a provision for relative sliding movements avoids the spaces or gaps between the retention members and the retained elements as occurred in prior art arrangements and, concomitantly, the danger of establishing impact forces on the retention members in the event of an accident is reduced. (author)

  9. Minutes of the 14th Light Water Reactor Pressure Vessel Surveillance Dosimetry Improvement Program (LWR-PV-SDIP) meeting, October 1-5, 1984

    International Nuclear Information System (INIS)

    1984-01-01

    Topics discussed include: ASTM LWR standards; trend curves, PSF, and other test reactor metallurgical programs; PSF dosimetry and metallurgical capsule neutron and gamma characterization and metallurgical studies; PVS characterization program; other neutron fields; Surveillance Dosimetry Measurement Facility (SDMF) and perturbation studies; transport theory calculations; gamma field benchmarks and photo-reaction studies; and fission and non-fission sensor inventories and quality assurance

  10. Cheboygan Vessel Base

    Data.gov (United States)

    Federal Laboratory Consortium — Cheboygan Vessel Base (CVB), located in Cheboygan, Michigan, is a field station of the USGS Great Lakes Science Center (GLSC). CVB was established by congressional...

  11. High Performance Marine Vessels

    CERN Document Server

    Yun, Liang

    2012-01-01

    High Performance Marine Vessels (HPMVs) range from the Fast Ferries to the latest high speed Navy Craft, including competition power boats and hydroplanes, hydrofoils, hovercraft, catamarans and other multi-hull craft. High Performance Marine Vessels covers the main concepts of HPMVs and discusses historical background, design features, services that have been successful and not so successful, and some sample data of the range of HPMVs to date. Included is a comparison of all HPMVs craft and the differences between them and descriptions of performance (hydrodynamics and aerodynamics). Readers will find a comprehensive overview of the design, development and building of HPMVs. In summary, this book: Focuses on technology at the aero-marine interface Covers the full range of high performance marine vessel concepts Explains the historical development of various HPMVs Discusses ferries, racing and pleasure craft, as well as utility and military missions High Performance Marine Vessels is an ideal book for student...

  12. 2011 Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  13. 2011 Fishing Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  14. Pressurized Vessel Slurry Pumping

    International Nuclear Information System (INIS)

    Pound, C.R.

    2001-01-01

    This report summarizes testing of an alternate ''pressurized vessel slurry pumping'' apparatus. The principle is similar to rural domestic water systems and ''acid eggs'' used in chemical laboratories in that material is extruded by displacement with compressed air

  15. 2013 Tanker Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...

  16. Maury Journals - US Vessels

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — U.S. vessels observations, after the 1853 Brussels Conference that set International Maritime Standards, modeled after Maury Marine Standard Observations.

  17. Coastal Logbook Survey (Vessels)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains catch (landed catch) and effort for fishing trips made by vessels that have been issued a Federal permit for the Gulf of Mexico reef fish,...

  18. In-vessel tritium

    International Nuclear Information System (INIS)

    Ueda, Yoshio; Ohya, Kaoru; Ashikawa, Naoko; Ito, Atsushi M.; Kato, Daiji; Kawamura, Gakushi; Takayama, Arimichi; Tomita, Yukihiro; Nakamura, Hiroaki; Ono, Tadayoshi; Kawashima, Hisato; Shimizu, Katsuhiro; Takizuka, Tomonori; Nakano, Tomohide; Nakamura, Makoto; Hoshino, Kazuo; Kenmotsu, Takahiro; Wada, Motoi; Saito, Seiki; Takagi, Ikuji; Tanaka, Yasunori; Tanabe, Tetsuo; Yoshida, Masafumi; Toma, Mitsunori; Hatayama, Akiyoshi; Homma, Yuki; Tolstikhina, Inga Yu.

    2012-01-01

    The in-vessel tritium research is closely related to the plasma-materials interaction. It deals with the edge-plasma-wall interaction, the wall erosion, transport and re-deposition of neutral particles and the effect of neutral particles on the fuel recycling. Since the in-vessel tritium shows a complex nonlinear behavior, there remain many unsolved problems. So far, behaviors of in-vessel tritium have been investigated by two groups A01 and A02. The A01 group performed experiments on accumulation and recovery of tritium in thermonuclear fusion reactors and the A02 group studied theory and simulation on the in-vessel tritium behavior. In the present article, outcomes of the research are reviewed. (author)

  19. Reactor pressure vessel support

    International Nuclear Information System (INIS)

    Butti, J.P.

    1977-01-01

    A link and pin support system provides the primary vertical and lateral support for a nuclear reactor pressure vessel without restricting thermally induced radial and vertical expansion and contraction. (Auth.)

  20. 2013 Cargo Vessel Density

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Automatic Identification Systems (AIS) are a navigation safety device that transmits and monitors the location and characteristics of many vessels in U.S. and...